Is there any resources that discover LLM-based threats in Cybersecurity recently? [closed]

I wondered If there are some official/reliable resources to discover statistics regarding new threats and attack vectors generated by GenAI or Large Language Models (LLM) that recently opened a new era and attack surface.

Continue reading Is there any resources that discover LLM-based threats in Cybersecurity recently? [closed]

Defining user anomalies by analysing web server interaction counts [closed]

I’m researching log-analysis using webserver/HTTP logs, so I created the pipeline for this use case (Anomaly detection). Let’s say I have number/counts of logged records/events for each username.

The problem is I’m not sure what is the be… Continue reading Defining user anomalies by analysing web server interaction counts [closed]

google-authenticator. How do I generate six digits code from my Linux desktop? [migrated]

consider the following situation

I have an account at https://www.mercadolibre.com.ar. According to a new policy on login, I am asked to provide a six digits Google Authenticator code;
I have installed google-authenticator on my Linux (Fe… Continue reading google-authenticator. How do I generate six digits code from my Linux desktop? [migrated]

What reasons can result in legitimate long Web/HTTP parameter values? [closed]

I’m researching AI-based solutions to detect malicious web requests. I recently found this paper, showing that those web requests containing attack payloads are mostly malicious SQL injection/XSS attacks.
They carried out URL parameter ana… Continue reading What reasons can result in legitimate long Web/HTTP parameter values? [closed]