Highlights
- Pro
ModelTotal
modeltotal
LLM Security - Attack and Detect future threats in LLM models - Autonomous Purple teaming - Evalutate your LLM security posture
Michel de CREVOISIER
mdecrevoisier
Senior Security Analyst / SOC /
Blue teamer / Detection specialist
Alessandro Gario
alessandrogario
Reverse engineer, C++/Rust enthusiast, BPF ❤️, Linux user
@trailofbits Milan, Italy
Yue Zhao
yzhao062
I HAVE No Twitter/X account! Assistant Professor of Computer Science @ University of Southern California (USC); Ph.D. @ CMU. Anomaly/Outlier/OOD Detection
University of Southern California Los Angeles, CA, USA
Leo Di Donato
leodido
I made Falco 🦅
Rabbit holes: Runtime Security, Linux, eBPF, Kubernetes, Language Engineering. 🐇
Milky Way
Andrea Allievi
AaLl86
Windows Kernel Developer, Security Research Engineer, Windows Internals enthusiast
Microsoft Corporation Redmond, WA
Teddy Reed
theopolis
Mostly security, trusted computing, OS, embedded focuses; always for fun. (he/him)
New York, NY
Steve Klabnik
steveklabnik
All i'm trying to do is enjoy every day to the fullest with my Pokémon.
@oxidecomputer Austin, TX
Jonathan Salwan
JonathanSalwan
Program analysis, reverse engineering and vulnerability research
France