Sublime
An inspiration engine for ideas


QUERY ACCESS: When the ML model is managed by a cloud provider (using Machine Learning as a Service – MLaaS), the attacker might submit queries to the model and receive predictions (either labels or model confdences). This capability is used by black-box evasion attacks, ENERGY-LATENCY ATTACKS, and all privacy attacks.
Apostol Vassilev • Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations
Consumer security for the digital era: While cybersecurity companies exist, there doesn't seem to be a complete, consumer-friendly offering.
Mario Gabriele • Not Found
AI Thought Leadership
Max Bernstein • 5 cards

The group known as Volt Typhoon was exploiting the zero-day flaw — meaning the software maker was unaware of it before having time to patch — in Versa Director, a piece of software made by Versa Networks, according to researchers at Black Lotus Lab, which is part of cybersecurity firm Lumen.
Lorenzo Franceschi-Bicchierai • Chinese government hackers targeted U.S. internet providers with zero-day exploit, researchers say | TechCrunch
