Normal view
Getting Started with AI Hacking: Part 1
![]()
You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT to help automate attacks. We also covered the dangers of [β¦]
The post Getting Started with AI Hacking: Part 1 appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain
Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain
![]()
RAG connects pre-trained LLMs with current data sources. Moreover, a RAG system can use many data sources.
The post Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)Β
Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)Β
![]()
Many people have heard of ChatGPT, Gemini, Bart, Claude, Llama, or other artificial intelligence (AI) assistants at this point. These are all implementations of what are known as large language [β¦]
The post Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs)Β appeared first on Black Hills Information Security, Inc..