AI
-
Up to 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered by open-source platforms
Up to 100 malicious artificial intelligence (AI)/machine learning (ML) models have been found in the Hugging Face platform.
-
AIGC Artificial Intelligence Safety Report 2024
Significant progress has been made in the field of AIGC (AI Generated Content). However, technological advances always come with new challenges, and security issues in the AIGC field have come to the fore. The report will deeply analyze the security risks of AIGC and propose solutions.
-
Burpsuite links artificial intelligence (AI) to automate vulnerability analysis
BurpGPT is an artificial intelligence-driven vulnerability detection tool that redefines web application security. Its passive scanning capabilities, customizable alerts, and seamless integration with Burp Suite enable security professionals to accurately and efficiently detect vulnerabilities. By leveraging OpenAI's GPT model, BurpGPT provides comprehensive traffic analysis that goes beyond traditional scanning methods. Embrace the future of vulnerability assessment with BurpGPT and strengthen your network security defenses against evolving threats.
-
Gemini: A large model that leads the era of artificial intelligence to surpass ChatGPT is released!
The launch of Google Gemini, a large artificial intelligence model, surpasses chatgpt in all aspects. It is the largest and most powerful artificial intelligence model so far, and it is also the most flexible model so far.
-
Sixteen countries around the world jointly release guidelines for the development of safe artificial intelligence systems
Guidance for any system provider using artificial intelligence (AI), whether those systems are created from scratch or built on tools and services provided by others.
-
AsyncRAT malware analysis practice using Chatgpt
Explore how ChatGPT can assist in analyzing malware, specifically the Remote Access Trojan (RAT) AsyncRAT, and delve into ChatGPT's ability to discuss how it can assist in identifying threat indicators by analyzing network traffic and revealing command and control (C2) infrastructure.