Practical Use Cases for LLM’s in cyber security (part 1)
Tags
Common Information
Type | Value |
---|---|
UUID | 0c95e87d-64ad-443c-9f9f-f733b6b3cabc |
Fingerprint | f55944d94cad8093 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Nov. 26, 2024, 3:20 p.m. |
Added to db | Nov. 26, 2024, 5:06 p.m. |
Last updated | Dec. 3, 2024, 4:21 p.m. |
Headline | Practical Use Cases for LLM’s in cyber security (part 1) |
Title | Practical Use Cases for LLM’s in cyber security (part 1) |
Detected Hints/Tags/Attributes | 77/3/17 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | malicious.ru |
|
Details | Domain | 3 | badsite.com |
|
Details | Domain | 1 | sev1.com |
|
Details | File | 1 | my_script.py |
|
Details | File | 1 | c:\\programdata\\xcerfzz.exe |
|
Details | File | 1 | c:\\windows\\system32\\ripfault.exe |
|
Details | md5 | 20 | d41d8cd98f00b204e9800998ecf8427e |
|
Details | md5 | 1 | 0c32215fbaf5e83772997a7891b1d2ad |
|
Details | sha256 | 17 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
|
Details | IPv4 | 2 | 12.34.56.78 |
|
Details | IPv4 | 18 | 10.0.0.5 |
|
Details | MITRE ATT&CK Techniques | 316 | T1078 |
|
Details | MITRE ATT&CK Techniques | 344 | T1059.003 |
|
Details | MITRE ATT&CK Techniques | 708 | T1059 |
|
Details | MITRE ATT&CK Techniques | 181 | T1087 |
|
Details | MITRE ATT&CK Techniques | 1017 | T1082 |
|
Details | MITRE ATT&CK Techniques | 318 | T1566.001 |