Real-world Attacks on LLM Applications

Поделиться
HTML-код
  • Опубликовано: 29 окт 2024

Комментарии • 10

  • @VulnerableU
    @VulnerableU 3 месяца назад +1

    This is awesome. Thanks!

  • @arac4nia
    @arac4nia 3 месяца назад

    Nice job G! Great video

  • @cloudsecuritybootcamp
    @cloudsecuritybootcamp 3 месяца назад

    This is cool info - thank you for sharing!

  • @gabrielketzer7084
    @gabrielketzer7084 3 месяца назад

    This is a fascinating video, big thanks

  • @gurukinnal8256
    @gurukinnal8256 29 дней назад

    Such a great video. I have some queries. Can you please tell me how can I connect with you?

    • @NetsecExplained
      @NetsecExplained  27 дней назад

      We can message on here. What are your queries?

  • @sagard17
    @sagard17 2 месяца назад

    do you have any fiction book recommendations that is based on genAI, deep fake tech ?

    • @NetsecExplained
      @NetsecExplained  2 месяца назад

      I recommend the Sprawl Trilogy by William Gibson: Neuromancer, Count Zero, Mona Lisa Overdrive. You'll really like the way they used limiters on the AI systems to stop them from trying to take over the world. That and the "subluminal" that one of the characters use to manipulate the others. Think deepfakes irl.

  • @VulnNi
    @VulnNi 3 месяца назад

    I just completed my graduation in AI/ML and I've been looking at this LLM pentesting for a while , this video really does provide a lot of stuff about it...

    • @NetsecExplained
      @NetsecExplained  3 месяца назад

      Glad this helps. If you're looking for doing actual AI/ML red teaming, there's a fantastic guide by Will Pearce on Nvidia's blog you should check out.