#mlsecurity search results

🔍 Excited to see what @inference_labs has built with DSperse! #MLsecurity #ZeroKnowledge #Inference 🤖 Instead of verifying an entire ML model end-to-end (which is often slow, expensive and impractical), DSperse lets you slice a model into high‐value parts (e.g., a detector or…


Socho, AI ko trick karna ab ek naya game ban gaya hai. 🎮 Adversarial examples defenses AI ko sikhate hain ki inputs ko dhoondhe aur suspicious changes ko reject karein. Jaise ek airport security scanner nakli cheez pakad leta hai! #MLSecurity


@inference_labs ’ DSperse makes zero-knowledge proofs practical for ML. Instead of verifying entire models, it targets only the critical parts cutting proof time & memory use massively. Smart move toward verifiable AI that’s actually usable. #AI #ZeroKnowledge #MLsecurity


AI agent + connectors = Identity. Close the security gap (no visibility/permissions) with SUPERWISE®: Identity per Agent, Logs, & Auto-remediation. Full Breakdown: hubs.li/Q03MJWGF0 Start for FREE: hubs.li/Q03MJYpZ0 #MLSecurity #IdentityManagement #ZeroTrust #SecOps

SuperwiseAI's tweet image. AI agent + connectors = Identity.
Close the security gap (no visibility/permissions) with SUPERWISE®: Identity per Agent, Logs, & Auto-remediation.

Full Breakdown: hubs.li/Q03MJWGF0
Start for FREE: hubs.li/Q03MJYpZ0

#MLSecurity #IdentityManagement #ZeroTrust #SecOps

🔥Unveil our new @IEEESSP paper: “Jigsaw Puzzle” - a novel ML backdoor attack! Forget traditional backdoors; Jigsaw Puzzle only shields 1 malware family, while leaving other malware still predicted as malicious 🦠 Join my talk May 22, 2:30PM at S&P for more!💬 #IEEESP #MLSecurity


Winding up ‘ML for Security and Security for ML’ with Nikhil Joshi! A fascinating workshop exploring the intersection of machine learning and security. Big takeaways for all! #MLSecurity #TechInnovation #c0c0n2024

_c0c0n_'s tweet image. Winding up ‘ML for Security and Security for ML’ with Nikhil Joshi! A fascinating workshop exploring the intersection of machine learning and security. Big takeaways for all!
 #MLSecurity #TechInnovation #c0c0n2024

Want to enhance the security of your ML models? Check out how Malware Scanning in Defender for Storage ensures the integrity of your training data. bit.ly/477gZHp #MLsecurity #dataprotection

WirelessLife's tweet image. Want to enhance the security of your ML models? Check out how Malware Scanning in Defender for Storage ensures the integrity of your training data. bit.ly/477gZHp  #MLsecurity #dataprotection

A Critical (CVSS 9.8) RCE flaw in Keras 3’s Torch backend (CVE-2025-49655) allows attackers to execute arbitrary code by loading a malicious model due to insecure deserialization. #KerasRCE #MLsecurity #DeepLearning #PyTorch securityonline.info/critical-keras…


Happening this Thursday at the Commonwealth of Virginia Information Security Conference: 🥒 Evil Pickles & Machine Learning: What Could Go Wrong? Learn more: bit.ly/4m5hTuZ #COVIS2025 #MLSecurity #VirginiaCyber

ReversingLabs's tweet image. Happening this Thursday at the Commonwealth of Virginia Information Security Conference: 🥒 Evil Pickles & Machine Learning: What Could Go Wrong? Learn more: bit.ly/4m5hTuZ #COVIS2025 #MLSecurity #VirginiaCyber

SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea. #AISecurity #MLSecurity #SupplyChainSecurity #Sigstore #SLSA jpmellojr.blogspot.com/2023/11/how-so…

jpmello's tweet image. SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea. #AISecurity #MLSecurity #SupplyChainSecurity #Sigstore #SLSA 
jpmellojr.blogspot.com/2023/11/how-so…

Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized various industries, but they have also brought new challenges in the realm of cybersecurity. #AIcybersecurity #MLsecurity #CyberAI #SecureML #AIthreats #CyberdefenseAI #MLprivacy #AIhacking

tecstaq's tweet image. Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized various industries, but they have also brought new challenges in the realm of cybersecurity. 

#AIcybersecurity #MLsecurity #CyberAI #SecureML #AIthreats #CyberdefenseAI #MLprivacy #AIhacking

Still buzzing from BSides Vilnius 2025 🇱🇹 Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods. Huge thanks to Kajus Šeštokas & the @bsidesvilnius crew! #AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity

chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity
chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity
chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity

Transform your ML development with end-to-end security: ✅ Dedicated VPCs for isolated environments. ✅ IAM policies and private endpoints for secure access. ✅ Protected S3 endpoints for seamless model development. #MLSecurity #SecureVPC #PrivateEndpoints #IAMPolicies

opstreedevops's tweet image. Transform your ML development with end-to-end security:  

✅ Dedicated VPCs for isolated environments.  
✅ IAM policies and private endpoints for secure access.  
✅ Protected S3 endpoints for seamless model development.  

