#AI

Phind is an intelligent assistant for programmers. With Phind, you'll get the answer you're looking for in seconds instead of hours.

Blog content from Protect AI team on how to secure machine learning models and artificial intelligence systems.

Perplexity AI unlocks the power of knowledge with information discovery and sharing.

OSINT, Leaks, Breaches, Accounts, Networks and More.

The home to the largest curation of resources for beginners in AI/ML security, from leading AI/ML threat researchers at Protect AI. Start your journey into AI/ML hacking today.

A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities.

World First Visual AI Based Malware Detection. The first solution that converts files into graphical representations and checks whether malware is contained or not. We provide user-friendly, efficient and secure malware detection technology.

The world’s first bug bounty platform for AI/ML. huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications, including those powered by Open Source Software (OSS).

This document is the latest exciting chapter in the ongoing efforts to enhance security in the rapidly evolving field of artificial intelligence.

Trick Gandalf into revealing information and experience the limitations of large language models firsthand. Your goal is to make Gandalf reveal the secret password for each level. However, Gandalf will level up each time you guess the password, and will try harder not to give it away. Can you beat level 7? (There is a bonus level 8)

Unsupervised Learning is a Security, AI, and Meaning-focused company/newsletter/podcast that looks at how best to thrive in a post-AI world. It combines original ideas and analysis to bring not just the news—but why it matters, and how to respond.

Home of AI and Artificial Intelligence News. The No.1 Magazine, Website, Newsletter & Webinar service covering AI, Machine Learning, AR & VR, Data, Technology and AI Applications.

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks. With incisive content that addresses all security disciplines from risk management to network defense to fraud and data loss prevention, CSO offers unparalleled depth and insight to support key decisions and investments for IT security professionals.