Security in Machine Learning: From Design to Implementation
Polina Sokol, Senior Data Analyst at the R&D Laboratory of the Cybersecurity Technology Center of the Solar Group, prepared material on methods of working with data and…
Polina Sokol, Senior Data Analyst at the R&D Laboratory of the Cybersecurity Technology Center of the Solar Group, prepared material on methods of working with data and…
Ethernet protocol, developed by computer science researchers Robert Metcalfe and David Boggs, undoubtedly had a huge impact on the development of networks.
The "deepfake" technology carries deep ethical implications, raising concerns about misinformation and manipulation. By seamlessly blending fabricated content with reality,…
This project was developed for classes with schoolchildren - so that in the lesson you could program controllers, including via Bluetooth from a phone - with an interactive…
Interest in tube technology arises either from audiophilia, or when trying to restore a grandfather's receiver - or simply out of curiosity about retro electronics.
We have written enough articles about optimizing your neural networks, today it is time to move on to splitting, reducing, and direct trimming, otherwise known as data…
In the field of robotics, the constant pursuit of imitating human sensory capabilities has been driven by the desire to equip machines with a deeper understanding of…
Recently, news about Raspberry has been coming out with enviable regularity. For example, the bot in which I follow news about technology and artificial intelligence…
Hype? Philosophy? Everyday life? Future?
They say that laziness is the engine of progress. As for me, competition works better. The ability to freely choose devices, applications, and information is now the…
You can find various interpretations of the concept of AppSec on the web. In this article, we will try to understand what should be included in AppSec, what skills are…
In the new version v9.8.5, Nuclei Templates have added templates for checking AWS Cloud configuration. In this post, we will discuss automating the verification of incorrect…
Machine learning is now used to a greater or lesser extent in various industries. Cryptographic analysis is no exception. In this article, we will look at the CipherGAN…
Disclaimer: the words used like "port", "hack" and "reverse" do not mean that the article is intended exclusively for geeks! I try to write so that it is understandable…
You can't just replace millions of man-hours invested in developing classical query optimizers for relational DBMSs with neural networks. Reliability, flexibility, and…
The question of free will is one of the most fundamental and complex in philosophy. Free will is generally understood as the ability of a person to make conscious choices…
It is no secret that bug hunting is gaining popularity every year, attracting the attention of both companies seeking to improve the security of their products and white…
IDOR vulnerabilities are among the most common security vulnerabilities in modern web applications and APIs. It is not surprising that they are often recommended to novice…