<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories in Threats</title>
    <link>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69640#M1181</link>
    <description>&lt;P&gt;Thanks for sharing &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 13:18:39 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-04-22T13:18:39Z</dc:date>
    <item>
      <title>GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories</title>
      <link>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69639#M1180</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a good example of AI unbounded without guardrails and fully utilised as an attack tool, against organisations who endeavour to use the same technology to protect them.&amp;nbsp;&amp;nbsp; The sting in the tail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Existing AI technology can allow hackers to automate exploits for public vulnerabilities in minutes flat. Very soon, diligent patching will no longer be optional.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we need protection against AI itself.&amp;nbsp;&amp;nbsp; Now where did I put those ethics and governance controls?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/threat-intelligence/gpt-4-can-exploit-most-vulns-just-by-reading-threat-advisories" target="_blank"&gt;https://www.darkreading.com/threat-intelligence/gpt-4-can-exploit-most-vulns-just-by-reading-threat-advisories&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 02:39:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69639#M1180</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-04-22T02:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories</title>
      <link>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69640#M1181</link>
      <description>&lt;P&gt;Thanks for sharing &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 13:18:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69640#M1181</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-04-22T13:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories</title>
      <link>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69646#M1184</link>
      <description>&lt;P&gt;Maybe the next step will be for it to patch vulns&amp;nbsp;Just by reading threat advisories.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 22:48:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/GPT-4-Can-Exploit-Most-Vulns-Just-by-Reading-Threat-Advisories/m-p/69646#M1184</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-04-22T22:48:37Z</dc:date>
    </item>
  </channel>
</rss>

