Posts

AI Security & RAG Architectures - How do we secure AI Systems?

Image
Hola everyone, I´m Diego from diegowritesa.blog After taking all SANS AI courses, SEC495 , SEC545 & SEC595 - I felt like sharing some of my thoughts on how security fits into the AI world, and why it’s so important to consider from the very beginning. You can find me on  L inkedin  &  T witter  - These blogs take quite a bit of time to put together, and they’re all just meant to share knowledge. Any comments, requests, or connections are always much appreciated — love you all! ❤️ As last time, do not worry, I will leave a link to my  GitHub  at the very end under "References & More Useful Information" so you can copy everything if you’d like. Today, we’re talking about securing RAG AI architectures — whether on-prem or in the cloud. ----------------------------------------------------------------------------------------------------------------------------- Executive Summary " How do we secure RAG AI Systems? Either local or cloud/managed ar...

Unsupervised Machine Learning for Detection Engineering

Image
Hola everyone, I´m Diego from diegowritesa.blog Before I start -  since my last post got quite a lot of traction and some people tried claiming it as their own work. You can find me on L inkedin & T witter  - you can imagine these blogs take quite a bit of time to make, and is all simply to share some knowledge, any comments, requests, connections are much appreciated everyone! Love you all! ❤️ As last time, do not worry, I will leave a link to my  GitHub  at the very end under "References & More Useful Information" so you can copy everything if you want. If you are asking yourself, but Diego, why are you not posting about AI, genAI, AgenticAI, etc.. relaaaax, first things first, today we will be discussing some basics of Machine Learning, and we will continue on more advanced AI topics in future entries. Today’s post will serve as an introduction to key tools and their applications in cybersecurity use cases. If you’re already familiar with ML/AI conce...

Detecting C2-Jittered Beacons with Frequency Analysis

Image
 Hola everyone, Today we are going to learn about Frequency Analysis using Fourier, applied to Cyber Security. This tool will allow us to find patterns within our dataset, in a much easier way than doing it in the time domain.** As last time, do not worry, I will leave a link to my  GitHub  at the very end under "References & More Useful Information" so you can copy everything if you want. ** Disclaimer !! Remember that the problem you are trying to solve might be slightly different than the one I am presenting, and maybe time-domain tools work best for your case. Do your own analysis before copy-pasting the code in the GitHub for optimal results. ----------------------------------------------------------------------------------------------------------------------------- Executive Summary Frequency Analysis using Fourier for Detection Engineering & Threat Hunting. Detecting C2 Beacons with and without Jitter, a technical analysis. ---------------------------------...