#MLSecurity #SecureVPC #PrivateEndpoints #IAMPolicies

Machine Learning & Deep Learning Security Needs New Perspectives and Incentives Read More:- buff.ly/VfRy4xS #deeplearningsecurity #machinelearning #mlsecurity #TheTechTrend


Are you future-ready? What’s Trending? • Generative AI & LLM Ops Engineer • Vector Database Expert • Cybersecurity, DevOps, Network Security • Cloud Architects & Full Stack Developers • Prompt Engineer • AI Ethicist & Explainability Engineer #MLSecurity #FutureSkills

PradipSKotkar's tweet image. Are you future-ready? What’s Trending?

• Generative AI & LLM Ops Engineer
• Vector Database Expert
• Cybersecurity, DevOps, Network Security
• Cloud Architects & Full Stack Developers
• Prompt Engineer
 • AI Ethicist & Explainability Engineer

#MLSecurity #FutureSkills

🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪 📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course #DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews

darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews

Learn more about AI/ML security challenges from seasoned security researchers, industry experts, and community members. Visit us at booth #2169 at #BHUSA today to attend one of our lightning talks or demos. #AISecurity #MLSecurity #AISPM

ProtectAICorp's tweet image. Learn more about AI/ML security challenges from seasoned security researchers, industry experts, and community members. Visit us at booth #2169 at #BHUSA today to attend one of our lightning talks or demos. 

#AISecurity #MLSecurity #AISPM

📢 New Training Alert: ML for Security and Security for ML- 2 day (Onsite) - By Nikhil Joshi About the trainer: AI Security Researcher, currently working on implementations of ML in offensive + defensive security products. #bsidesbangalore #CyberSecurity #MLSecurity #bsides

bsidesbangalore's tweet image. 📢 New Training Alert: ML for Security and Security for ML- 2 day (Onsite) - By Nikhil Joshi

About the trainer: AI Security Researcher, currently working on implementations of ML in offensive + defensive security products.

#bsidesbangalore #CyberSecurity #MLSecurity #bsides

Keras CVE-2025-49655: Critical Deserialization Flaw A critical deserialization bug in Keras TorchModuleWrapper allows remote code execution. Update ASAP if you use Keras in production. For more details, read ZeroPath's blog on this vuln. #AppSec #MLSecurity #CVE202549655


🔍 Excited to see what @inference_labs has built with DSperse! #MLsecurity #ZeroKnowledge #Inference 🤖 Instead of verifying an entire ML model end-to-end (which is often slow, expensive and impractical), DSperse lets you slice a model into high‐value parts (e.g., a detector or…


Socho, AI ko trick karna ab ek naya game ban gaya hai. 🎮 Adversarial examples defenses AI ko sikhate hain ki inputs ko dhoondhe aur suspicious changes ko reject karein. Jaise ek airport security scanner nakli cheez pakad leta hai! #MLSecurity


Building machine learning models with encrypted data via @AmazonScience #AI #MachineLearning #MLSecurity bit.ly/2XtWUZu

bernardleong's tweet image. Building machine learning models with encrypted data via @AmazonScience #AI #MachineLearning #MLSecurity  bit.ly/2XtWUZu

𝗠𝗟 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗮𝗿𝗲 𝗟𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗼 𝗩𝗶𝘀𝘂𝗮𝗹 𝗗𝗮𝘁𝗮! 𝗪𝗵𝗮𝘁 𝗪𝗲𝗻𝘁 𝗪𝗿𝗼𝗻𝗴? zcu.io/LN2r #MLSecurity #MLSecurityResearchers #AdversarialAttacks #MachineLearning #AdversarialMachineLearning #AINews #AnalyticsInsightMagazine

analyticsinme's tweet image. 𝗠𝗟 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵 𝗮𝗿𝗲 𝗟𝗶𝗺𝗶𝘁𝗲𝗱 𝘁𝗼 𝗩𝗶𝘀𝘂𝗮𝗹 𝗗𝗮𝘁𝗮! 𝗪𝗵𝗮𝘁 𝗪𝗲𝗻𝘁 𝗪𝗿𝗼𝗻𝗴?
zcu.io/LN2r
#MLSecurity #MLSecurityResearchers #AdversarialAttacks #MachineLearning #AdversarialMachineLearning #AINews #AnalyticsInsightMagazine

Launching the session was Li et al.'s "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization," showing a novel solution tackling data heterogeneity and Byzantine threats. (acsac.org/2024/program/f…) 2/6 #MLSecurity #CyberSecurity #AI

