AI (Artificial Intelligence) systems can process large amounts of data and uncover threats that human beings might overlook.
This makes quick action possible, as AI can monitor network traffic, user activities, and system logs and identify abnormal actions, intrusions, and cyberattacks.
As many cybersecurity tasks could be automated. Not only this even, it also improves efficiency, and due to this, there is less probability of human mistakes.
Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities. :
AcuRisQ, that helps you to quantify risk accurately:
A Spanish pentester with a “luijait” alias on Github recently unveiled an AI OSINT tool dubbed “DarkGPT” that helps detect leaked databases.
Based on GPT-4-200K, DarkGPT is an AI (Artificial Intelligence) assistant that can run queries on databases that have been compromised.
Its ability to learn and adapt is another important advantage of AI in cybersecurity.
On the other hand, as new threats come up, AI systems may be trained to identify and respond to these threats.
This is especially critical in a fast-changing cyber threat landscape where conventional security measures are often inadequate.
The security researcher affirmed that to install the AI OSINT tool, “DarkGPT,” users must have Python installed on their system, as with Python 3.8 and higher versions, this project has been tested.
Here below, we have mentioned the complete setup:–
First of all, by executing the following command in your terminal, you have to clone the GitHub repository to your local machine
git clone https://github.com/luijait/DarkGPT.git cd DarkGPT
DEHASHED_API_KEY=”your_dehashed_api_key_here”
pip install -r requirements.txt
python3 main.py
The DarkGPT could be a game-changer relief tool for security researchers as it will help them in their traditional OSINT processes and make them more efficient.
With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…