• Posts
  • Categories

AI security and threats

Artificial Intelligence(AI) and Machine Learning Models bring with them a range of new challenges and security concerns. From the creation of realistic deepfakes to vulnerabilities like prompt injection and the use of Shadow AI systems inside an organization.

9 minute read

Main Security Models - Overview

This article provides a comprehensive overview of three foundational security models: Bell-LaPadula, Biba, and Clark-Wilson.

5 minute read

Digital Forensics and Incident Response (DFIR) - Introduction

DFIR stands for **Digital Forensics and Incident Response**. This field covers the collection of forensic artifacts from digital devices such as computers, media devices, and smartphones to investigate an incident.

5 minute read

Ethereum NFT Standards: ERC-721, ERC-1155, ERC-6551, and More

Non-Fungible Tokens (NFTs) enable unique, verifiable ownership of digital and real-world items on the blockchain. While ERC-721 remains the main standard to represent NFTs on Ethereum and EVM blockchains, several other standards (ERC-1155, ERC-2981, ERC-4907,...) have emerged to meet various use cases and improve functionality.

55 minute read

Transformers - Attention is All You Need

Introduced in 2017 in the paper Attention is All You Need, transformers address the limitations of earlier architectures by leveraging a self-attention mechanism to process sequential and structured data more effectively.

6 minute read

Chainlink DECO, zkTLS oracle

DECO is a zkTLS-oracle made by Chainlink for authenticating and verifying web data in a privacy-preserving manner.

5 minute read