Grzegorz Pielot

Broken Hill: Probing the Weak Spots of AI’s Shiny New Brain

A Chink in the Armor Large Language Models (LLMs) like OpenAI’s ChatGPT or Google’s Bard have become the rockstars of …

Jan 20, 2025

6 min read

Grzegorz Pielot

Unveiling the US Treasury Cyberattack: A Silent Threat to National Security

As the holiday season unfolded in late December 2024, the U.S. Treasury Department became the unexpected focal point of a …

Jan 3, 2025

5 min read

Grzegorz Pielot

The Most Impactful Open-Source Projects of 2024

In the ever-evolving world of cybersecurity, 2024 felt like a year where the community collectively raised its game. It wasn’t …

Dec 31, 2024

5 min read

Grzegorz Pielot

2024: A Year in Cybersecurity—Adrenaline, Chaos, and Lessons from the Digital Battlefield

The year 2024 wasn’t just another chapter in the annals of cybersecurity—it was a rollercoaster of electrifying events that sent …

Dec 31, 2024

7 min read

Lochana Koralage Official

A.I.-driven shields design for cyber warriors.

Since more private data is stored and transmitted digitally, cybersecurity has emerged as a pressing concern in the Internet Age. …

Apr 4, 2023

15 min read

Lucas Maclaud Official

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …

Mar 8, 2023

12 min read

Wilson Mendes Official

New frontiers, new worlds, new threats

Where are you going?There.What time will you be back?I will be back soon.  Mr.Cardoso Image created in midjourney  Introduction Since …

Mar 8, 2023

14 min read

Lochana Koralage Official

The process of developing tactics with the purpose of preparing for a cyberwar

Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …

Mar 8, 2023

11 min read

Alexander Teggin Course

Uncensoring LLMs (W78)

Enter a short description of the course.

Oct 30, 2024

10 min read

Hugo Le Belzic Course

Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 19, 2024

7 min read

Robert Thomas Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31, 2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25, 2024

10 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023