Research

Articles

Evasion: Misalignment

Intro The fear of an evil Artificial Intelligence capable of world domination is a fascinating. It has been the theme of many works of fiction, but as AI becomes more complex and increasingly difficult for humans to fully understand them, a...
Read More

Abuse: Prompt Injection

Generative AI is everywhere. It has become so widespread that it is present on virtually every industry and its adoption is still growing and we are already seeing LLMs being used in mass. Software companies are introducing them as a production multipliers. Doctors use them to summarize information
Read More

Privacy: Membership Inference Attacks

AI models are continually advancing their ability to detect patterns becoming increasingly more complex. As AIs are trained on more and more sensitive datasets, it becomes essential to ensure that these models are privacy oriented.
Read More

Privacy: Model Inversion

AI’s ability to learn from vast datasets is its greatest strength but this capability can be turned against it and exposing private information is a reality even for the more complex models. Lets explore the mechanics of Model Inversion (MI) attacks, their methods, and strategies to mitigate them.
Read More

Evasion: Adversarial Patching

AI's learn to identify patterns in data but, just because they can identify something like we do, that doesn't mean they do it in the same way as us. They might see patterns we do not or might take shortcuts we don't expect.
Read More

Poisoning: Supply Chain Attacks

Researchers uncovered more than 100 malicious AI Models on the popular and open-source AI platform, Hugging Face. Many of these were made possible using Supply Chain Attacks. But what is thesupply chain? It's all of the external parts that an organization relies on to operate.
Read More

Poisoning: Data Poisoning

Nowadays, most AI and Machine Learning algorithms leverage large amounts of data which can be purchased, collected or sourced online. This data is known as the Training Dataset and it enables the model to learn patterns and relationships within the data. By doing so, the model can make predictions o
Read More

Poisoning: Model Poisoning

Sometimes you want to train or use an AI without having all the work and cost of training it from scratch. In these cases it's common to reach for an open source model. Sites like Hugging Face allow people to share models and datasets without being dependent on just those used by the monolithic corp
Read More

ServicesWe can help prevent:

  • Data Poisoning
  • Model Poisoning
  • Supply Chain Attacks
  • Prompt Injection
  • Misalignment
  • Model Skewing
  • Model Inversion
  • Implementation Issues
  • Membership Inference Attacks
  • Sensitive Information Disclosure


It’s crucial to be proactive


Especially in cyber-security, since anticipating threats before they happen will save your company millions in losses and protect your most valuable assets.

Let us  help your business with staying ahead of ever-evolving cyber threats.


Location: Undisclosed

Learn more about our services

Complete the form to get in touch, and we’ll show you how Blindsight can strengthen your AI system.
Please enable JavaScript in your browser to complete this form.