{"id":34038,"date":"2023-11-29T15:00:00","date_gmt":"2023-11-29T23:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=34038"},"modified":"2023-11-28T13:48:13","modified_gmt":"2023-11-28T21:48:13","slug":"sophos-anticipates-ai-based-attack-techniques-and-prepares-detections","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","title":{"rendered":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"246\" height=\"150\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/05\/Sophos_logo.png\" alt=\"\" class=\"wp-image-32522\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/05\/Sophos_logo.png 246w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/05\/Sophos_logo-150x91.png 150w\" sizes=\"(max-width: 246px) 100vw, 246px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/www.sophos.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sophos<\/a>, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. The first report\u2014\u201c<a href=\"https:\/\/news.sophos.com\/en-us\/2023\/11\/27\/the-dark-side-of-ai-large-scale-scam-campaigns-made-possible-by-generative-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI<\/a>\u201d\u2014demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud on a massive scale with minimal technical skills. However, a second report, titled \u201c<a href=\"https:\/\/news.sophos.com\/en-us\/2023\/11\/28\/cybercriminals-cant-agree-on-gpts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybercriminals Can\u2019t Agree on GPTs<\/a>,\u201d found that, despite AI\u2019s potential, rather than embracing large language models (LLMs) like ChatGPT, some cybercriminals are skeptical and even concerned about using AI for their attacks.<\/p>\n\n\n\n<p><strong>The Dark Side of AI<\/strong><\/p>\n\n\n\n<p>Using a simple e-commerce template and LLM tools like GPT-4, Sophos X-Ops was able to build a fully functioning website with AI-generated images, audio, and product descriptions, as well as a fake Facebook login and fake checkout page to steal users\u2019 login credentials and credit card details. The website required minimal technical knowledge to create and operate, and, using the same tool, Sophos X-Ops was able to create hundreds of similar websites in minutes with one button.<\/p>\n\n\n\n<p><em>\u201cIt\u2019s natural\u2014and expected\u2014for criminals to turn to new technology for automation. The original creation of spam emails was a critical step in scamming technology because it changed the scale of the playing field. New AIs are poised to do the same; if an AI technology exists that can create complete, automated threats, people will eventually use it. We have already seen the integration of generative AI elements in classic scams, such as AI-generated text or photographs to lure victims.<\/em><\/p>\n\n\n\n<p><em>However, part of the reason we conducted this research was to get ahead of the criminals. By creating a system for large-scale fraudulent website generation that is more advanced than the tools criminals are currently using, we have a unique opportunity to analyze and prepare for the threat before it proliferates,\u201d said Ben Gelman, senior data scientist, Sophos.<\/em><\/p>\n\n\n\n<p><strong>Cybercriminals Can\u2019t Agree on GPTs<\/strong><\/p>\n\n\n\n<p>For its research into attacker attitudes towards AI, Sophos X-Ops examined four prominent dark web forums for LLM-related discussions. While cybercriminals\u2019 AI use appears to be in its early stages, threat actors on the dark web are discussing its potential when it comes to social engineering. Sophos X-Ops has already witnessed the use of AI in\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2023\/08\/02\/sha-zhu-pan-scam-uses-ai-chat-to-target-iphone-and-android-users\/\" target=\"_blank\" rel=\"noreferrer noopener\">romance-based, crypto scams<\/a>.<\/p>\n\n\n\n<p>In addition, Sophos X-Ops found that the majority of posts were related to compromised ChatGPT accounts for sale and \u201cjailbreaks\u201d\u2014ways to circumvent the protections built into LLMs, so cybercriminals can abuse them for malicious purposes. Sophos X-Ops also found ten ChatGPT-derivatives that the creators claimed could be used to launch cyber-attacks and develop malware. However, threat actors had mixed reactions to these derivatives and other malicious applications of LLMs, with many criminals expressing concern that the creators of the ChatGPT imitators were trying to\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2022\/12\/07\/the-scammers-who-scam-scammers-on-cybercrime-forums-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">scam them<\/a>.<\/p>\n\n\n\n<p><em>\u201cWhile there\u2019s been significant concern about the abuse of AI and LLMs by cybercriminals since the release of ChatGPT, our research has found that, so far, threat actors are more skeptical than enthused. Across two of the four forums on the dark web we examined, we only found 100 posts on AI. Compare that to cryptocurrency where we found 1,000 posts for the same period.<\/em><\/p>\n\n\n\n<p><em>We did see some cybercriminals attempting to create malware or attack tools using LLMs, but the results were rudimentary and often met with skepticism from other users. In one case, a threat actor, eager to showcase the potential of ChatGPT inadvertently revealed significant information about his real identity. We even found numerous \u2018thought pieces\u2019 about the potential negative effects of AI on society and the ethical implications of its use. In other words, at least for now, it seems that cybercriminals are having the same debates about LLMs as the rest of us,\u201d said Christopher Budd, director, X-Ops research, Sophos.<\/em><\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. The first report\u2014\u201cThe Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI\u201d\u2014demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud on a massive scale with minimal technical skills.<\/p>\n","protected":false},"author":10513,"featured_media":32645,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[526,180,67,268,56,84,1],"tags":[437,1254,1245,1248,110,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. The first report\u2014\u201cThe Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI\u201d\u2014demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud on a massive scale with minimal technical skills.