{"id":4883,"date":"2023-03-28T07:00:00","date_gmt":"2023-03-28T07:00:00","guid":{"rendered":"http:\/\/www.sumologic.com\/blog\/chatgpt-cyber-defenders-ai"},"modified":"2025-05-08T19:11:01","modified_gmt":"2025-05-09T03:11:01","slug":"chatgpt-cyber-defenders-ai","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/blog\/chatgpt-cyber-defenders-ai","title":{"rendered":"ChatGPT praise and trepidation &#8211; cyber defense in the age of AI"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0bfc804773fcd27adc327d7e9cf68f630c135ed9 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-4c2ac098504c8d5842209f4e79ad21a7aecc0229 e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-fcc2162656fafb8036a2301d0650a2bf3db53895 e-div--card-btn-link\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1932\" height=\"552\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/blog-ChatGPT-header-1.png\" alt=\"ChatGPT and cyber defense\" class=\"wp-image-4881\" title=\"\"><\/figure>\n<\/div>\n\n\n<p dir=\"ltr\">Authorship &#8211;<br \/>\nAI Contribution Score (ACS): 0%<br \/>\nHuman: 100%<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d4a345dd1296e43b4107f17b72aca72c\">ChatGPT has taken the world by storm, so much so that we are all left guessing how far this will go. And it\u2019s not a trivial question, as it relates to the future of humanity itself. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-41dd257826ee7640d864207c555ddb59\">On one extreme, technology is increasing rapidly enough to synthesize some of the most fundamental parts of our existence\u2014communicating naturally with one another. That can be a scary thought. Many of us feel like Truman in his artificial world as he saw the button reading, &#8220;How&#8217;s it going to end?&#8221; and replied, &#8220;I&#8217;ve been wondering the same thing myself lately.&#8221; The only difference is we are willing participants in creating this artificial world. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-539d6c940389e5a37a39e70bc4c67ead\">On the other extreme, we welcome new powerful tools that help us achieve real results in a short amount of time, giving us our only non-renewable resource \u2013 time. As with any new technology, all we can do is assess them as they develop and put in safety measures, or sometimes even countermeasures, and move forward. In the <a href=\"https:\/\/abcnews.go.com\/Technology\/openai-ceo-sam-altman-ai-reshape-society-acknowledges\/story?id=97897122\" target=\"_blank\" rel=\"noopener\">words of the CEO of OpenAI<\/a>, &#8220;We&#8217;ve got to be careful here. I think people should be happy that we are a little bit scared of this.&#8221; Nowhere is this more true than in the world of cybersecurity itself.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b5c76310302496635e42403ad819a4d5\">One of the things that make large language models (LLM) so powerful is that a \u201clanguage\u201d is not limited to the spoken word but also includes programming languages. Because GPT is multilingual, it allows us to ask it a question in English and have it translate the answer into another language, such as Python. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2e7119be28e3bd0595b17430da684a02\">That is a game changer, but not new to ChatGPT. When Salesforce started exploring the possibilities of this over a year ago, Chief Scientist Silvio Savarese <a href=\"https:\/\/blog.salesforceairesearch.com\/age-of-conversational-ai\/\" target=\"_blank\" rel=\"noopener\">explained their project CodeGen<\/a>: <\/p>\n\n\n\n<blockquote class=\"pull\">\n<p>[With CodeGen] we envisioned a conversational system that is capable of having a discussion with the user to solve a coding problem or task. This discussion takes the form of an English text-based discourse between a human and a machine. The result is AI-generated code that solves the discussed problem.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-82079ebde3980a0ed58a8a664f327723\">GitHub has Copilot and Copilot X which are built on GPT-3 and GPT-4 respectively and help developers write and debug their code, generate descriptions of pull requests, automatically tags them, and can provide AI-generated answers about documentation. Extrapolate this out, instead of a human doing the programming, machines are learning to program themselves, with the human providing only high-level guidance. What could possibly go wrong?