Threat Research
Red Team Tools Release
Security researchers on our AI bug bounty platform Huntr are finding impactful new...
Protect AI's April 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
ShadowRay: AI Infrastructure Is Being Exploited In the Wild
Recently, researchers at Oligo Security uncovered an active hacking campaign against Ray,...
Unveiling AI/ML Supply Chain Attacks: Name Squatting Organizations on Hugging Face
Public repositories for artifacts and libraries are vulnerable to malicious users...
Protect AI's March 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
Protect AI's February 2024 Vulnerability Report
At Protect AI we are taking a proactive approach to identifying and addressing security...
Triton Inference Server - Arbitrary File Overwrite
What You Need To Know Remote Code Execution is possible in nonstandard deployments of...
Model Files are Invisible Viruses
The Underestimated Risk of Model Files in Machine Learning When a Machine Learning (ML)...