PinnedAdversarial AI Digest — June, 2025A digest of AI security research, insights, reports, upcoming events, and tools & resources. Follow AI Security community on Twitter and…Jun 21Jun 21
PinnedPublished inAI Security HubAdversarial AI Digest — 20 May, 2025A digest of AI security research, insights, reports, upcoming events, and tools & resources. Follow AI Security community on Twitter and…May 23May 23
PinnedPublished inAI Security HubHow to Pitch at RSA Innovation Sandbox, Black Hat Startup Spotlight, and GISEC CyberstarsCybersecurity startup competitions like RSAC Innovation Sandbox, Black Hat Startup Spotlight, and GISEC Cyberstars are more than just…May 14May 14
PinnedTop 25 Cyber Security Newsletters — 2025Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events…Sep 5, 2022A response icon2Sep 5, 2022A response icon2
PinnedAnatomy of Automated Account Takeoversbad bots can be considered the permanent residents of the digital world with just one step away from being official dominant digital…Apr 21, 2020Apr 21, 2020
AI-Powered NIDSHow LLMs Are Reimagining Network Intrusion Detection? Large Language Models (LLMs) are redefining network security — moving NIDS from…21h ago21h ago
Published inAI Security Hub🇸🇬 27 Cybersecurity Conferences in SingaporeI’ve been getting a lot of questions lately about what cybersecurity events are happening in Singapore this year — so I decided to compile…Jun 26Jun 26
Published inAI Security Hub🆚 Shadow AI vs. Shadow ITAs artificial intelligence (AI) adoption accelerates, organizations are facing an emerging challenge — Shadow AI.Jun 8Jun 8
Published inAI Security HubAI Hacking Village @ BSides TLV 2025On June 26, 2025 — hackers, researchers, and AI defenders will gather at Tel Aviv University for a one-of-a-kind experience at the…May 27May 27