<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-6bb281f68c6f6a076e5b525f5b5625b0\" id=\"battle_at_the_binary_level\">Battle at the binary level<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f674d8de75cb35ff566d29072dbacbb0\">In cyber defense, adversaries are driven to discover new vulnerabilities and write exploits against those found and create new tools for breach, extortion, ransomware, remote access, and the rest. Exploit development is a very technical and challenging undertaking, and when exploits are created they are valuable. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a1d083e09942e4cd7b0f460c29f56a05\">These tools are shared on black markets for selling and trading new zero-days, rootkits, and remote access trojans (RATs). Eventually, the defenders catch up and adversary tactics, techniques and procedures (TTPs) become part of the common body of knowledge of attack vectors and are entered into the common vulnerabilities and exposures (CVE) and MITRE ATT&amp;CK hall of fame. Soon after, vendors push detections into their point solutions. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ed6a31a490eea81d77177b2bfd2fbc6d\">As an example on the defending side, we actively fight to detect malicious binaries by their signatures, often in the form of their unique hash value or pattern matching of binary sequences. Once all the anti-virus vendors identify the malicious signatures, attackers have to find (or create) other tools that can go undetected.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-8cfdb52a74b637ad2be103fc05ebf775\">I recall experimenting with a little detection avoidance tool called DSplit. The concept was simple. Split binaries into two, run them both through the AV tool in which you\u2019re hoping to avoid detection, and see which file trips detection. Take the offending half, split it again and rinse and repeat. Eventually, you get down to a small enough chunk of bits that you can quite literally change a 0 to a 1, and then viola! \u2013 it passes undetected. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f3960ebf67eb45257414acdc3899c12b\">That approach is somewhat shallow, and the reassembled binary may not run as expected, but it brings us back to ChatGPT. What if every malicious developer could create unique code at the outset with minimal coding skills? And that code itself could be <a href=\"https:\/\/www.sumologic.com\/glossary\/polymorphism\/\">polymorphic<\/a> in nature, always being unique with no static fingerprint or signature. Defenders and security vendors now have to refocus on behavior and anomaly detection. For a deep dive into the threat offensive AI poses to organizations, <a href=\"https:\/\/arxiv.org\/pdf\/2106.15764.pdf\" target=\"_blank\" rel=\"noopener\">this paper<\/a> is worth a read.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-969680b20e73b89fce9a6ae46a462e68\">Again, this is nothing new, but yesterday&#8217;s detection strategies are now more stale than ever. It\u2019s critical that tools in the security stack are intelligent enough to correlate across the entire lifecycle of an attack and have an entity-centric view of activity in order to identify malicious patterns of behavior. Detecting the initial <a href=\"https:\/\/www.sumologic.com\/glossary\/attack-vector\/\">attack vector<\/a> may be ideal, but as it becomes more difficult, our tooling should also adopt proven approaches that rely on behavior-based anomalies. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-6b5960cdd74ba8f9b968e4564cc1d433\">With the advent of ChatGPT, this type of detection becomes even more important.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-62e4b93a32bc6534841c9a3169b4a466\">Of course, as the cat-and-mouse game levels up on both sides, machine learning, and AI can also be used in malware image classification at the binary level. In head-splitting terminologies, various machine learning approaches such as support vector machine, k-nearest neighbors, random forests, naive Bayes, and decision trees have been used to detect and classify known malware. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-faccb9c1eb21373ec60fa04c521b5e0b\">But even more creative than these names are detection techniques where malware binaries have been converted into actual grayscale images, then using convolutional neural network (CNN) models for static malware classification by \u201ccomputer vision\u201d. <a href=\"https:\/\/arxiv.org\/pdf\/2010.16108.pdf\" target=\"_blank\" rel=\"noopener\">In one test<\/a>, byte plot visualization of malware as grayscale images across 9,342 malware samples achieved 80-99% detection accuracy. <\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"1118\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/blog-ChatGPT-image-1.png\" alt=\"ChatGPT graph\" class=\"wp-image-4882\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c79255a05ee17e01e7d5a87c3965e2cc\">With the recent release of ChatGPT-4, it can \u201csee\u201d and understand images. And this may pave the way for unique ways for it to identify unique malicious code not seen (editor\u2019s note: hah!) before. Around and around we go with AI helping adversaries and defenders alike.