CNN – Convolutional Neural Networks

Convolutional Neural Networks (CNNs) were inspired by the way the human visual cortex works, CNNs are a specialized type of neural network particularly adept at analyzing and understanding images. They are the engine behind many impressive AI applications, from recognizing faces in photos to powering autonomous vehicles.  Traditional neural networks, while powerful, can struggle with Read More …

RAG: Giving AI a Better Memory

Imagine you’re trying to answer a tough question, but your brain doesn’t have the specific information. What do you do? You probably look it up – maybe on the internet or in a book. Retrieval-Augmented Generation, or RAG, is a way to give AI models a similar ability.  Think of a powerful AI language model as Read More …

AZ 900 – Part II – Architecture & Security II

Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …

NLP – Natural Language Processing

Natural Language Processing (NLP) is a subfield of artificial intelligence that focuses on the interaction between computers and humans through natural language. The primary goal of NLP is to enable machines to understand, interpret, and generate human language in a way that is both meaningful and useful. This capability has led to the development of Read More …

CDN – Content Delivery Network

A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographic locations. Its primary purpose is to deliver web content, such as images, videos, stylesheets, and scripts, to users more efficiently and quickly. By caching content on multiple servers, a CDN reduces the distance data must travel to reach end-users, Read More …

Chat with AI – Cloud Only Hacker

Attackers are increasingly able to meet their objectives by compromising corporate cloud accounts and subsequently moving laterally within the cloud environment, often without needing to breach individual endpoints. Several factors are driving this trend: Expanded Attack Surface in the Cloud: As organizations increasingly adopt cloud services and SaaS solutions, the attack surface has grown larger Read More …

Conference Video – Why We are Not Building a Defendable Internet

In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …

Hacker TV – Kerberoasting & Attacks 101

Want to understand how Kerberos works?  Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

Month of AI Video – Hacking AI Infrastructure Providers for Fun

An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …