Generative AI: vulnerable systems like any other

Generative AI: vulnerable systems like any other

The business world is passionate about generative artificial intelligence. But to avoid unpleasant surprises, it’s better to take the time to think about their security before deploying them. The paper lists the different configurations of a generative AI system and attack scenarios. It offers about thirty security recommendations. It mainly focuses on LLM (Large Language … Read more

Cybersecurity: How can businesses smartly protect themselves during (and after) the Olympics?

Cybersecurity: How can businesses smartly protect themselves during (and after) the Olympics?

Attack surfaces will be multiplied during games. During this period, the government recommends companies to prefer remote work, mainly to limit the coming of employees to the office in view of the organization of transport. The 2024 Olympics are fast approaching. Cybersecurity, already a major concern in France in normal times, will be even more … Read more

Rift Hunter, “at first it seemed…

Rift Hunter, “at first it seemed…

Anyone can join the bug bounty by registering on one of the online platforms. But in the case of Pwnwithlove, during a “live event” organized by YesWeHack in July 2023, she began to show serious interest in this discipline. “For a whole day, all the bug hunters came together to work on the same program … Read more