Open Source Security

Episode 426 - Automatically exploiting CVEs with AI


Listen Later

Josh and Kurt talk about a paper describing using a LLM to automatically create exploits for CVEs. The idea is probably already happening in many spaces such as pen testing and intelligence services. We can't keep up with the number of vulnerabilities we have, there's no way we can possibly keep up with a glut of LLM generated vulnerabilities. We really need to rethink how we handle vulnerabilities.

Show Notes
  • OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories
  • paper: LLM Agents can Autonomously Exploit One-day Vulnerabilities
  • Cisco Fixes RV320/RV325 Vulnerability by Banning "curl" in User-Agent
  • Episode 219 – Chat with Larry Cashdollar
  • Cory Doctorow: What Kind of Bubble is AI?
...more
View all episodesView all episodes
Download on the App Store

Open Source SecurityBy Josh Bressers

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

40 ratings


More shows like Open Source Security

View all
Hacked by Hacked

Hacked

190 Listeners

The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

655 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,023 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

164 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,041 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

2.5 Admins by The Late Night Linux Family

2.5 Admins

98 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners