106 Followers
162 Following
178 Posts
How GenAI can be used to transform ๐ฎ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐œ๐ฒ๐›๐ž๐ซ ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ ๐ข๐ง๐ญ๐จ ๐’๐“๐ˆ๐— 2.1 ๐›๐ฎ๐ง๐๐ฅ๐ž๐ฌ
https://medium.com/@antonio.formato/from-unstructured-threat-intelligence-to-stix-2-1-bundles-with-generative-ai-1065ce399e63
GitHub: https://github.com/format81/GenAI-STIX2.1-Generator/
#threatintelligence #GenAI #stix #timindmap #openai #llm #cyber #Security #CyberSecurity
From Unstructured Threat Intelligence to STIX 2.1 Bundles with Generative AI

In the ever-evolving landscape of cybersecurity, the need for seamless and standardized information sharing has never been more critical. The Structured Threat Information Expression (STIX) 2.1โ€ฆ

Medium

๐†๐ž๐ญ๐ญ๐ข๐ง๐  ๐ฌ๐ญ๐š๐ซ๐ญ๐ž๐ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐๐ก๐ข-3 ๐จ๐ง ๐Ž๐ฅ๐ฅ๐š๐ฆ๐š

My initial journey into Small Language Models

https://medium.com/@antonio.formato/getting-started-with-microsofts-phi-3-on-ollama-c4e50be1e52d

#genai #ollama #phi3 #microsoft #smalllanguagemodel #sml #llm #language #reasoning #coding #prompt #generative #ai #azure #app

Getting started with Microsoftโ€™s Phi-3 on Ollama - Antonio Formato - Medium

The world of artificial intelligence (AI) and natural language processing is a continuously changing one where Small Language Models (SLMs) have recently established themselves as strong playersโ€ฆ

Medium

New ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ demo in action. ๐Ÿ“ฝ
New features coming soon, stay tuned. ๐Ÿ†•

๐’๐ญ๐ซ๐ž๐š๐ฆ๐ฅ๐ข๐ญ ๐€๐ฉ๐ฉ: https://ti-mindmap-gpt.streamlit.app/ ๐Ÿ’ฟ
๐†๐ข๐ญ๐‡๐ฎ๐›: https://github.com/format81/TI-Mindmap-GPT โœจ

๐–๐ซ๐ข๐ญ๐ž-๐ฎ๐ฉ used in the demo: https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/

๐˜š๐˜ฑ๐˜ฐ๐˜ช๐˜ญ๐˜ฆ๐˜ณ: ๐˜ช๐˜ง ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ข๐˜ต๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฐ ๐˜ค๐˜ข๐˜ณ๐˜ฆ๐˜ง๐˜ถ๐˜ญ๐˜ญ๐˜บ, ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฏ๐˜ฐ๐˜ต๐˜ช๐˜ค๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ง๐˜ฐ๐˜ณ ๐˜”๐˜ช๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ญ๐˜ˆ๐˜. ๐Ÿ˜Š

#timindmap #mindmap #streamlit #threatintelligence #cyberthreatintelligence #openai #azure #azureopenai #mistral #mistralai #python #llm #ai #genai #embeddings #completition

๐Ÿ”ˆSecond monthly release of ๐–๐ก๐š๐ญ'๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ | ๐ฆ๐š๐ซ 2024. ๐Ÿ”ˆ
Article and tool co-authored with Oleksiy Meletskiy.

๐Ÿ“ข New Features:
โžกSession management
โžกScraping enhancements
โžกCode optimization
โžกPDF Report enhancements
โžกMitre ATT&CK Navigator layer

๐Ÿ“ฐ๐๐ฅ๐จ๐ : https://lnkd.in/diuJTfrH
๐Ÿ’ป ๐€๐ฉ๐ฉ: https://lnkd.in/dSVdG2B4
โฉ ๐†๐ข๐ญ๐‡๐ฎ๐›: https://lnkd.in/dJDSQx8Y

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: https://lnkd.in/dJDSQx8Y

If you find TI Mindmap useful, please consider starring โญ the repository on GitHub.

#timindmap #ti #mindmap #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre #ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence
#github #prompt #promptengineering #FewShotPrompting #gpt #gpt4
#api #DataVisualization #threat #infosec #threatreport #oai #analyst #soc

LinkedIn

This link will take you to a page thatโ€™s not on LinkedIn

Excited to share a series of periodic articles on the developments of TI Mindmap: ๐–๐ก๐š๐ญโ€™๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ, first issue.
Article and tool co-authored with Oleksiy Meletskiy.