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7e2b9f0c8b14c94ed39d21c8e1a09416\">Truth be told, I\u2019ve always been the guy in the back of the room rolling my eyes every time AI\/ML is mentioned by a security vendor. I\u2019m doing less eye-rolling these days, as <a href=\"https:\/\/www.sumologic.com\/blog\/deconstructing-aiops\/\">AIOPs<\/a> have made leaps and bounds. <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2A6HEH3Y&amp;ct=220531&amp;st=sb\" target=\"_blank\" rel=\"noopener\">Gartner\u2019s Market Guide for AIOps Platforms<\/a> detailed what features and use cases AI brings to the table. They defined AIOps as platforms that can analyze <a href=\"https:\/\/www.sumologic.com\/glossary\/telemetry\/\">telemetry<\/a> and events, and identify meaningful patterns that provide insights to support proactive responses with five common characteristics:<\/p>\n\n\n\n<ol>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2e11bc821cae8493005a17a4dc6c7843\">Cross-domain data ingestion and analytics<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a75c76b5917fa4cea3b274832f922bb1\">Topology assembly from implicit and explicit sources of asset relationship and dependency<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-fe327c95511ed646640d0e65c2b69bab\">Correlation between related or redundant events associated with an incident<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9f7b57807875a185f0c3ee901eda04e0\">Pattern recognition to detect incidents, their leading indicators or probable root cause<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a9c9c43dab648ee7b78745217beb7b9f\">Association of probable remediation<\/p>\n\n\n\n<\/li>\n<\/ol>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e19510a4f534770f4fd046b173bf7426\">I don\u2019t actually think the future will be in AIOps platforms that can ingest huge volumes of telemetry (logs, metrics, traces) and then identify malicious behaviors as they unfold.  We already have tools doing this today in the form of security information and event management (<a href=\"https:\/\/www.sumologic.com\/glossary\/siem\/\">SIEMs<\/a>), security orchestration, automation, and response (<a href=\"https:\/\/www.sumologic.com\/glossary\/soar\/\">SOARs<\/a>) and user and entity behavior analytics (UEBA). <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7db68c3113382cabfa03dcd6107626ec\">What I expect to see is fewer AI-dedicated \u201cplatform\u201d plays and more adoption of ML functionality across proven security solutions. Here at Sumo Logic, for example, our customers have found value in our ability to analyze global security signals in an obfuscated and anonymized way and then present back to customers a global view of attack vectors targeted against them as it compares to thousands of other similar customers. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5e5bfdcba405b2a0884df935cc350b78\">These baselines help our customers optimize their security posture based on how unusual their security findings are compared to others. Because we can apply ML to huge data sets not available to siloed security teams, it\u2019s a value add that only comes with a multi-tenant cloud-native offering. Again, expect next-gen offerings to rapidly adopt these features, especially as Google, Apple, Meta, Baidu and Amazon release native services for developers to play with.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cb5e642094d2ee8a240922158be6fb17\">More than just that bird&#8217;s eye view, it\u2019s also very tactical for security operations center (SOC) analysts. Every security insight generated by Sumo Logic\u2019s <a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-siem-enterprise\/\">Cloud SIEM<\/a> includes a Global Confidence Score baselines of how alerts were previously triaged (true or false positive) by the company&#8217;s SOC analysts and other customers&#8217; SOC teams. The score is then presented on a scale of 0-100, where the higher the value, the more actionable the alert is. \u201cNo score\u201d would mean there is not enough data yet to make any prediction. Learn&nbsp;best practices for making the most of SIEM in <a href=\"https:\/\/www.sumologic.com\/guides\/siem\/\">our ultimate guide<\/a>.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-aec2900296325f64bdb9e23981347608\">We are also in the early stages of an ML-driven rule recommendation feature that will help security engineers determine what severity a security signal should have. As for ChatGPT\u2019s AI, we\u2019re still exploring ways, with trepidation, to incorporate it into our security solutions. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3152c1d1bea381a66f3a41a7a92ae513\">We see some of our customers leveraging it successfully for tasks in both analyst workflows and engineering\/development, driving that shift-left and <a href=\"https:\/\/www.sumologic.com\/glossary\/devsecops\/\">DevSecOps<\/a> approach. I asked <a href=\"https:\/\/www.linkedin.com\/in\/mscottford\/\" target=\"_blank\" rel=\"noopener\">M. Scott Ford<\/a>, Co-Founder &amp; Chief Code Whisperer at CorgiBytes, how he sees things unfold with ChatGPT and AI in modern app development. <\/p>\n\n\n\n<blockquote class=\"pull\">\n<p>Large language models, such as ChatGPT, have a huge potential to be another tool in an application developer&#8217;s toolbox. For example, members of the Legacy Code Rocks community have been experimenting with using ChatGPT to suggest refactoring improvements. I see the potential for a similar approach being used to detect common programming mistakes that can lead to security vulnerabilities. This can help short-circuit the cat-and-mouse game by helping sanitize the security surface as it&#8217;s being developed.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-7e01972d8ab42c55d289f82bca6443ab\" id=\"lowest_hanging_fruit_is_still_ripe_for_the_picking\">Lowest hanging fruit is still ripe for the picking<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-42a3d41a7bce04d14ff1101f8d123aa9\">How much of this technology works its way into our security stack is to be determined, but taking off our propeller head caps for a moment, it\u2019s important to realize that most attackers aren\u2019t \u201c1337\u201d, or at least don\u2019t need to be. Remember the human is still the weakest link, and the easiest way in may be a carefully crafted phishing email with an attachment. We\u2019ve been painfully trained on how to spot phishing attacks. Speaking of which, I think my mandatory training is overdue. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-dc31f35c900892061c89efc17d806299\">But the craft of social engineering and phishing is advancing. They are most effective when written by native English speakers and lethal when done using a little humint research against a target, making emails sound realistic and relevant. This means these attacks can\u2019t be done at scale. Until now, thanks to ChatGPT! <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-344b64138ff907c9739f4337b28b50e7\">It happens to have perfect grammar, can research what a company does, and write extremely realistic emails. What\u2019s even more shocking, is that it has been used to carry on email correspondence with a victim, and only include a malicious attachment after some rapport has been established. And this phishing, vishing (voice phishing), and smishing (SMS text phishing) can all be done programmatically in a scalable way. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a63c40073b8fa741e5efb8416586c80a\">Do we need an AI countermeasure to evaluate each message and provide a \u201chuman vs AI\u201d rating and focus attention on the action it&#8217;s trying to lure us into?<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3a79d50182efa8bc3881a51ea8925637\">Again, not sure who is the cat and who is the mouse anymore, but the double edge sword of AI has led to AI detecting AI. GPTZero for example, claims to be the world&#8217;s #1 AI detector with over one million users. The app, ironically, uses ChatGPT against itself, checking the text to determine how much \u201cAI involvement\u201d there has been by ChatGPT-like services. Perhaps this will be baked into future email protection solutions. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d416293e1c7b8cfa96f0c22fd3b7a068\">Other vendors already claim AI\/ML email threat detection, but then we&#8217;re back to the dsplit technique above. Can an attacker simply <a href=\"https:\/\/www.digitaltrends.com\/computing\/gptzero-how-to-detect-chatgpt-plagiarism\/\" target=\"_blank\" rel=\"noopener\">intentionally misspell<\/a> a few words and get some grammar incorrect to convince GPTZero the authorship was actually human? Can attackers ask ChatGPT to incorporate common spelling and grammar mistakes into natural language processing (NLP) output?