Convolutional neural networks are very important in machine learning. If you want to do computer vision or image recognition tasks, you simply can’t go without them. But it can be hard to understand how they work. In this post, we will talk about the mechanisms behind…
Summary:This article provides an overview of different evasion techniques used to bypass security measures in software or tools. Key takeaways: Counter arguments: Introduction Signature-based Detection bypasses are a simple way to attempt to evade detection from antivirus and endpoint security software, relying on a signature…
The task of building a Natural Language Processing (NLP) text summarizer in one night from scratch is a challenging but rewarding endeavor. This project aims to demonstrate the feasibility of quickly creating a basic NLP summarization tool, using various NLP techniques and algorithms. The summarizer…
I was on an engagement where I simply could not elevate privileges, so I had to become creative and look deep into my old bucket (bucket being my head) of knowledge, and this resulted in some fun stuff. I had found that the client had…
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some vulnerability in Chromium Javascript engine v8. At the same time, the regression test case regress-1196683.js for this bugfix was also submitted. Based on this regression test case, some…
AWS Startup Security Baseline (AWS SSB) The Amazon Web Services (AWS) Startup Security Baseline (SSB) is a set of controls that create a minimum foundation for businesses to build securely on AWS without decreasing their agility. The controls in this guide are designed with early…