Real-world Attacks on LLM Applications

Поділитися
Вставка
  • Опубліковано 16 лис 2024

КОМЕНТАРІ • 10

  • @VulnerableU
    @VulnerableU 3 місяці тому +1

    This is awesome. Thanks!

  • @gabrielketzer7084
    @gabrielketzer7084 3 місяці тому

    This is a fascinating video, big thanks

  • @arac4nia
    @arac4nia 3 місяці тому

    Nice job G! Great video

  • @cloudsecuritybootcamp
    @cloudsecuritybootcamp 3 місяці тому

    This is cool info - thank you for sharing!

  • @gurukinnal8256
    @gurukinnal8256 Місяць тому

    Such a great video. I have some queries. Can you please tell me how can I connect with you?

    • @NetsecExplained
      @NetsecExplained  Місяць тому

      We can message on here. What are your queries?

  • @sagard17
    @sagard17 2 місяці тому

    do you have any fiction book recommendations that is based on genAI, deep fake tech ?

    • @NetsecExplained
      @NetsecExplained  2 місяці тому

      I recommend the Sprawl Trilogy by William Gibson: Neuromancer, Count Zero, Mona Lisa Overdrive. You'll really like the way they used limiters on the AI systems to stop them from trying to take over the world. That and the "subluminal" that one of the characters use to manipulate the others. Think deepfakes irl.

  • @VulnNi
    @VulnNi 3 місяці тому

    I just completed my graduation in AI/ML and I've been looking at this LLM pentesting for a while , this video really does provide a lot of stuff about it...

    • @NetsecExplained
      @NetsecExplained  3 місяці тому

      Glad this helps. If you're looking for doing actual AI/ML red teaming, there's a fantastic guide by Will Pearce on Nvidia's blog you should check out.