[PDF REPOSITORY FOR GENERATIVE AI & CYBERSECURITY]

Welcome

All those resources have been shared on our WhatsApp Community: generative AI for Cybersecurity: chatGPT, Llama2, Bard

A big thank you to all our contributors!

You can join us here to talk, read or share your pdfs


If you want to support our community:

https://buymeacoffee.com/julienrk



1717371221006.pdf

Summary:

Keywords: Adversarial Attacks, Differential Privacy, Adversarial Training, Cybersecurity, AI

Category: Cybersecurity, AI

AI for Penetration Testing.pdf

Author: Peter Halberg

Summary:

Keywords: Penetration Testing, Generative AI, Vulnerability Analysis, Threat Modeling, Ethical Concerns

Category: Cybersecurity, AI

AI Security notes.pdf

AI Security notes OVERVIEW OF GUIDELINES AND TRENDS 

Author: Katharina Koerner

Summary:

Keywords: Responsible AI, Privacy, Data Governance, EU AI Act, NIST, Machine Learning Attacks

Category: AI Security

OWASP-Top-10-for-LLMs-2023-v1_1.pdf

OWASP TOP 10 FOR LLM APPLICATIONS

Author: OWASP

Summary:

Keywords: OWASP, Large Language Models, Security Risks, Mitigation Strategies, AI Security

AI Strategy_ A Step-by-Step Guide, March 2024.pdf

AI STRATEGY: A STEP-BY-STEP GUIDE

Author: Daiki

Summary:

Keywords: AI Strategy, Risk Management, Strategic Planning, Organizational Goals, Case Studies

Category: AI Strategy


Auditing Artificial Intelligence.pdf

AUDITING ARTIFICIAL INTELLIGENCE

Author: Unspecified

Summary:

Keywords: AI Auditing, Compliance, Data Integrity, Transparency, Continuous Monitoring

AutoGPT-examples.pdf

Auto-GPT

Author: Steve Nouri

Summary:

Keywords: AutoGPT, Examples, Task Completion, Market Research, Content Generation, Data Analysis

Category: Artificial Intelligence



bh-asia-2024-llm4shell.pdf

LLM4Shell: Discovering and Exploiting RCE Vulnerabilities in Real-World LLMIntegrated Frameworks and Apps

Authors: Tong Liu, Yuekang Li, Contributors: Zizhuang Deng, Guozhu Meng, Kai Chen

Summary:

Keywords: RCE Vulnerabilities, LLM-Integrated Frameworks, Jailbreak, Prompt Injection, Mitigation Strategies

Category: Cybersecurity


ChatGPT for Cyber Security.pdf

ChatGPT

for CyberSecurity

Author: Joas Antonio Dos Santos

Summary:

Keywords: ChatGPT, Cybersecurity, Incident Response, Malware Containment, Threat Identification

Category: Cybersecurity


Little_Book_of_AI.pdf

Little book of AI

Author: Adam Leon Smith

Summary:

Keywords: AI, AI Standards, Operational Efficiency, Risk Mitigation, ISO/IEC

Category: AI Standards


Managing AI Cyber Risks-In-The-Financial-Services-Sector.pdf

Managing Artificial
Intelligence-Specific
Cybersecurity Risks
in the
Financial Services
Sector

Author: U.S. Department of the Treasury

Summary:

Keywords: AI Cyber Risks, Financial Services, Cybersecurity, Risk Mitigation, Vulnerabilities

Category: Cybersecurity


prompt-engineering-playbook-beta-v3.pdf

PROMPT ENGINEERING PLAYBOOK

Author: GovTech Data Science & AI Division

Summary:

Keywords: Prompt Engineering, AI Models, Optimization, Best Practices, Case Studies

Category: AI Development


quick guide to prompt engineering.pdf

The Quick guide to prompt engineering

Author: Ian Khan

Summary:

Keywords: Prompt Engineering, AI Models, Effective Prompts, Performance Improvement, Practical Tips

Category: Artificial Intelligence


AN ASSESSMENT OF THE USE OF GENERATIVE AI IN CYBERSECURITY-CHALLENGES AND OPPORTUNITIES-Franklin_OkekeMainMain.pdf

