Cryptojacking in ML Containers: Protecting Your GPUs
How attackers hijack Machine Learning containers to mine cryptocurrency (XMRig, Ethminer) and how to detect mining signatures in code.
How attackers hijack Machine Learning containers to mine cryptocurrency (XMRig, Ethminer) and how to detect mining signatures in code.
Datasets aren't just text. Learn how attackers hide links to malware (.exe, .sh) inside CSV and Parquet files to compromise training pipelines.
PyTorch models (.pt/.pth) use Pickle under the hood. Learn how attackers hide malware in model weights and how to detect it.
How attackers exploit simple typing errors in requirements.txt to install malware. Detecting 'tourch', 'reqests', and other malicious PyPI packages.