New Features:
โžกExtract adversary tactics, techniques, and procedures
โžกTactics, techniques and procedures by execution time
โžกTactics, techniques and procedures timeline
โžกAI Chat on your article
โžกMermaid live editor integration
โžกPDF report
โžกTweet Mindmap

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: https://github.com/format81/TI-Mindmap-GPT/
If you find TI Mindmap useful, please consider starring the repository on GitHub.

To learn more:
https://medium.com/@antonio.formato/whats-new-in-ti-mindmap-feb-2024-14cf3b383833

#timindmap #ti #mindmap #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre #ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence
#github #prompt #promptengineering #FewShotPrompting #gpt #gpt4
#api #DataVisualization #threat #infosec #threatreport #oai #analyst #soc #cert

GitHub - format81/TI-Mindmap-GPT: AI-powered tool designed to help producing Threat Intelligence Mindmap.

AI-powered tool designed to help producing Threat Intelligence Mindmap. - format81/TI-Mindmap-GPT

GitHub

๐€๐ง๐ง๐จ๐ฎ๐ง๐œ๐ข๐ง๐  ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐จ๐ฉ๐ž๐ง ๐š๐ฎ๐ญ๐จ๐ฆ๐š๐ญ๐ข๐จ๐ง ๐Ÿ๐ซ๐š๐ฆ๐ž๐ฐ๐จ๐ซ๐ค ๐ญ๐จ ๐ซ๐ž๐ ๐ญ๐ž๐š๐ฆ ๐ ๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ

๐๐ฒ๐‘๐ˆ๐“ automates AI Red Teaming tasks to allow operators to focus on more complicated and time-consuming tasks and can also identify security harms such as misuse (e.g., malware generation, jailbreaking), and privacy harms (e.g., identity theft).โ€‹

Find out more:

https://www.microsoft.com/en-us/security/blog/2024/02/22/announcing-microsofts-open-automation-framework-to-red-team-generative-ai-systems/

GitHub repo: https://github.com/Azure/PyRIT

How to Guide: https://github.com/Azure/PyRIT/blob/main/doc/how_to_guide.ipynb

#redteam #airedteam #redteaming #PyRIT #ml #ai #framewrok #python #cyber #llm #ai #aisecurity #microsoft #microsoftsecurity #opensource #MicrosoftAIRedTeam #GenAI #jailbreaking #promtp #promptinjection #malware #privacy #responsibleai #cybersecurity #aisecurity #secureai #machinelearning #generativeai

Announcing Microsoftโ€™s open automation framework to red team generative AI Systems | Microsoft Security Blog

Read about Microsoft's new open automation framework, PyRIT, to empower security professionals and machine learning engineers to proactively find risks in their generative AI systems.

Microsoft Security Blog

No cybersecurity and genAI in this post, just a bit of coding. ๐Ÿ˜‰

๐Œ๐ž๐ซ๐ฆ๐š๐ข๐.๐ฅ๐ข๐ฏ๐ž ๐‚๐จ๐๐ž ๐‘๐ž๐ง๐๐ž๐ซ๐ž๐ซ: https://encode-mermaid-diagram.streamlit.app/

๐Ÿš€ I've just developed a Streamlit app that takes input in Mermaid.js code and outputs a rendered link for mermaid.live.

This functionality enables users to seamlessly edit their code, addressing any errors or dynamically modifying the diagram as needed. I believe this tool could be useful for those working with Mermaid charts.

Feel free to check it out and see how it can streamline your workflow!

Read more:

https://medium.com/@antonio.formato/mermaid-live-code-renderer-with-python-2e8cb677e963

Spoiler: soon this will be an integrated feature in ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ: https://ti-mindmap-gpt.streamlit.app/ ๐Ÿ“Šโœจ

#Streamlit #MermaidJS #DataVisualization #pyhton #mermaid #timindmap #coding

I share this report generated with ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ.