An assessment of the use of generative ai in cybersecurity: challenges and opportunities

Author: Franklin Nnabuike Okeke

Summary:

Keywords: Generative AI, Cybersecurity, Threat Detection, Vulnerability Assessment, Social Engineering

Category: Cybersecurity


LLM_AI_Security_and_Governance_Checklist-v1.1.pdf

LLM AI CYBERSECURITY & GOVERNANCE CHECKLIST

Authors: Sandy Dunn, Heather Linn, John Sotiropoulos, Steve Wilson, Fabrizio Cilli, Aubrey King, Bob Simonoff, David Rowe, Rob Vanderveer, Emmanual Guilherme Junior, Andrea Succi, Jason Ross, Talesh Seeparsan, Anthony Glynn, Julie Tao

Summary:

Keywords: LLM Security, Governance, Checklist, AI Asset Inventory, Regulatory Compliance

Category: Cybersecurity


Seguridad ofensiva con Prompt Engineering - Dr. Alfonso Muñoz - mindcrypt - 05022024 - Copie.pdf

Seguridad ofensiva en machine learning

Autor: Dr. Alfonso Muñoz

Resumen:

Explora la seguridad ofensiva en el aprendizaje automático centrándose en la ingeniería de prompt.

Detalla varias técnicas de inyección de avisos y sus implicaciones para la seguridad de la IA.

Proporciona ejemplos y estrategias para defenderse de los ataques basados en instrucciones en los sistemas de IA.

Palabras clave: Seguridad ofensiva, ingeniería de prompt, aprendizaje automático, inyección de prompt, seguridad de IA

Categoría: Ciberseguridad

OffSec in Prompt Engineering - Dr. Alfonso Muñoz - mindcrypt - 05022024.pdf

Offensive security in

machine learning

Author: Dr. Alfonso Muñoz

Summary:

Keywords: Offensive Security, Prompt Engineering, Machine Learning, Prompt Injection, AI Security

Category: Cybersecurity


ollamar.pdf

running LLMs on your local machine with ollama

Author: Hause Lin


ChatGPT for dummies.pdf

ChatGPT for dummies 

Author: Pam Baker

Summary:

Keywords: ChatGPT, Guide, Basics, Advanced Features, Practical Tips

Category: Artificial Intelligence


ChatGpt for Internal Auditors.pdf

ChatGpt for Internal Auditors 

Author: The Institute of Internal Auditors

Summary:

Keywords: AI, Internal Auditing, Natural Language Processing, Use Cases, Best Practices

Category: Auditing


ChatGPT Security Implications.pdf

Security Implications

of ChatGPT

Author: Cloud Security Alliance

Summary:

Keywords: ChatGPT, Security Implications, Risks, Vulnerabilities, Mitigation

Category: Cybersecurity


ChatGPT_Cheatsheet_Costa.pdf

The ChatGPT Cheat Sheet

Author: Neural Magic

Summary:

Keywords: ChatGPT, Cheat Sheet, NLP, Programming, Content Creation

ChatGPT-Cyber-Tool.pdf

Evaluation of ChatGPT as a

cybersecurity tool

An experimental CTF based approach

Author: KTH ROYAL INSTITUTE OF TECHNOLOGY

Summary:

Keywords: ChatGPT, Cybersecurity Tool, Incident Response, Threat Detection, Adversary Emulation

Category: Cybersecurity


Gen AI for cybersecurity.pdf

Review of Generative AI Methods in Cybersecurity

Author: Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras

Summary:

Keywords: Generative AI, Cybersecurity, Threat Detection, Response Automation, Vulnerability Analysis

Category: Cybersecurity


Guidelines-for-secure-AI-system-development.pdf

Guidelines for secure AI system development

Author: National Cyber Security Centre (USA)

Summary:

Keywords: AI System Development, Security Guidelines, Best Practices, Data Protection, Compliance

Category: AI Security

intersection-AI-ML-Cybersecurity.pdf

The Intersection of AI/ML and Cybersecurity

Author: Shing-hon Lau

Summary:

