Almost immediately after its appearance, ChatGPT

Discuss smarter ways to manage and optimize cv data.
Post Reply
tanjimajuha20
Posts: 682
Joined: Thu Jan 02, 2025 7:18 am

Almost immediately after its appearance, ChatGPT

Post by tanjimajuha20 »

The most famous system using large language models (LLM in English abbreviation) is ChatGPT, which appeared on November 30, 2022. This tool produced texts that even experts could not always distinguish from those written by humans. In particular, according to the results obtained by Catherine Gao, an instructor in pulmonology and emergency medicine at the Feinberg School of Medicine at Northwestern University (Evanston, Illinois, USA) , 32% of article japan cell phone number list abstracts generated by ChatGPT passed the review of scientific journal reviewers. And a number of educational institutions even urgently changed the procedures for monitoring student knowledge, abandoning essays and compositions.
was used by cybercriminals. According to a study by Check Point Research, this tool is already being used to write programs in Python, Java, and the macro language of MS Office applications aimed at data theft, extortion, and distribution of malicious code.

The buzz around the trendy service has also been exploited by dubious mobile app creators. "The App Store is full of apps that are paid front-ends for ChatGPT, making you believe you're paying to access the platform," warned Bloomtech founder and CEO Austin Allred. The situation on Google Play is even worse: many apps require payment but don't have the functionality they claim.

According to Positive Technologies business consultant Alexey Lukatsky, ChatGPT can be a very dangerous tool in the hands of authors of phishing mailings and websites, since the credibility of the texts will become higher. However, the expert predicted that ChatGPT can become a very useful tool for creating highly automated systems: "We expect automation of routine tasks through the use of specialized software, such as SOAR class systems, or individual modules and functions in existing software, such as SIEM, NDR or WAF solutions, which allow solving most information security tasks with the help of existing specialists, as well as through the use of unique protection tools based on the use of machine learning technologies and capable of preventing hacker attacks with the help of literally one or two information security experts."
Post Reply