PinnedaputunnCase Study: The Uber HackIn this section, we explore a cyberattack experienced by the company Uber. As in the previous case study, we will analyze the methods…9 min read·Oct 1, 2023----
aputunnBackdoor Attacks and Defense on a Neural NetworkIn this part, we are going to explore backdoor attacks and defenses. We will train clean and backdoored models using the CIFAR-10 dataset…12 min read·May 2, 2024----
aputunnZero Trust EssentialsAlmost every security strategy or measure essentially aims at data protection. While organizations use various security processes and tools…3 min read·Apr 26, 2024----
aputunnEvasion Attacks on a Neural NetworkThe task involves conducting two evasion attacks on a Machine Learning model. Initially, we train our model using the CIFAR-10 dataset…4 min read·Apr 14, 2024----
aputunnCurrent State of the Next-Generation FirewallsThe NSS Labs 2018 Security Report, dated July 17, 2018, analyzes the performance of leading Next Generation Firewalls (NGFWs) from…1 min read·Jan 21, 2024----
aputunnIs it …? The Digital Tides of Our MindsThe idea of mind-uploading presents a revolutionary yet contentious idea: the digitization of human consciousness. Tracing back to the…4 min read·Jan 14, 2024----
aputunnVulnhub: Troll1 Part IIWe’ll now attempt to access the target machine, following up on our brute-force search for valid credentials.3 min read·Jan 7, 2024----
aputunnVulnhub: Troll1 Part ICapture the Flag (CTF) Challenge | Type: boot2root5 min read·Jan 6, 2024----
aputunnGoogle’s BeyondCorpBeyondCorp is Google’s implementation of the Zero Trust model [166], with the goal to enable all Google employees to work efficiently on a…8 min read·Dec 23, 2023----