empirical interview paper with hackers, seems while there's a lot of "throwing ML over hacking" there's actually not much research into how hackers actually work..
Vision paper that connects gpt-3.5-turbo with vulnerable VM over SSH and asks 'it' to become root. A follow-up paper creating a better vulnerable VM benchmark and retesting results with gpt-3.5, gpt-4 and local LLMs seems to be in the works
Operational Technology (OT) runs critical infrastructure—energy, water, manufacturing, transport. Securing it is essential to keep society running.
The OWASP OT Top 10 highlights the most critical OT security risks and offers guidance to protect these vital systems.
Beta now live! Final release: Oct 2025 We want your feedback to make it even better.
Check it out → https://ot.owasp.org Star us & share your thoughts on GitHub → https://t.ly/cyghF