Tool: https://ti-mindmap-gpt.streamlit.app/

I invite you to contribute and add a star on GitHub: https://github.com/format81/TI-Mindmap-GPT

Title: ๐๐ž๐›๐ฎ๐ฅ๐š ๐๐ซ๐จ๐ค๐ž๐ซ: ๐ˆ๐ญ๐š๐ฅ๐ข๐š๐ง-๐›๐š๐ฌ๐ž๐ ๐“๐ก๐ซ๐ž๐š๐ญ ๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง

Summary: ๐˜›๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ข๐˜ฏ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด ๐˜ฐ๐˜ง ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ฅ๐˜ถ๐˜ค๐˜ต๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ข๐˜ฏ ๐˜๐˜ต๐˜ข๐˜ญ๐˜ช๐˜ข๐˜ฏ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ฏ ๐˜ข๐˜ด ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ. ๐˜š๐˜ช๐˜ฏ๐˜ค๐˜ฆ ๐˜ฆ๐˜ข๐˜ณ๐˜ญ๐˜บ 2020, ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ฉ๐˜ข๐˜ด ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฅ ๐˜ค๐˜ถ๐˜ด๐˜ต๐˜ฐ๐˜ฎ-๐˜ฎ๐˜ข๐˜ฅ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฎ๐˜ช๐˜ด๐˜ฆ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ฎ๐˜ข๐˜ช๐˜ฏ๐˜ญ๐˜บ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฆ๐˜ณ๐˜ฐ๐˜ฏ๐˜ข๐˜ถ๐˜ต๐˜ช๐˜ค๐˜ด ๐˜ช๐˜ฏ๐˜ฅ๐˜ถ๐˜ด๐˜ต๐˜ณ๐˜ช๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด'๐˜ด ๐˜ฑ๐˜ฆ๐˜ณ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ข๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ด ๐˜ท๐˜ข๐˜ณ๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ด๐˜ฆ๐˜ค๐˜ต๐˜ฐ๐˜ณ๐˜ด ๐˜ช๐˜ฎ๐˜ฑ๐˜ญ๐˜ช๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ช๐˜ด ๐˜ฑ๐˜ถ๐˜ณ๐˜ด๐˜ถ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฏ๐˜ฐ๐˜ฏ-๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜จ๐˜บ, ๐˜ข๐˜ฏ ๐˜ข๐˜ด๐˜ด๐˜ถ๐˜ฎ๐˜ฑ๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ด๐˜ต๐˜ณ๐˜ฆ๐˜ฏ๐˜จ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ'๐˜ด ๐˜œ๐˜š๐˜‰ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ข๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด.

๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ด๐˜ฉ๐˜ฐ๐˜ธ๐˜ค๐˜ข๐˜ด๐˜ฆ๐˜ด ๐˜ฅ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜ค๐˜ต ๐˜›๐˜›๐˜—๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ฆ๐˜ท๐˜ฐ๐˜ญ๐˜ท๐˜ฆ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ. ๐˜๐˜ณ๐˜ฐ๐˜ฎ ๐˜ฃ๐˜ถ๐˜ค๐˜ฐ๐˜ญ๐˜ช๐˜ค ๐˜ฐ๐˜ฃ๐˜ง๐˜ถ๐˜ด๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฎ๐˜ฆ๐˜ฅ๐˜ช๐˜ข๐˜ต๐˜ฆ ๐˜Ž๐˜ช๐˜ต๐˜๐˜ถ๐˜ฃ-๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ฆ๐˜ฅ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ง๐˜ช๐˜ญ๐˜ญ๐˜ฆ๐˜ฅ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฃ๐˜ญ๐˜ข๐˜ฏ๐˜ฌ ๐˜ด๐˜ฑ๐˜ข๐˜ค๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ถ๐˜ด๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฑ๐˜ญ๐˜ข๐˜ต๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ด ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜๐˜ช๐˜ฎ๐˜ฆ๐˜ฐ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ˆ๐˜ณ๐˜ด๐˜›๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข ๐˜ง๐˜ฐ๐˜ณ ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ.

๐˜ˆ ๐˜ฅ๐˜ฆ๐˜ต๐˜ข๐˜ช๐˜ญ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ'๐˜ด ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ข๐˜ญ๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ต ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ฐ๐˜ง ๐˜ข๐˜ฅ๐˜ฅ๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ถ๐˜ฑ๐˜ฐ๐˜ฏ ๐˜ญ๐˜ข๐˜ถ๐˜ฏ๐˜ค๐˜ฉ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆ. ๐˜‹๐˜ฐ๐˜ฎ๐˜ข๐˜ช๐˜ฏ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ณ๐˜ฆ๐˜จ๐˜ถ๐˜ญ๐˜ข๐˜ณ๐˜ญ๐˜บ ๐˜ด๐˜ธ๐˜ช๐˜ต๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ข๐˜ท๐˜ฐ๐˜ช๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ. ๐˜›๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ญ๐˜บ ๐˜ข๐˜ต๐˜ต๐˜ณ๐˜ช๐˜ฃ๐˜ถ๐˜ต๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ด ๐˜ต๐˜ฐ ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ด๐˜ฐ๐˜ญ๐˜ช๐˜ฅ ๐˜ฆ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ, ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ถ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜ฐ๐˜ฏ๐˜ท๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ต๐˜ข๐˜ญ๐˜ช๐˜ข๐˜ฏ ๐˜ฎ๐˜ข๐˜ฏ๐˜ช๐˜ง๐˜ฆ๐˜ด๐˜ต๐˜ด ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜จ๐˜ฆ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด.

