LLMNR poisoning attack detection
Welcome to part two of a special series on detecting Active Directory attacks & misconfigurations. Each blog post dives deep into […]
Read More →Welcome to part two of a special series on detecting Active Directory attacks & misconfigurations. Each blog post dives deep into […]
Read More →A new tool makes it easier for database users to perform complicated statistical analyses of tabular data without the need to […]
Read More →We celebrated our third R&D Meetup at Hack The Box (HTB) from the 1st-5th of July! Our goal apart from team […]
Read More →Capture The Flag (CTF) events are a fun, gamified, and engaging way to test your team’s mettle against technical cybersecurity challenges. […]
Read More →You’ve likely heard that a picture is worth a thousand words, but can a large language model (LLM) get the picture […]
Read More →Imagine driving through a tunnel in an autonomous vehicle, but unbeknownst to you, a crash has stopped traffic up ahead. Normally, […]
Read More →When the Takeda Pharmaceutical Co. and the MIT School of Engineering launched their collaboration focused on artificial intelligence in health care […]
Read More →The impact of artificial intelligence will never be equitable if there’s only one company that builds and controls the models (not […]
Read More →A few years ago, Gevorg Grigoryan PhD ’07, then a professor at Dartmouth College, had been pondering an idea for data-driven […]
Read More →The last anomaly to escape its enclosure is shuttered by a massive blast door, as you’ve managed to bring Haymaker back […]
Read More →CISOs wear many hats, including managing the company’s cybersecurity-related Governance, Risk, and Compliance (GRC) program. However, as cybersecurity and data protection […]
Read More →Someday, you may want your home robot to carry a load of dirty clothes downstairs and deposit them in the washing […]
Read More →Digital technologies, such as smartphones and machine learning, have revolutionized education. At the McGovern Institute for Brain Research’s 2024 Spring Symposium, […]
Read More →Large language models like those that power ChatGPT have shown impressive performance on tasks like drafting legal briefs, analyzing the sentiment […]
Read More →The use of AI to streamline drug discovery is exploding. Researchers are deploying machine-learning models to help them identify molecules, among […]
Read More →As part of Hack The Box’s (HTB) mission to provide our community with relevant content and stay on top of up-and-coming […]
Read More →What is the MITRE ATT&CK framework? The MITRE ATT&CK framework is a knowledge base of cyber attacks based on real-world attack […]
Read More →Cybersecurity is an industry that is often shrouded in mystery. But what is it really like for those of us working […]
Read More →Step into the vibrant world of the Humans of HTB (HoH), your behind-the-scenes glimpse into the growth of our talented team […]
Read More →Imagine a world in which some important decision — a judge’s sentencing recommendation, a child’s treatment protocol, which person or business […]
Read More →Boosting the performance of solar cells, transistors, LEDs, and batteries will require better electronic materials, made from novel compositions that have […]
Read More →Mark Hamilton, an MIT PhD student in electrical engineering and computer science and affiliate of MIT’s Computer Science and Artificial Intelligence […]
Read More →Climate models are a key technology in predicting the impacts of climate change. By running simulations of the Earth’s climate, scientists […]
Read More →Amazon Web Services (AWS) has established itself as a reliable cloud computing service provider, serving millions of customers across different industries. […]
Read More →When robots come across unfamiliar objects, they struggle to account for a simple truth: Appearances aren’t everything. They may attempt to […]
Read More →When Tomás Vega SM ’19 was 5 years old, he began to stutter. The experience gave him an appreciation for the adversity […]
Read More →Having worked for over 13 years in information security consulting, I’ve had my fair share of experience hiring and being involved […]
Read More →Black Hat USA is returning to Las Vegas on August 7 and 8, and so is the Hack The Box team. […]
Read More →Investing time and separating reality from fiction is critical to preparing for threats and dealing with a common feeling of uncertainty […]
Read More →Are you planning to appear for the AWS Cloud Practitioner Certification in 2023? Looking for some guidance in the right direction? Well, […]
Read More →Since the birth of cloud computing, virtualization has become a common practice in IT. It creates virtual versions of physical items […]
Read More →What is CVE-2021-4177? CVE-2021-41772 is a path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49. It was reported by […]
Read More →Welcome to part two of a special series on detecting Active Directory attacks & misconfigurations. Each blog post dives deep into […]
Read More →Forging a path to sit on the board as a Chief Information Security Officer (CISO) can be a long-term goal for […]
Read More →Cloud computing is changing faster than we ever imagined. Every day, new features and capabilities have been released that change how […]
Read More →