Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
Not all “open” AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.
There’s hope yet for the world’s most beleaguered vulnerability database.
Learn about this family of licenses that seek to limit harmful use of AI models.
We’re not saying the NVD is dead but it’s not looking good.
Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.
Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.
The National Vulnerability Database’s backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress
Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.
Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.
Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.
Learn how to create an effective container security program with reachability analysis to protect your applications from vulnerabilities.
Mend.io launches Mend Container to address security in cloud-native development, offering reachability analysis and secrets detection.