Apple release critical Mac OS X 10.6 and 10.7 updates
Apple has updated vulnerabilities in Java for Mac OS X 10.6 and 10.7 systems, some of which could allow an …
Adobe release critical ShockWave security update
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.6.1.629 and earlier versions on the Windows and Macintosh operating systems. …
Apple fix 96 vulnerabilities in iOS 5 release
Apple has this week (12th October) released it's latest mobile operating system called iOS 5. The new iOS 5 patches …
Microsoft fix 23 vulnerabilities for "Patch Tuesday"
Microsoft have released their "Patch Tuesday" update for October 11th which includes a critical flaw that could give attackers the …
AI-powered Incident Response
Let's dive into the world of AI-powered incident response in cybersecurity. I've always been fascinated by how AI can transform …
AI in the Battle for Cybersecurity, Defender or Threat?
AI is changing the way we think about cybersecurity, but it also raises important questions about what happens when both …
Malware Analysis and Development in the age of AI
Artificial intelligence (AI) has revolutionized the way we think about efficiency, automation, and problem-solving in recent years, affecting sectors such …
AI's Limitations in Detecting Malicious Activity
AI excels at analyzing patterns, predicting outcomes, and identifying known anomalies with great speed and accuracy. However, it struggles to …
Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Build Ethical Hacking Arsenal with ChatGPT-4o (W76)
AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.
Kubernetes Ethical Hacking (W75)
This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.