{"id":1722,"date":"2025-06-11T21:44:20","date_gmt":"2025-06-11T19:44:20","guid":{"rendered":"https:\/\/ai4cyber.eu\/?p=1722"},"modified":"2025-06-11T21:56:01","modified_gmt":"2025-06-11T19:56:01","slug":"ai4cyber-at-jnicjornadas-nacionales-de-investigacion-en-ciberseguridad-2025","status":"publish","type":"post","link":"https:\/\/ai4cyber.eu\/?p=1722","title":{"rendered":"AI4CYBER at JNIC(Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad) 2025"},"content":{"rendered":"<p data-start=\"44\" data-end=\"456\"><strong data-start=\"44\" data-end=\"79\">\ud83d\udce2 Last Thursday (June 5, 2025)<\/strong>, Oscar Llorente from Tecnalia presented a poster at the JNIC 2025 conference about paper titled\u202f<em data-start=\"181\" data-end=\"273\">\u201cUnleashing offensive artificial intelligence: Automated attack technique code generation\u201d<\/em>, originally published in <em data-start=\"299\" data-end=\"321\">Computers &amp; Security<\/em> in 2024.<\/p>\n<p data-start=\"44\" data-end=\"456\">His presentation included key insights and highlights from the paper.<span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">The paper explores the innovative concept of automatically generating attack code using AI\u2014a striking example of offensive AI in action.<\/span><\/p>\n<p data-start=\"44\" data-end=\"456\">The short glimpse of the paper can be found here:<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404824003821\"> https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404824003821<\/a><\/p>\n<p data-start=\"44\" data-end=\"456\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-1728\" src=\"https:\/\/ai4cyber.eu\/wp-content\/uploads\/2025\/06\/shared-image.png\" alt=\"\" width=\"1530\" height=\"2040\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udce2 Last Thursday (June 5, 2025), Oscar Llorente from Tecnalia presented a poster at the JNIC 2025 conference about paper titled\u202f\u201cUnleashing offensive artificial intelligence: Automated attack technique code generation\u201d, originally published in Computers &amp; Security in 2024. His presentation included key insights and highlights from the paper.The paper explores the innovative concept of automatically generating [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[9],"tags":[],"class_list":["post-1722","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/posts\/1722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1722"}],"version-history":[{"count":3,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/posts\/1722\/revisions"}],"predecessor-version":[{"id":1731,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/posts\/1722\/revisions\/1731"}],"wp:attachment":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}