Keywords: AI, Machine Learning, Cybersecurity, Defensive AI, Offensive AI

Category: Cybersecurity, AI


ISO-IEC-FDIS-42001.pdf

Information technology — Artificial

intelligence — Management system

Author: standards.iteh.ai

Summary:

Keywords: ISO/IEC 42001, AI Management Systems, Governance, Risk Management, Compliance

Category: AI Standards

Team8-Generative-AI-and-ChatGPT-Enterprise-Risks.pdf

Generative AI

and ChatGPT

Enterprise Risks

Author: Team8

Summary:

Keywords: Generative AI, ChatGPT, Enterprise Risks, Security, Compliance

Category: Cybersecurity


OpenAI_ Threat Intelligence Report .pdf

AI and Covert Influence Operations:

Latest Trends

Author: Unspecified

Summary:

Keywords: OpenAI, Threat Intelligence, AI Security, Vulnerabilities, Risk Mitigation

Category: Cybersecurity


ThreatIntelGPT-Structure-from-Chaos.pdf

ThreatIntelGPT

STIX from Chaos

Author: David Greenwood

Summary:

Keywords: Threat Intelligence, ChatGPT, Data Structuring, AI Integration, Intelligence Reports

Category: Cybersecurity


Tech Watch Flash - The Impact of Large Language Models on Law Enforcement.pdf

ChatGPT The impact of Large Language Models on Law Enforcement

Author: Europol Innovation Lab

Summary:

Keywords: Large Language Models, Law Enforcement, Criminal Use Cases, Fraud, Cybercrime

Category: Cybersecurity


State of AI Cyber Security.pdf

STATE OF

AI CYBER

SECURITY

Author: Darktrace

Summary:

Keywords: AI Cybersecurity, Emerging Threats, Vulnerabilities, Cybersecurity Integration, AI Impact

Category: Cybersecurity


Victoria Beckman _ CISA Roadmap for AI 2023-2024.pdf

CISA ROADMAP
FOR
ARTIFICIAL INTELLIGENCE

Author: CISA

Summary:

Keywords: CISA, AI Roadmap, Cybersecurity, Critical Infrastructure, AI Assurance

Category: Cybersecurity


AI security.pdf

Generative AI MODELS

Author: Federal Office for Information Security

Summary:

Keywords: Generative AI, AI Models, Applications, Ethical Considerations

Category: Artificial Intelligence


Unlocking secrets of prompt engineering.pdf

Unlocking secrets of prompt engineering 

Author: Gilbert Mizrahi

Summary:

Keywords: Prompt Engineering, Best Practices, Use Cases, AI Optimization, Challenges

Category: Artificial Intelligence


A Practical Guide for OSINT Using ChatGPT.pdf

A PRACTICAL GUIDE FOR
OSINT INVESTIGATORS
TO COMBAT
DISINFORMATION AND
FAKE REVIEWS DRIVEN BY AI

Author: Nico Dekens

Summary:

Keywords: OSINT, ChatGPT, Disinformation, Fake Reviews, AI-generated Content

Category: Cybersecurity, AI


2306.02224 (1).pdf

Auto-GPT for Online Decision Making: Benchmarks and Additional Opinions

Author: Hui Yang, Sifu Yue, Yunzhong He

Summary:

Keywords: Auto-GPT, Decision Making, Benchmarks, Performance Evaluation, Practical Applications

Category: AI, Decision Making

2402.06664v3.pdf

LLM Agents can Autonomously HackWebsites

Author: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang

Summary:

Keywords: LLM Agents, Autonomous Hacking, Security Measures, Ethical Implications, Case Studies

Category: Cybersecurity, AI

A_New_Era_in_Software_Security_Towards_Self-Healin.pdf

A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification

Author: Yiannis Charalambous∗, Norbert Tihanyi†, Ridhi Jain†, Youcheng Sun∗, Mohamed Amine Ferrag†, Lucas C. Cordeiro∗

Summary:

Keywords: Software Security, Self-Healing, AI, Machine Learning, Autonomous Systems

Category: Cybersecurity