ACSAC_Conf's tweet image. Launching the session was Li et al.'s "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization," showing a novel solution tackling data heterogeneity and Byzantine threats. (acsac.org/2024/program/f…) 2/6
#MLSecurity #CyberSecurity #AI

Winding up ‘ML for Security and Security for ML’ with Nikhil Joshi! A fascinating workshop exploring the intersection of machine learning and security. Big takeaways for all! #MLSecurity #TechInnovation #c0c0n2024

_c0c0n_'s tweet image. Winding up ‘ML for Security and Security for ML’ with Nikhil Joshi! A fascinating workshop exploring the intersection of machine learning and security. Big takeaways for all!
 #MLSecurity #TechInnovation #c0c0n2024

AI agent + connectors = Identity. Close the security gap (no visibility/permissions) with SUPERWISE®: Identity per Agent, Logs, & Auto-remediation. Full Breakdown: hubs.li/Q03MJWGF0 Start for FREE: hubs.li/Q03MJYpZ0 #MLSecurity #IdentityManagement #ZeroTrust #SecOps

SuperwiseAI's tweet image. AI agent + connectors = Identity.
Close the security gap (no visibility/permissions) with SUPERWISE®: Identity per Agent, Logs, & Auto-remediation.

Full Breakdown: hubs.li/Q03MJWGF0
Start for FREE: hubs.li/Q03MJYpZ0

#MLSecurity #IdentityManagement #ZeroTrust #SecOps

Hosting a private PyPI server for Amazon SageMaker Studio notebooks in a VPC via @AWSCloud #AI #MachineLearning #MLSecurity amzn.to/2XAR08Y

bernardleong's tweet image. Hosting a private PyPI server for Amazon SageMaker Studio notebooks in a VPC via @AWSCloud #AI #MachineLearning #MLSecurity  amzn.to/2XAR08Y

Day 16: AI is the new target. 🎯 Protect your models from data poisoning and adversarial attacks. Secure your AI, secure your future. Stay one step ahead: certping.com | seaionl.com #AISecurity #Cybersecurity #MLSecurity #AdversarialAI #CertPing

certping's tweet image. Day 16: AI is the new target. 🎯

Protect your models from data poisoning and adversarial attacks. Secure your AI, secure your future.

Stay one step ahead: certping.com | seaionl.com

#AISecurity #Cybersecurity #MLSecurity #AdversarialAI #CertPing

Are you future-ready? What’s Trending? • Generative AI & LLM Ops Engineer • Vector Database Expert • Cybersecurity, DevOps, Network Security • Cloud Architects & Full Stack Developers • Prompt Engineer • AI Ethicist & Explainability Engineer #MLSecurity #FutureSkills

PradipSKotkar's tweet image. Are you future-ready? What’s Trending?

• Generative AI & LLM Ops Engineer
• Vector Database Expert
• Cybersecurity, DevOps, Network Security
• Cloud Architects & Full Stack Developers
• Prompt Engineer
 • AI Ethicist & Explainability Engineer

#MLSecurity #FutureSkills

@kaseyo23, Senior MLOps Engineer, shares practical examples of "Flawed #MLSecurity," to the "OWASP Top 10", to showcase critical strategies for mitigating risks, including #RBAC, #dataencryption & best practices to fortify your #ML systems: shorturl.at/iTV37 #QConLondon

qconlondon's tweet image. @kaseyo23, Senior MLOps Engineer, shares practical examples of "Flawed #MLSecurity," to the "OWASP Top 10", to showcase critical strategies for mitigating risks, including #RBAC, #dataencryption & best practices to fortify your #ML systems: shorturl.at/iTV37

#QConLondon
qconlondon's tweet image. @kaseyo23, Senior MLOps Engineer, shares practical examples of "Flawed #MLSecurity," to the "OWASP Top 10", to showcase critical strategies for mitigating risks, including #RBAC, #dataencryption & best practices to fortify your #ML systems: shorturl.at/iTV37

#QConLondon
qconlondon's tweet image. @kaseyo23, Senior MLOps Engineer, shares practical examples of "Flawed #MLSecurity," to the "OWASP Top 10", to showcase critical strategies for mitigating risks, including #RBAC, #dataencryption & best practices to fortify your #ML systems: shorturl.at/iTV37

#QConLondon

Want to enhance the security of your ML models? Check out how Malware Scanning in Defender for Storage ensures the integrity of your training data. bit.ly/477gZHp #MLsecurity #dataprotection

WirelessLife's tweet image. Want to enhance the security of your ML models? Check out how Malware Scanning in Defender for Storage ensures the integrity of your training data. bit.ly/477gZHp  #MLsecurity #dataprotection

Transform your ML development with end-to-end security: ✅ Dedicated VPCs for isolated environments. ✅ IAM policies and private endpoints for secure access. ✅ Protected S3 endpoints for seamless model development. #MLSecurity #SecureVPC #PrivateEndpoints #IAMPolicies

opstreedevops's tweet image. Transform your ML development with end-to-end security:  

✅ Dedicated VPCs for isolated environments.  
✅ IAM policies and private endpoints for secure access.  
✅ Protected S3 endpoints for seamless model development.  

