Remove tags Adversarial Machine Learning
article thumbnail

How we took part in MLSEC and (almost) won

SecureList

This summer Kaspersky experts took part in the Machine Learning Security Evasion Competition ( MLSEC ) — a series of trials testing contestants’ ability to create and attack machine learning models. We added popular header tags, such as <meta>, which somehow led to poorer results on the first three models.

article thumbnail

Unravelling the Web: AI’s Tangled Web of Prompt Injection Woes

LRQA Nettitude Labs

So, AI, or as I like to call it, spicy autocomplete, is about making machines act smart. They can learn, think, solve problems – basically, they’re trying to outdo us at our own game. It’s like a digital con artist whispering chaos into the ears of our so-called intelligent machines. What is AI and what are its uses?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Loss Prevention: Best Practices for Secure Data Management

Centraleyes

Automated classification tags enable the institution to enforce stringent access controls and encryption measures, ensuring the utmost protection for sensitive financial data. Machine learning algorithms, trained on historical data, enable proactive defense by predicting and preventing unauthorized access or data exfiltration.

article thumbnail

Machine Learning in Cybersecurity Course – Part 2: Specific Applications and Challenges

NopSec

Spam detection, facial recognition, market segmentation, social network analysis, personalized product recommendations, self-driving cars – applications of machine learning (ML) are everywhere around us. For example, we could tag all messages that contain the expression ‘make money’ as spam.

article thumbnail

A Pandora's Box: Unpacking 5 Risks in Generative AI

Thales Cloud Protection & Licensing

The Rising Threat Landscape Adversaries are already harnessing the power of generative AI for several nefarious purposes. Stealing the Model: AI models are the crown jewels of organizations leveraging machine learning algorithms. This should help them stay a step ahead of adversaries.

Risk 71
article thumbnail

A Pandora’s Box: Unpacking 5 Risks in Generative AI

Security Boulevard

The Rising Threat Landscape Adversaries are already harnessing the power of generative AI for several nefarious purposes. Stealing the Model: AI models are the crown jewels of organizations leveraging machine learning algorithms. This should help them stay a step ahead of adversaries.

Risk 69
article thumbnail

HYAS Product Enhancements – Part 1 – February 2024

Security Boulevard

Part 1 of this 2-part blog highlights some of the latest improvements with HYAS Insight. HYAS verdicts compress the outputs of over 50 proprietary rules, machine learning algorithms, and processes into a single Benign, Suspicious, or Malicious verdict. You can group by malware family, malware tags, and C2 ASNs.

DNS 49