Tom Bonner

Research 06.15.2023
June 15, 2023
Today, many Cloud Service Providers (CSPs) offer bespoke services designed for Artificial Intelligence solutions. These services...
Cloud Services Cybersecurity
Research 05.09.2023
May 9, 2023
Introduction Throughout our previous blogs investigating the threats surrounding machine learning model storage formats,...
Adversarial Machine Learning Cybersecurity Keras
Research 02.14.2023
February 14, 2023
Over the past few months, HiddenLayer’s SAI team has investigated several machine learning models that have been hijacked...
Adversarial Machine Learning Cybersecurity Model Hijacking
Research 12.20.2022
December 20, 2022
Introduction In our previous blog post, “Weaponizing Machine Learning Models with Ransomware”, we uncovered how malware...
Adversarial Machine Learning Cybersecurity Education
Research 12.06.2022
December 6, 2022
Introduction In our latest blog installment, we’re going to investigate something a little different. Most of our posts...
Adversarial Machine Learning Adversary Lifecycle Cybersecurity
Research 10.25.2022
October 25, 2022
In previous articles, we’ve discussed the ubiquity of AI-based systems and the risks they’re facing; we’ve also described...
Adversarial Machine Learning Cybersecurity
Research 08.23.2022
August 23, 2022
Attacks on Machine Learning – Explained Introduction Previously, we discussed the emerging field of adversarial machine...
Adversarial Machine Learning Tactics Techniques
Research 08.23.2022
August 23, 2022
It is my great pleasure to announce the formation of HiddenLayer’s Synaptic Adversarial Intelligence team, SAI. First and...
Cybersecurity
Research 07.18.2022
July 18, 2022
Beware the Adversarial Pickle Summary In this blog, we look at the increasing societal dependence on machine learning and...
Adversarial Machine Learning Cybersecurity Education
Research 07.18.2022
July 18, 2022
Your Attack Surface Just Got a Whole Lot Bigger Summary Understanding and mitigating security risks in machine learning (ML)...
Adversarial Machine Learning Adversary Lifecycle Cybersecurity