<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-30e4a9c6b1394b50c3a34a55a4307ddc\">Although some guardrails are being created to prevent ChatGPT from writing phishing emails or malware, there have been workarounds. One observed use was Telegram bots that leveraged unbounded use of ChatGPT available on dark websites. You could get 20 free sample query options and after that, for every 100 queries, people are being charged $5.50. In some cases, scammers can now craft emails that are so convincing they can <a href=\"https:\/\/fortune.com\/2023\/02\/03\/chatgpt-cyberattacks-cybersecurity-social-engineering-darktrace-abnormal\/\" target=\"_blank\" rel=\"noopener\">extort cash from victims without even relying on malware<\/a>.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-837d48feb02cc8513fa8b1c65bfa7171\">Again, the net of all this is, our detection stack has to be more intelligent and \u201cassume breach\u201d. Track all activity across all entities and identify behavior that is unusual or potentially malicious. It\u2019s never been true that attackers only have to be right once, and defenders have to be right all the time. That only holds true for the initial access. After that, it\u2019s flipped upside down where attackers have to be stealthy all the time as one misstep will trip a wire in a good layered defense strategy. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-711c2e6954a5c90e2dd9f1eb57780611\">Platforms like Sumo Logic include traditional detection rules like brute force attempts, reconnaissance detections etc, but also track each individual user and system dynamically creating Signals when <a href=\"https:\/\/help.sumologic.com\/docs\/cse\/rules\/write-first-seen-rule\/#:~:text=About%20First%20Seen%20rules%E2%80%8B,a%20new%20geographic%20location%20(geolocation)\" target=\"_blank\" rel=\"noopener\">\u201cfirst seen\u201d behavior<\/a> is observed. Has this user logged in from this location before? Has this machine been remotely accessed in this way previously? Has this user accessed these AWS Secrets before? <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2b8dbd26eb1ab60f5b8ad83fcde1df57\">The kill-chain requires attackers to eventually create indicators of compromise, regardless of the initial infection vector. Thus, it\u2019s not more about shifting up, than it is about shifting left.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-a152b194c6b80352e8c98e36c70b5304\" id=\"shall_we_play_a_game?\">Shall we play a game?<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9b5006388d8dad22dc8025caba74b70b\">There is no doubt research is being done at all levels on how to leverage AI in securing our national infrastructure and leveling up our cyber defenders. Truly, there are many areas that ChatGPT can be woven into the defenders workflow. And once a security program is built on top of a platform with intelligent automation, we enter the art of the possible. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-4e90d31e0a6c9b0cc219db04209eb95b\">Eventually, we will be able to use ChatGPT to feed in a lot of detections to make some intelligent determinations\u2026 but we are not there yet. And the best approach is to take a use-case-driven approach to solve pain points individually and programmatically.<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d8e8648d13709a506682a1d39686a806\">Instead of navigating to Ultimate Windows Security to search the thousands of Windows Event-IDs and what they mean, simply have ChatGPT provide you with a summary automatically as part of the workflow. <\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-42dfe050e622b18e4bcc7b9c71602ae8\">Instead of trying to understand what an obfuscated power-shell command is doing, feed it to ChatGPT and have it run its analysis, and provide that as an enrichment.<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c07fc00f5e36abbf7a95620a671783da\">Instead of continuously reinventing the wheel as we create incident response plans and security\/governance policies, ask ChatGPT to write the initial drafts and simply review the output. If you already have a mature security program, take existing documents (sanitize it first) and ask ChatGPT to identify any potential weaknesses or gaps.