探索最新的產業趨勢與專業見解
BullyRAG:A Multi-Perspective RAG Robustness Evaluation Framework
CmdCaliper: A Semantic-Aware Command-Line Embedding Model and Dataset for Security Research
Automating Dark Web CTI Reports with RAG Insight for MISP Sharing
Exploring the Dark Web Ecosystem from the Blue Team Perspective
CTI Cockpit: Automating the CTI Lifecycle with Language Models
Demystifying the Arcane of Lateral Movement between Azure & On-Prem AD
Breaking through Vanguard of Supply Chain
United We Stand: A deep dive into DFIR cases with the security analyst empowered by Generative AI
Ghost in Your Supply Chain
ADillesHeel: Making the Impossible Possible in AD Attack Path Analysis
Silent Intruders: Dissecting EDR Bypass Strategies in APT Attacks
LLMs Bear the BOT, Yet Swallow Up — Exploring Potential Attacks against Retrieval Augmented Generation Models
Source Pollution Attack - A Hidden Threat in Cybersecurity
Multi Heads Are Better Than One: Leveraging Multimodal GenAI for Comprehending and Exploring Cyber Threat Intelligence
言語モデルを使用して CTI コックピットを作成する
Practical Malware Analysis and .NET Reversing Based on Real-World Cases
BloodHound's New Trail: Incorporating Scalable Edge Blocking Algorithms for Refined AD Defense
CyberSensei: Redefining Cybersecurity Inquiry Responses with AESG, Your Cybersecurity Assistant and Guardian
無職転生Azure行ったら本気だす: Microsoft Entra ID P2機能を使用してAzure IAMを乱用する
Attack Knowledge Base for Automotive
AI主導のIDアタックサーフェスの可視化でIDの誤設定をあぶり出す
GPTHound – Your Active Directory Security Assistant
Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis
IRonMAN: InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNing
Incident Analysis Case Study Focusing on .NET Malware
Constructing a Precise Dynamic Control-flow Graph for EVM based Smart Contracts
Demystifying China’s Supply Chain Attack Targeting Financial Sector
本網站使用cookie來優化網站功能、分析網站性能以及提供個人化的體驗和廣告。想了解更多Cookies相關資訊請查看隱私權政策