Notes from AfricaHackOn: Bank IT Security in Kenya.
Review from IT Security Conference in Kenya. Find out how Bank IT Security is developing in Kenya. AfricaHackOn 2014, first …
Brazilian banking Trojan disguised as Microsoft anti-virus software
A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals …
SpyEye banking Trojan uses SMS hijacking feature
SpyEye has been observed trying to trick users into reassigning their cellphone numbers to receive one-time passwords (OTP) from their …
SpitMo SpyEye toolkit targeting Android smartphones
The SpitMo SpyEye hacking toolkit app is targeting smartphones running on the Android operating system according to security vendor Trusteer. …
AI-powered Incident Response
Let's dive into the world of AI-powered incident response in cybersecurity. I've always been fascinated by how AI can transform …
AI in the Battle for Cybersecurity, Defender or Threat?
AI is changing the way we think about cybersecurity, but it also raises important questions about what happens when both …
Malware Analysis and Development in the age of AI
Artificial intelligence (AI) has revolutionized the way we think about efficiency, automation, and problem-solving in recent years, affecting sectors such …
AI's Limitations in Detecting Malicious Activity
AI excels at analyzing patterns, predicting outcomes, and identifying known anomalies with great speed and accuracy. However, it struggles to …
Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Build Ethical Hacking Arsenal with ChatGPT-4o (W76)
AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.
Kubernetes Ethical Hacking (W75)
This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.