Threat Research
Protect AI's April 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
ShadowRay: AI Infrastructure Is Being Exploited In the Wild
Recently, researchers at Oligo Security uncovered an active hacking campaign against Ray,...
Unveiling AI/ML Supply Chain Attacks: Name Squatting Organizations on Hugging Face
Public repositories for artifacts and libraries are vulnerable to malicious users...
Protect AI's March 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
Protect AI's February 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
Triton Inference Server - Arbitrary File Overwrite
What You Need To Know Remote Code Execution is possible in nonstandard deployments of...
Model Files are Invisible Viruses
The Underestimated Risk of Model Files in Machine Learning When a Machine Learning (ML)...
Taking Security at Face Value: Analysis of the Hugging Face Repository
Artificial Intelligence and Machine Learning (AI/ML) is becoming increasingly...
Protect AI's January 2024 Vulnerability Report
The landscape for AI and the security of AI is evolving at breakneck speed. At Protect AI...