Reading view
Getting Started with AI Hacking: Part 1

You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT to help automate attacks. We also covered the dangers of [β¦]
The post Getting Started with AI Hacking: Part 1 appeared first on Black Hills Information Security, Inc..
Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain

RAG connects pre-trained LLMs with current data sources. Moreover, a RAG system can use many data sources.
The post Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain appeared first on Black Hills Information Security, Inc..
Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)Β

Many people have heard of ChatGPT, Gemini, Bart, Claude, Llama, or other artificial intelligence (AI) assistants at this point. These are all implementations of what are known as large language [β¦]
The post Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)Β appeared first on Black Hills Information Security, Inc..