meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 4th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 4 October 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. LLMs for IR; Pytorch Vuln; BING Reads Captchas; Evilproxy and Indeed;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, October 4, 2020, edition of the Sans and Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida.

0:13.6

Large language models like Chatsy, PTA are, of course, all over the place, but not a lot of people are actually trying to train

0:22.4

their own models. And the problem with these large public models like Chad GPD is that

0:29.3

they are trained with generic data. And secondly, that anything that you post to it, any prompted

0:36.7

you're creating, of course, is in fact

0:39.6

leaked to that language model and it may not be appropriate for, for example, logs you create

0:46.5

internally in your network and security events to be shared with these models. So Tom looked

0:53.4

into creating his own model and he describes how he

0:58.3

did it here in the latest blog post and some of the results that he obtained with this model.

1:06.5

Now Tom looked at it with sort of an incident response lens and essentially sort of, for example,

1:12.6

pasted, log snippets to the model and then asked it what kind of attack it is. It did pretty

1:18.6

well there. It didn't do well with some of the other tasks like writing reports and such.

1:25.7

You can see what the result was in Tom's blog. Now Tom doesn't walk you

1:31.8

in the details of the training but has links that will explain to you how the training worked

1:37.6

and also what kind of hardware he used for this particular model that he trained himself.

1:46.3

And then we have another sort of machine learning related story,

1:50.1

a critical vulnerability in TorchServe.

1:54.1

This allows for unauthenticated remote code execution.

1:59.6

TorchServe is used to connect PiTorch,

2:04.1

PyTorch being a standard library,

2:07.2

often used in Python for machine learning,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.