AI attacks, AI defends: how to use neural networks in information security
Hello! We share with you the material prepared by Roman Strelnikov — head of the information security department at Bitrix24. Roman is the person who controls everything…
Hello! We share with you the material prepared by Roman Strelnikov — head of the information security department at Bitrix24. Roman is the person who controls everything…
Websites that have dominated the top spots of search results for years are losing visitors: this phenomenon has already been dubbed the "neural network siteclysm." The…
Artificial intelligence technologies are developing rapidly, but with new opportunities come new risks. Prompt injections, abuse of agent tools, vulnerabilities in the…
Holidays, public holidays, any "extra" days off - this is an opportunity for attackers to try to launch an attack. The attackers' calculation is simple: the fewer "defending"…
Don’t let your thoughts become training material for AI — or leak in a data breach. It doesn’t matter which chatbot you choose: the more you share, the more useful it…
Getting to OFFZONE as a speaker is not the easiest task. Every year we get questions: how does the CFP work? which topics are better to choose? how to submit an application…
Hello everyone! Sergey Sobolev is here, a specialist in distributed systems security at Positive Technologies, our team is engaged in auditing smart contracts. Today…
Hello, tekkix! My name is Natali Dubotolkova, I am a senior secure software development engineer at Basis. I want to talk about how we thought about integrating the work…
The "Platform Engineering" trend proposed by analytical agencies has become interesting not only to companies that transform their processes, teams, and tools according…
Previously, we talked about how to configure various mail policies in the CBPolicyD module built into Carbonio by editing tables in the SQLite3 database. Such policies…
Hello, tekkix! My name is Suleiman, and I am a Senior Software Engineer with over 10 years of programming experience. I develop complex web services that can scale and…
Artificial intelligence has already firmly entered the arsenal of modern business tools. Its application is now the norm, not the exception. AI effectively solves the…
Hello! My name is Pavel, and I am the head of office IT infrastructure at Yandex. For more than a year of my work, to one degree or another, I have dedicated myself to…
Analysis of the evolution and development prospects of interfaces for harmonious cooperation between humans and artificial intelligence.
Working on a MacBook with Docker Desktop, I often encountered the system becoming less responsive, especially when running multiple containers simultaneously. High CPU…
Hello, tekkix! We are talking about one of the options for using Open Source tools for Software Supply Chain Security. Colleagues in the field asked to post a small overview…
Hello! I am Georgiy, a developer from the team that created Unidraw. I will tell you the story of how we were looking for a tool for joint sessions on a virtual board.…