Command and Control (C2): Understanding the Backbone of Cyber Attacks
In today's digital landscape, understanding the intricacies of cyber threats is more crucial than ever. Among the various stages of …
Lessons from SP Oswal and other recent Deep-fake Scams: How to combat sophisticated frauds
Scams in India are reaching a whole new level. Take the case of Sri S.P. Oswal, the 82-year-old chairman of …
The New Frontier of Scamming: How Real-Time Bidding is Fueling Fraud
This happened in Australia. A citizen recently received a text message that seemed to know exactly what they were up …
Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Defining Cybersecurity in Healthcare
With healthcare accounting for 34% of cyberattacks in 2023, the sector is a prime target for cybercriminals exploiting vulnerabilities. Cybersecurity …
Command and Control (C2): Understanding the Backbone of Cyber Attacks
In today's digital landscape, understanding the intricacies of cyber threats is more crucial than ever. Among the various stages of …
AI-powered Incident Response
Let's dive into the world of AI-powered incident response in cybersecurity. I've always been fascinated by how AI can transform …
AI in the Battle for Cybersecurity, Defender or Threat?
AI is changing the way we think about cybersecurity, but it also raises important questions about what happens when both …
Malware Analysis and Development in the age of AI
Artificial intelligence (AI) has revolutionized the way we think about efficiency, automation, and problem-solving in recent years, affecting sectors such …
Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Build Ethical Hacking Arsenal with ChatGPT-4o (W76)
AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.
Kubernetes Ethical Hacking (W75)
This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.