#MLSecurity #SecureVPC #PrivateEndpoints #IAMPolicies

Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized various industries, but they have also brought new challenges in the realm of cybersecurity. #AIcybersecurity #MLsecurity #CyberAI #SecureML #AIthreats #CyberdefenseAI #MLprivacy #AIhacking

tecstaq's tweet image. Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized various industries, but they have also brought new challenges in the realm of cybersecurity. 

#AIcybersecurity #MLsecurity #CyberAI #SecureML #AIthreats #CyberdefenseAI #MLprivacy #AIhacking

Happening this Thursday at the Commonwealth of Virginia Information Security Conference: 🥒 Evil Pickles & Machine Learning: What Could Go Wrong? Learn more: bit.ly/4m5hTuZ #COVIS2025 #MLSecurity #VirginiaCyber

ReversingLabs's tweet image. Happening this Thursday at the Commonwealth of Virginia Information Security Conference: 🥒 Evil Pickles & Machine Learning: What Could Go Wrong? Learn more: bit.ly/4m5hTuZ #COVIS2025 #MLSecurity #VirginiaCyber

SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea. #AISecurity #MLSecurity #SupplyChainSecurity #Sigstore #SLSA jpmellojr.blogspot.com/2023/11/how-so…

jpmello's tweet image. SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea. #AISecurity #MLSecurity #SupplyChainSecurity #Sigstore #SLSA 
jpmellojr.blogspot.com/2023/11/how-so…

Still buzzing from BSides Vilnius 2025 🇱🇹 Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods. Huge thanks to Kajus Šeštokas & the @bsidesvilnius crew! #AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity

chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity
chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity
chenhshiri's tweet image. Still buzzing from BSides Vilnius 2025 🇱🇹
Presented “The Multiverse of Madness: Adversarial Attacks on AI” – 2 new black-box AI attack methods.
Huge thanks to Kajus Šeštokas & the @bsidesvilnius  crew!
#AI #MLSecurity #BSidesVilnius #SecurityResearch #CyberSecurity

📢 New Training Alert: ML for Security and Security for ML- 2 day (Onsite) - By Nikhil Joshi About the trainer: AI Security Researcher, currently working on implementations of ML in offensive + defensive security products. #bsidesbangalore #CyberSecurity #MLSecurity #bsides

bsidesbangalore's tweet image. 📢 New Training Alert: ML for Security and Security for ML- 2 day (Onsite) - By Nikhil Joshi

About the trainer: AI Security Researcher, currently working on implementations of ML in offensive + defensive security products.

#bsidesbangalore #CyberSecurity #MLSecurity #bsides

Our seminar this week (Wed 3pm UK time) is by @RoeiSchuster of @cornell_tech on Resilient #MachineLearning: A Systems #Security Perspective. Abstract, online attendance info at uk-sps.org/seminar/tba-ro… #MLSecurity #SystemsSecurity #DataPoisoning #deanonymisation

UKSPSeminars's tweet image. Our seminar this week (Wed 3pm UK time) is by @RoeiSchuster of @cornell_tech on Resilient #MachineLearning: A Systems #Security Perspective. 

Abstract, online attendance info at uk-sps.org/seminar/tba-ro…

#MLSecurity #SystemsSecurity #DataPoisoning #deanonymisation

🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪 📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course #DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews

darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews
darkrelaylabs's tweet image. 🧪 Data Poisoning Attacks: Corrupting AI from Within 🧪  

📲 WhatsApp us at +91 78970 01576 for a custom quote on our LLM Security Course 

#DataPoisoning #CyberSecurity #MLSecurity #InfoSec #ThreatDetection #InfoNews

Machine Learning strengthens IT security through real-time learning and pattern detection. #BigdeeSolutions #MLSecurity #AICyberDefense

BigdeeSolutions's tweet image. Machine Learning strengthens IT security through real-time learning and pattern detection.
#BigdeeSolutions #MLSecurity #AICyberDefense

Learn more about AI/ML security challenges from seasoned security researchers, industry experts, and community members. Visit us at booth #2169 at #BHUSA today to attend one of our lightning talks or demos. #AISecurity #MLSecurity #AISPM

ProtectAICorp's tweet image. Learn more about AI/ML security challenges from seasoned security researchers, industry experts, and community members. Visit us at booth #2169 at #BHUSA today to attend one of our lightning talks or demos. 

#AISecurity #MLSecurity #AISPM

Loading...

Something went wrong.


Something went wrong.


United States Trends