๐˜๐˜ฐ๐˜ณ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ถ๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด, ๐˜ฌ๐˜ฆ๐˜บ ๐˜๐˜–๐˜Š๐˜ด ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ฆ ๐˜ถ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ฑ๐˜ข๐˜ต๐˜ต๐˜ฆ๐˜ณ๐˜ฏ๐˜ด ๐˜ช๐˜ฏ ๐˜ด๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ด๐˜ข๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ด, ๐˜ฅ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜ค๐˜ต ๐˜Š2๐˜ด ๐˜ถ๐˜ต๐˜ช๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต๐˜ฆ๐˜ฅ ๐˜ง๐˜ฐ๐˜ณ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ข๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฐ๐˜ง ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ง๐˜ช๐˜ค ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ด๐˜ถ๐˜ค๐˜ฉ ๐˜ข๐˜ด โ€œ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆโ€.

Original blog by Fortgale: https://fortgale.com/blog/featured/nebula-broker-offensive-operations-italy/

#timindmap #threatintelligence #ai #genai #openai #azureopenai #azure #ioc #ttp #timeline #soc #llm

๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐ž๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐จ๐Ÿ ๐š๐ง ๐ž๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐ฉ๐ซ๐จ๐ฆ๐ฉ๐ญ

From the "Get started with Microsoft Copilot for Security" online training, I highlight this interesting in-depth analysis.

๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐ฉ๐ซ๐จ๐ฆ๐ฉ๐ญ๐ฌ give Copilot adequate and useful parameters to generate a valuable response. Security analysts or researchers should include the following elements when writing a prompt.

๐Ÿ’ก ๐†๐จ๐š๐ฅ - specific, security-related information that you need

๐Ÿ’ก๐‚๐จ๐ง๐ญ๐ž๐ฑ๐ญ - why you need this information or how you'll use it

๐Ÿ’ก๐„๐ฑ๐ฉ๐ž๐œ๐ญ๐š๐ญ๐ข๐จ๐ง๐ฌ - format or target audience you want the response tailored to

๐Ÿ’ก๐’๐จ๐ฎ๐ซ๐œ๐ž - known information, data sources, or plugins Copilot should use

At this link other prompting tips:

https://learn.microsoft.com/en-us/training/modules/security-copilot-getting-started/5-create-effective-prompts

Full training: https://learn.microsoft.com/en-us/training/paths/security-copilot-and-ai/

#copilot #copilotforsecurity #securitycopilot #microsoft #microosoftsecurity #llm #openai #azureopenai #llmapps #soc #generativeai #genai #cybersecurity #azure #cloudsecurity #cloudnative #defender #sentinel #microsoftsentinel #xdr #defenderxdr #prompt #promptengineering

Describe the elements of an effective prompt - Training

Describe the elements of an effective prompt

๐Ÿš€ Excited to share our latest #CyberSignals report for February 2024! ๐Ÿ›ก๏ธ

This edition explores the profound effects of AI on cybersecurity, highlighting its dual role as both a powerful defender in enhancing security protocols and a potential vector for cyber threats.

Key insights include:

โ–ถ AI's pivotal function in addressing the global shortage of cybersecurity talent.

โ–ถThe significant improvement in accuracy and efficiency of security operations through tools like Copilot for Security.

โ–ถOur strategies for counteracting AI-powered threats to promote a secure online environment.

https://news.microsoft.com/wp-content/uploads/prod/sites/626/2024/02/CyberSignals-Feb-2024.pdf

#Cybersecurity #AI #Microsoft #OpenAI #DigitalDefense #Innovation #genai #cybersecurity #aisecurity #cloud #cloudsecurity #llm #copilot #threat #microsoftsecurity