The truth about AI attack vectors | Learn with HTB (Episode 10)

Channel:
Subscribers:
63,100
Published on ● Video Link: https://www.youtube.com/watch?v=TomKISo9Or8



Duration: 0:00
2,965 views
142


#AI is revolutionizing cybersecurity—but what happens when hackers start weaponizing it?

In this episode of Learn with HTB, we're diving deep into #AIattack vectors every #red teamer, #pentester, or ethical #hacker needs to understand. Hosted by ‪@WJPearce_‬ this video breaks down how attackers manipulate AI models, tamper with training data, and reconstruct private inputs.

Notice anything fishy? Comment below the hidden flag for a chance to win a Silver Annual Subscription!

0:00 Introduction
1:20 Model Poisoning
3:16 Data Poisoning
8:15 Model Inversion
9:43 Social Engineering & Deep Fakes

Get started on our AI red teamer path on HTB Academy, created in partnership with Google: https://bit.ly/3GauCwy

#HackTheBox #HTB #AI #RedTeam #cybersecurity #PenetrationTesting




Other Videos By Hack The Box


2025-05-09Introducing HTB Season 8: Depths | Hack The Box
2025-05-08A guide to CTFs for competitive teams | Hack The Box
2025-05-05This is why your team FLOPS at #CTFs 😤 #capturetheflag
2025-04-29Introducing the new User Management Interface | Hack The Box
2025-04-24These are the TOP 3 LLM #security risks ⚠️
2025-04-23How to get started with AI Red Teaming 🥷
2025-04-16The truth about AI attack vectors | Learn with HTB (Episode 10)
2025-04-16HTB Updates | What's new in Q1 2025?
2025-04-11How to proactively secure your #ActiveDirectory environment | Step-by-step guide 👣
2025-04-08How to secure #ActiveDirectory step-by-step
2025-04-05What explaining #security measures to your colleagues feels like 😩
2025-04-03Securing Active Directory: 3 misconfigurations you should know | Learn with HTB (Episode 9)
2025-04-02We benchmarked 5,000 Cyber Pros | Cyber Attack Readiness Report
2025-03-28Crossing the Streams - Cross-Domain Knowledge in InfoSec with Ryan Gordon
2025-03-27Global Cyber Skills Benchmark 2025: Operation Blackout | Hack The Box
2025-03-26Cyber Apocalypse Day Finale | Extracting information from MFT records
2025-03-26Cyber Apocalypse 2025: Extracting information from MFT records by @Cyber Studies
2025-03-25Cyber Apocalypse Day #5: Ippsec attacks the testimonial GRPC webapp
2025-03-25Cyber Apocalypse 2025: Ippsec attacks the testimonial GRPC webapp by @ippsec
2025-03-24Cyber Apocalypse Day #4: SQL injection and password cracking by @panawesome
2025-03-24Cyber Apocalypse 2025: SQL injection and password cracking by @panawesome