Cybersecurity in the Age of AI: What Experts are Saying
ATT&CK techniques detected
T1190Exploit Public-Facing Application
96%
"original cve - 2022 - 41800 disclosure, which i had designed to look super obvious, instead of using the actual exploit we also released. not only that, but because cve - 2022 - 41800 is an * authenticated * rce, they combined my poc with a separate authentication - bypass vulner…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
68%
"you ' ve used has surfaced? a : at greynoise, we developed a tool called sift, which runs traffic seen by honeypots through magic machine - learning algorithms to help us ( and customers! ) see what attackers are up to each day. one exploit that stood out to me a couple months ag…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
In this post we explore the significant shift in the cybersecurity landscape driven by AI advancements. Featuring insights from a panel of seasoned security experts, the blog delves into current misconceptions, exciting developments, and surprising findings in AI-driven cybersecurity.