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T21:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/AI_shutterstock_2287025875_special-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/\",\"name\":\"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-11-29T23:00:00+00:00\",\"dateModified\":\"2023-11-28T21:48:13+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","og_locale":"en_US","og_type":"article","og_title":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA","og_description":"Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. The first report\u2014\u201cThe Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI\u201d\u2014demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud on a massive scale with minimal technical skills.","og_url":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-11-29T23:00:00+00:00","article_modified_time":"2023-11-28T21:48:13+00:00","og_image":[{"width":1100,"height":550,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/AI_shutterstock_2287025875_special-1.jpg","type":"image\/jpeg"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","url":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","name":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-11-29T23:00:00+00:00","dateModified":"2023-11-28T21:48:13+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/AI_shutterstock_2287025875_special-1.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8R0","jetpack-related-posts":[{"id":32521,"url":"https:\/\/insidebigdata.com\/2023\/06\/02\/fake-chatgpt-apps-scam-users-out-of-thousands-of-dollars-sophos-reports\/","url_meta":{"origin":34038,"position":0},"title":"Fake ChatGPT Apps Scam Users Out of Thousands of Dollars, Sophos Reports","date":"June 2, 2023","format":false,"excerpt":"Sophos, a global leader in innovating and delivering cybersecurity as a service, announced that it had uncovered multiple apps masquerading as legitimate, ChatGPT-based chatbots to overcharge users and bring in thousands of dollars a month. As detailed in Sophos X-Ops' latest report, \u201c\u2019FleeceGPT\u2019 Mobile Apps Target AI-Curious to Rake in\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/04\/ChatGPT_shutterstock_2249988847_small.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32859,"url":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","url_meta":{"origin":34038,"position":1},"title":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks","date":"July 14, 2023","format":false,"excerpt":"SlashNext published a research report detailing a unique module based on ChatGPT that was created by cybercriminals with the explicit intent of leveraging generative AI for nefarious purposes.\u00a0These research findings have widespread implications for the security community in understanding how bad actors are not only manipulating generative AI platforms like\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32465,"url":"https:\/\/insidebigdata.com\/2023\/05\/24\/lets-talk-about-chatgpt-and-fraud\/","url_meta":{"origin":34038,"position":2},"title":"ChatGPT: A Fraud Fighter\u2019s Friend or Foe?","date":"May 24, 2023","format":false,"excerpt":"In this contributed article, Doriel Abrahams, Head of Risk, U.S., Forter, explores how ChatGPT can combine with social engineering to conduct fraud, some of the generative AI trends he anticipates will play out this year, and how existing fraud rings could use the technology to manipulate both businesses and consumers\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/04\/ChatGPT_shutterstock_2249988847_small.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32802,"url":"https:\/\/insidebigdata.com\/2023\/07\/09\/generative-ai-report-daas-startup-facteus-launches-mobius\/","url_meta":{"origin":34038,"position":3},"title":"Generative AI Report: DaaS Startup Facteus Launches Mobius","date":"July 9, 2023","format":false,"excerpt":"Welcome to the Generative AI Report, a new feature here on insideBIGDATA with a special focus on all the new applications and integrations tied to generative AI technologies. We\u2019ve been receiving so many cool news items relating to applications centered on large language models, we thought it would be a\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/GenerativeAI_shutterstock_2313909647_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32994,"url":"https:\/\/insidebigdata.com\/2023\/07\/28\/generative-ai-report-fraudgpt-ai-powered-fraud-begins\/","url_meta":{"origin":34038,"position":4},"title":"Generative AI Report: FraudGPT &#8211; AI Powered Fraud Begins","date":"July 28, 2023","format":false,"excerpt":"Word out on the street is that FraudGPT\u00a0has launched. It's an\u00a0AI bot exclusively targeted for offensive purposes, such as crafting spear phishing emails, creating cracking tools, and creating fake identities, and it signals the first major instance of a published fraud-focused AI tool. FraudGPT follows in the footsteps of WormGPT.","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/uwaH33zGKRY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":32902,"url":"https:\/\/insidebigdata.com\/2023\/07\/22\/generative-ai-report-commandbar-releases-ai-powered-helphub-to-overlay-chatgpt-onto-any-product\/","url_meta":{"origin":34038,"position":5},"title":"Generative AI Report: CommandBar Releases AI-Powered HelpHub to Overlay ChatGPT Onto Any Product","date":"July 22, 2023","format":false,"excerpt":"Welcome to the Generative AI Report, a new feature here on insideBIGDATA with a special focus on all the new applications and integrations tied to generative AI technologies. We\u2019ve been receiving so many cool news items relating to applications centered on large language models, we thought it would be a\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/ChatGPT_shutterstock_2249988847_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/34038"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=34038"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/34038\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/32645"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=34038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=34038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=34038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}