SUBMIT REPORT
By logging in you agree to our terms of service.
In this blog, we’re breaking down one of our example Model File Vulnerabilities (MFVs) to...
In this blog, we're breaking down one of our example Model File Vulnerabilities (MFVs) to...
What’s the secret sauce behind consistent bug bounty success? Well, the answer lies in a...
Hey huntrs, Marcello Salvati here, threat researcher at Protect AI. I’m here to give you...
Introduction Let's talk about an often overlooked attack surface in AI systems: model...
Introduction You know what’s better than just using AI/ML systems? Breaking...
Your Path to Your First CVE Begins Here Ready to bag your first CVE with Vulnhuntr? This...
Introduction As machine learning continues to rise in prominence, so does the need for...
Introduction As AI and machine learning models become more embedded in modern...
Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers...