Eoin Wickens

Research 02.21.2024
February 21, 2024
Summary In this blog, we show how an attacker could compromise the Hugging Face Safetensors conversion space and its associated...
Hugging Face Malicious models Safetensors
Research 06.15.2023
June 15, 2023
Today, many Cloud Service Providers (CSPs) offer bespoke services designed for Artificial Intelligence solutions. These services...
Cloud Services Cybersecurity
Research 03.24.2023
March 24, 2023
In the first part of this article, we’ve talked about security and privacy risks associated with the use of large language...
Cybersecurity
Research 03.23.2023
March 23, 2023
Introduction Just like how the Internet dramatically changed the way we access information and connect with each other, AI...
Cybersecurity
Research 02.14.2023
February 14, 2023
Over the past few months, HiddenLayer’s SAI team has investigated several machine learning models that have been hijacked...
Adversarial Machine Learning Cybersecurity Model Hijacking
Research 01.17.2023
January 17, 2023
In a Nutshell: For many security practitioners, hearing the term ‘supply chain attack’ may still bring on a pang of discomfort...
Adversarial Machine Learning Cybersecurity Supply Chain
Research 12.20.2022
December 20, 2022
Introduction In our previous blog post, “Weaponizing Machine Learning Models with Ransomware”, we uncovered how malware...
Adversarial Machine Learning Cybersecurity Education
Research 12.06.2022
December 6, 2022
Introduction In our latest blog installment, we’re going to investigate something a little different. Most of our posts...
Adversarial Machine Learning Adversary Lifecycle Cybersecurity
Research 10.25.2022
October 25, 2022
In previous articles, we’ve discussed the ubiquity of AI-based systems and the risks they’re facing; we’ve also described...
Adversarial Machine Learning Cybersecurity
Research 10.04.2022
October 4, 2022
Unpacking the Adversarial Toolkit More often than not, it’s the creation of a new class of tool, or weapon, that acts as...
Adversarial Machine Learning Cybersecurity Open Source Software