SUBMIT REPORT
By logging in you agree to our terms of service.
The ability to save (serialize) and load (deserialize) trained models is fundamental to...
Introduction Some researchers dip their toes into AI/ML security. Phung Van Tai (aka...
Introduction Some Ph.D. candidates stay up late fine-tuning models. Tong Liu (aka...
Many ML model files— .nemo, .keras, .gguf, even trusty .pth— are just zip/tar archives in...
Before Google even filed CVE-2025-1550, one of our Huntr researchers, Mevlüt Akçam (aka...
Introduction Some people skipped online classes during lockdown to binge Netflix. Arun...
Sometimes the simplest bugs are the most dangerous — especially when they’ve been hiding...
In this blog, we’re breaking down one of our example Model File Vulnerabilities (MFVs) to...
In this blog, we're breaking down one of our example Model File Vulnerabilities (MFVs) to...
What’s the secret sauce behind consistent bug bounty success? Well, the answer lies in a...