<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5eb388c6e44d9b64d01357df3ea6426c\">Instead of waiting on a vendor to build a much-needed integration, ask ChatGPT for help. With the rise of \u201cbring your own code\u201d automation and orchestration tools, security analysts with little to no dev experience can ask ChatGPT to create integrations for them. The majority of the time a playbook or enrichment is simply a script with API calls written in Python or Go. Imagine a developer asking ChatGPT \u201cPlease create a script to integrate with a MISP threat intelligence server and prompt for required data\u201d, and with little to no tweaking an integration is up and running. <\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-5b6ee19fb7b1b42d7337eb0e62fc9964\" id=\"verify,_then_trust,_then_verify_again\">Verify, then trust, then verify again<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-0264ef91406880ff2e7be926ac64a078\">Now for some serious disclaimers. ChatGPT is fallible. It may even argue with you that it\u2019s perfect, and insist it doesn\u2019t make mistakes, but that should only increase your caution when incorporating it into your SecOps workflows. It\u2019s imperative we understand the inherent weaknesses of ChatGPT or LLM in general. Nothing it says should be treated as \u201cactionable\u201d unless verified by your in-house correlation engine or human analysts. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-13d8f9004e8906890f8821cad559ad52\">We already know from <a href=\"https:\/\/aisnakeoil.substack.com\/p\/gpt-4-and-professional-benchmarks\" target=\"_blank\" rel=\"noopener\">benchmarks<\/a>, the training set of data on which AI relies can be contaminated and incorrect. No matter how good you think your defenses are, it\u2019s imperative you simulate real-world attacks and continuously verify what your security controls will prevent, detect, or miss. Red-teaming, blue-teaming, purple-teaming, and breach and attack simulation (BAS) solutions are necessary to validate your investments in SIEM, UEBA, and SOAR solutions.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f003de140c5db474ce09db88e451c6f6\">In addition, know that <a href=\"https:\/\/katedowninglaw.com\/2023\/03\/10\/openais-massive-data-grab\/\" target=\"_blank\" rel=\"noopener\">NOTHING IS PRIVATE<\/a> when it comes to conversing and interacting with ChatGPT. Per the OpenAI agreements and policies, all is fair game with data submitted as the confidentiality protection is solely in OpenAI\u2019s favor. That means that neither the inputs provided to OpenAI nor the output it produces are treated as confidential by OpenAI. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cb9969549d5f0f8d2e046205d1292ba6\">There is a definite risk here of developers or analysts inadvertently leaking sensitive information and unknowingly thinking there is some sort of SaaS-type privacy agreement in place. <a href=\"https:\/\/mashable.com\/article\/chatgpt-bug-user-histories\" target=\"_blank\" rel=\"noopener\">Just recently some users discovered<\/a> that they could see the titles of other people&#8217;s chat histories causing the platform to be taken down for ten hours. This is the wild-west, and remember many components of ChatGPT are still in beta.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-8ab72ac645d5eaabc27a8761d989a36f\">In closing, we are rapidly moving from an AI-assisted to an AI-led way of operating. We recommend carving out time across your teams to review how to best <strong>defend against<\/strong> and <strong>defend with<\/strong> burgeoning AI technology. Try to avoid chasing after the next shiny thing. Focus on continuous improvement and trusted technologies and partners. Economic headwinds demand we do more with less, and ChatGPT may prove to be a good partner in some unexpected ways, even with the unforeseen risks it introduces.<br><\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-26d17bccc4a2b6d27a9abf094e790d78\">How will the open source community respond to level up defenders on this new threat type? <a href=\"https:\/\/www.sumologic.com\/blog\/ultimate-race-condition-securing-open-source-infrastructure\/\">Learn more about the advancements of open-source security solutions.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":78,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"10","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[127],"blog-tag":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"71501,4668,71369","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[127],"blog-tag":[],"class_list":["post-4883","blog","type-blog","status-publish","hentry","blog-category-secops-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/78"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4883\/revisions"}],"predecessor-version":[{"id":20640,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4883\/revisions\/20640"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=4883"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-category?post=4883"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-tag?post=4883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}