Saturday, 23 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > Cisco Warns: Fine-tuning turns LLMs into threat vectors
Tech and Science

Cisco Warns: Fine-tuning turns LLMs into threat vectors

Last updated: April 6, 2025 7:44 am
Share
Cisco Warns: Fine-tuning turns LLMs into threat vectors
SHARE

Weaponized large language models (LLMs) that have been fine-tuned with offensive tradecraft are revolutionizing cyberattacks, prompting CISOs to rethink their strategies. These advanced models are capable of automating reconnaissance, impersonating identities, and bypassing real-time detection, thus enabling large-scale social engineering attacks.

Popular models like FraudGPT, GhostGPT, and DarkGPT are now available for as little as $75 a month and are specifically designed for malicious activities such as phishing, exploit generation, and credit card validation. Cybercriminal groups, as well as nation-states, are capitalizing on the revenue potential of these weaponized LLMs by offering them as platforms, kits, and leasing options. These models are increasingly being packaged and sold in a similar manner to legitimate SaaS applications, complete with dashboards, APIs, regular updates, and even customer support.

The rise of weaponized LLMs has blurred the lines between legitimate models and malicious tools, putting legitimate LLMs at risk of being compromised and incorporated into cybercriminal toolchains. Fine-tuning an LLM increases the likelihood of it generating harmful outputs, making it susceptible to attacks such as jailbreaks, prompt injections, and model inversion. Without robust security measures in place, fine-tuned models can quickly become liabilities for organizations, providing attackers with an opportunity to infiltrate and exploit them.

Research conducted by Cisco’s security team has shown that fine-tuning LLMs can compromise their alignment, particularly in industries like healthcare and finance where compliance and safety are paramount. Jailbreak attempts against fine-tuned models have been successful at much higher rates compared to base models, highlighting the increased attack surface that comes with fine-tuning.

See also  Shark's 'mystery hat' turns out to be a giant octopus

Malicious LLMs are now available on the black market for as little as $75 a month, providing cybercriminals with plug-and-play tools for various malicious activities. These models lack the built-in safety features of mainstream LLMs and offer APIs, updates, and dashboards that resemble legitimate SaaS products.

Additionally, the ease with which attackers can poison open-source training datasets for AI models poses a significant threat to AI supply chains. By injecting malicious data into widely used training sets, adversaries can influence the outputs of LLMs in impactful ways, leading to potential security breaches and vulnerabilities.

Furthermore, decomposition attacks can quietly extract copyrighted and regulated content from LLMs without triggering any guardrails. This poses a significant challenge for enterprises, especially those in regulated sectors like healthcare and finance, as it introduces a new compliance risk that extends beyond traditional regulations.

In conclusion, the evolving landscape of weaponized LLMs underscores the need for enhanced security measures and real-time visibility across IT infrastructures. Security leaders must recognize that LLMs are not just tools but represent the latest attack surface that requires proactive defense strategies to mitigate risks effectively.

TAGGED:CiscoFinetuningLLMsThreatTurnsvectorsWarns
Share This Article
Twitter Email Copy Link Print
Previous Article CBO says Medicare’s main trust fund to last until 2052 CBO says Medicare’s main trust fund to last until 2052
Next Article Leg Makeup Tips For A Swell Date Night Experience Leg Makeup Tips For A Swell Date Night Experience
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

Mysterious Blobs Deep Inside Earth May Fuel Deadly Volcanic Eruptions : ScienceAlert

Exploring the Deep Earth Structures that Influence Volcanic Eruptions Volcanic eruptions have the power to…

July 14, 2025

The everyday ways climate change is already making our lives worse

Climate change is already making our lives worseAHMAD AL-RUBAYE/AFP via Getty Images Climate change is…

May 9, 2025

Here’s What Hit CDW Corporation (CDW) in Q4

Fenimore Asset Management, an investment management company, recently released its Q4 2025 investor letter, providing…

January 16, 2026

What Is ‘Spoofing’? How a U.S.-Seized Oil Tanker Reportedly Tried to Evade Detection

Dark-Fleet Ships and Their Digital Disappearing Act: Unveiling the Mystery On December 12, 2025, an…

December 12, 2025

How Your Body Defends Its Weight Set Point

The human body is a complex and sophisticated machine that maintains a biological "set point"…

November 5, 2025

You Might Also Like

Android 17 QPR1 Beta 3 New Features & Changes
Tech and Science

Android 17 QPR1 Beta 3 New Features & Changes

May 23, 2026
Mercury may have gained all of its unexpected water in a single day
Tech and Science

Mercury may have gained all of its unexpected water in a single day

May 22, 2026
How to Choose the Right Digital Twin Development Partner
Tech and Science

How to Choose the Right Digital Twin Development Partner

May 22, 2026
Kash Patel’s clothing brand website shut down after reports it was hacked
Tech and Science

Kash Patel’s clothing brand website shut down after reports it was hacked

May 22, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?