Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

AI model exploitation

  • Home
  • AI model exploitation
From Schneier on Security – A Taxonomy of Adversarial Machine Learning Attacks and Mitigations
Posted inArticles

From Schneier on Security – A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

 NIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures. Read More    
Posted by Samir K March 27, 2025
From Security Week – New CCA Jailbreak Method Works Against Most AI Models
Posted inNews

From Security Week – New CCA Jailbreak Method Works Against Most AI Models

[[{"value":"Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems. The post New CCA Jailbreak Method Works Against Most AI Models appeared…
Posted by shaikh Saqib March 14, 2025
From Dark Reading – Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities
Posted inNews

From Dark Reading – Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities

Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities. Read More  
Posted by shaikh Saqib February 14, 2025
From Dark Reading – LLM Hijackers Quickly Incorporate DeepSeek API Keys
Posted inNews

From Dark Reading – LLM Hijackers Quickly Incorporate DeepSeek API Keys

The secret use of other people's generative AI platforms, wherein hijackers gain unauthorized access to an LLM while someone else foots the bill, is getting quicker and stealthier by the…
Posted by shaikh Saqib February 8, 2025
From Cyber Security News – Developers Beware! Malicious ML Models Detected on Hugging Face Platform
Posted inNews

From Cyber Security News – Developers Beware! Malicious ML Models Detected on Hugging Face Platform

 In a concerning development for the machine learning community, researchers at ReversingLabs have identified malicious models on the popular Hugging Face platform. These models exploit vulnerabilities in the Pickle file…
Posted by shaikh Saqib February 7, 2025

Latest Posts

  • From The Hacker News – cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch NowMay 9, 2026
  • From The Hacker News – cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch NowMay 9, 2026
  • From Cyber Security News – TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm ModulesMay 9, 2026
  • From Cyber Security News – NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce UsersMay 9, 2026
  • From Cyber Security News – Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate IncidentMay 9, 2026
Total Visitors
1504748

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top