<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > Artificial Intelligence</title>
        <link>https://www.hackthebox.gr/rss/blog/artificial-intelligence</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.gr/rss/blog/artificial-intelligence" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.gr/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > Artificial Intelligence</title>
            <link>https://www.hackthebox.gr/rss/blog/artificial-intelligence</link>
        </image>
                    <item>
                <title>Offensive AI security: How to hack the models before you get hacked</title>
                <link>https://www.hackthebox.gr/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</link>
                <description>Learn how offensive AI security exposes LLM, agent, and ML vulnerabilities—from prompt injection to model backdoors—and how CTF training helps teams secure before the attackers exploit them.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/MbSexFQPbeSavnvMPyU8xA322DnIliFJ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Tue, 17 Feb 2026 10:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/offensive-ai-security-ctf-llm-prompt-injection-ml-backdoors</guid>
            </item>
                    <item>
                <title>Benchmarking LLMs for cybersecurity: Inside HTB AI Range’s first evaluation</title>
                <link>https://www.hackthebox.gr/blog/ai-range-llm-security-benchmark</link>
                <description>Discover how Hack The Box AI Range benchmarks LLMs in realistic cyber scenarios. Explore the methodology, key findings, and why it sets a new standard for AI security performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/18OiTQGyf8gxqp1WTSOpkxupxrRoovQC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Thu, 12 Feb 2026 04:03:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-llm-security-benchmark</guid>
            </item>
                    <item>
                <title>Continuous AI evaluations: Why every sector needs to test and trust AI models</title>
                <link>https://www.hackthebox.gr/blog/ai-range-use-cases</link>
                <description>AI model evaluation is now essential for secure AI in cybersecurity. See how teams use HTB AI Range to test, validate safety, and harden models against evolving threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VQfqLsW9BE9PxpfJQcSF7xQKnkYNVy2O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Tue, 10 Feb 2026 02:48:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-use-cases</guid>
            </item>
                    <item>
                <title>How AI is changing cybersecurity: 8 takeaways from our expert webinar</title>
                <link>https://www.hackthebox.gr/blog/ai-security-key-takeaways-webinar-cybersecurity</link>
                <description>AI security in 2026 is redefining cybersecurity. Discover 8 key takeaways from our expert webinar on AI-driven threats, autonomous systems, and how security teams must adapt.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/vCnaItAqdZzWbrNQCEYNksmkz9oMS2eI.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Mon, 09 Feb 2026 11:15:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-security-key-takeaways-webinar-cybersecurity</guid>
            </item>
                    <item>
                <title>Beyond demos: How can enterprises evaluate AI SOC capabilities?</title>
                <link>https://www.hackthebox.gr/blog/evaluate-ai-soc-agents-htb-ai-range</link>
                <description>AI SOC agents are transforming security operations. Learn how to evaluate their real impact, and how Hack The Box AI Range helps benchmark their performance.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/U787pWwv6W08D5Ippg17on0wnX5gLJln.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Thu, 29 Jan 2026 02:25:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/evaluate-ai-soc-agents-htb-ai-range</guid>
            </item>
                    <item>
                <title>Adversarial AI meets its match: The complete AI Red Teamer Path from HTB and Google</title>
                <link>https://www.hackthebox.gr/blog/ai-red-teamer-path-complete-offense-defense-privacy</link>
                <description>Our AI Red Teamer Path is complete, with hands-on AI Defense and AI Privacy modules, helping security teams harden models, prevent data leakage, and stay ahead of emerging AI threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/52wfWIGisXcjSjpJEOCG9UTQVqBp9WTg.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Tue, 23 Dec 2025 04:17:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-red-teamer-path-complete-offense-defense-privacy</guid>
            </item>
                    <item>
                <title>How to operationalize the OWASP LLM top 10 and (actually) secure GenAI apps</title>
                <link>https://www.hackthebox.gr/blog/operationalizing-owasp-llm-top-10-llm-security-controls</link>
                <description>Deploying LLMs without chaos means treating the OWASP LLM Top 10 like an engineering spec. Learn how to turn each risk into real controls, harden pipelines, and secure GenAI apps.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/ziAxZtWxBxgDjBJklq3Qv5XQYEWT5Ovx.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Tue, 09 Dec 2025 16:21:46 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/operationalizing-owasp-llm-top-10-llm-security-controls</guid>
            </item>
                    <item>
                <title>Benchmarking AI security: Inside the new HTB AI Range</title>
                <link>https://www.hackthebox.gr/blog/ai-range-and-model-evaluations</link>
                <description>Continuous, real-world evaluation of autonomous cyber AI agents – benchmarked via live adversarial simulations, governed for enterprise compliance, and measured on the latest threats.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pEtcbXIwC1ZpCVPASFkWl1p9uL3gOJz3.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Thu, 04 Dec 2025 04:16:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-range-and-model-evaluations</guid>
            </item>
                    <item>
                <title>The great complexity shift: Why AI agents don’t just simplify cybersecurity</title>
                <link>https://www.hackthebox.gr/blog/ai-agents-cybersecurity-complexity-shift</link>
                <description>Even as AI agents tackle cyber threats, they aren’t a security silver bullet. Explore why multi-agent systems shift complexity to new layers and what it takes to secure autonomous operations</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/XEdmvAS5cKhHwQ6o8NhBQ9QinSPUFHv0.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Wed, 26 Nov 2025 12:07:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-agents-cybersecurity-complexity-shift</guid>
            </item>
                    <item>
                <title>AI adoption: How to empower teams while governing risks?</title>
                <link>https://www.hackthebox.gr/blog/ai-security-adoption</link>
                <description>How businesses and cyber teams can harness AI for competitive advantage, providing employees with the right tools and governance to build an augmented workforce.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/FyaCjGdzCdCOnOphMYKfbfuIhVldlzDe.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Artificial Intelligence</category>
                <pubDate>Fri, 14 Nov 2025 04:19:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/ai-security-adoption</guid>
            </item>
            </channel>
</rss>
