Power BI Fundamentals - Create visualizations and dashboards from scratch
Foundations for Product Management Success
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a cutting-edge cybersecurity conference talk that demonstrates how attackers can weaponize large language model fine-tuning techniques to establish covert command and control channels and conduct data exfiltration. Learn about a proof-of-concept attack methodology that leverages LLM tuning capabilities to create stealthy communication pathways that evade traditional detection methods. Discover the technical challenges attackers face when implementing these techniques, including issues with model hallucinations and maintaining consistency in covert communications. Examine the defender's perspective on identifying and mitigating these novel attack vectors, understanding why these LLM-based threats present unique detection difficulties for security teams. Gain insights into the intersection of artificial intelligence and offensive security, exploring how machine learning advancements can be exploited for malicious purposes and what this means for the future of cybersecurity defense strategies.
Syllabus
- Date/Time: Monday, 17:00–17:20
Taught by
BSidesLV