RNN – Recurrent Neural Networks

In the realm of Artificial Intelligence, many tasks involve understanding data that unfolds over time or has a sequential structure. Think of comprehending spoken language, predicting stock prices, or even generating music. Traditional neural networks, designed to process independent inputs, often fall short in these scenarios. This is where Recurrent Neural Networks (RNNs) come into Read More …

RAG: Giving AI a Better Memory

Imagine you’re trying to answer a tough question, but your brain doesn’t have the specific information. What do you do? You probably look it up – maybe on the internet or in a book. Retrieval-Augmented Generation, or RAG, is a way to give AI models a similar ability.  Think of a powerful AI language model as Read More …

AZ 900 – Part II – Architecture & Security II

Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …

CDN – Content Delivery Network

A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographic locations. Its primary purpose is to deliver web content, such as images, videos, stylesheets, and scripts, to users more efficiently and quickly. By caching content on multiple servers, a CDN reduces the distance data must travel to reach end-users, Read More …

Conference Video – Why We are Not Building a Defendable Internet

In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …

Hacker TV – Kerberoasting & Attacks 101

Want to understand how Kerberos works?  Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

Month of AI Video – Hacking AI Infrastructure Providers for Fun

An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …

Notes – About GitHub-hosted runners

GitHub offers hosted virtual machines to run workflows. The virtual machine contains an environment of tools, packages, and settings available for GitHub Actions to use. Overview of GitHub-hosted runners Runners are the machines that execute jobs in a GitHub Actions workflow. For example, a runner can clone your repository locally, install testing software, and then Read More …