<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Rayan BEN TALEB, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/rayan-ben-taleb/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/rayan-ben-taleb/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 06 Mar 2026 10:23:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Rayan BEN TALEB, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/rayan-ben-taleb/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Integrating AI into SOC tools: Global overview and current trends in the European market </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/#respond</comments>
		
		<dc:creator><![CDATA[Rayan BEN TALEB]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 11:15:02 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[detection and incident response tools]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29280</guid>

					<description><![CDATA[<p>AI for SOC, Where do we stand today ?    A quiet revolution is underway in European SOCs. Faced with ever-growing volumes of security events and a persistent shortage of skilled experts, a new generation of AI-powered security tools is emerging, designed to identify correlations that human teams can no longer process alone. AI is not replacing analysts but accelerating and enhancing their...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/">Integrating AI into SOC tools: Global overview and current trends in the European market </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">AI for SOC, Where do we stand today ?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">A quiet revolution is underway in European SOCs. Faced with ever-growing volumes of security events and a persistent shortage of skilled experts, a new generation of AI-powered security tools is emerging, designed to identify correlations that human teams can no longer process alone. </span><b><span data-contrast="auto">AI is not replacing analysts but</span></b><span data-contrast="auto"> </span><b><span data-contrast="auto">accelerating and enhancing their work</span></b><span data-contrast="auto">. Between ambitions of hyper‑automation, challenges around model transparency, and the growing push for European digital sovereignty, the landscape of detection and incident-response solutions is rapidly evolving. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To support this ongoing market transformation, the French National Cybersecurity Agency (ANSSI) and <a href="https://cyber.gouv.fr/offre-de-service/ncc-fr/"><strong>the French National Cyber Coordination Center (NCC‑FR),</strong></a> hosted by ANSSI, have launched an ambitious initiative to provide a detail overview of how IA is used for SOC by conducting a thorough stud</span><span data-contrast="auto">y <span style="color: #3366ff;">[1]</span></span><span data-contrast="auto"><span style="color: #3366ff;"> </span>with major European players specializing in SOC‑oriented security solutions.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">The study had two main objectives:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ol>
<li><span data-contrast="auto">Identify European players developing solutions for SOCs that integrate AI-based features </span><span data-contrast="auto"><span style="color: #3366ff;">[2]</span>.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Build an overview of the use cases available on the market, including those offered by leading US vendors operating in Europe.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ol>
<p><b><span data-contrast="auto">This article summarises the key insights drawn from our study conducted among 48 detection and response solution vendors.</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></p>
<p style="text-align: center;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-29321" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN.png" alt="" width="363" height="346" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN-200x191.png 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-1-EN-41x39.png 41w" sizes="(max-width: 363px) 100vw, 363px" /><em><span class="TextRun Highlight SCXW237010174 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW237010174 BCX8">Geographical</span></span><span class="TextRun Highlight SCXW237010174 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW237010174 BCX8"> distribution of the vendors interviewed</span></span></em></p>
<p style="text-align: center;"> </p>
<h1 style="text-align: justify;"><span data-contrast="none">A booming European market undergoing consolidation</span><span data-contrast="none"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The study covered 48 vendors. Among them, 34 are European companies (out of an initial pool of 72 European actors identified), while the remaining 14 are major US‑based vendors firmly established in Europe. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;">The market<span data-contrast="auto"> shows clear signs of consolidation, marked by numerous acquisitions, most often involving European companies being acquired by US firms. These acquisitions primarily aim at reinforcing detection and response capabilities, expanding protection coverage, or, more marginally, integrating AI components directly dedicated to detection. </span><b><span data-contrast="auto">Thus,</span></b><strong> v</strong><b><span data-contrast="none">endors are converging towards a unified platform approach capable of addressing the full spectrum of SOC needs.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> <br /><span data-contrast="auto">Some European initiatives, such as the OPEN XDR alliance, aim at providing a collective response to platform‑related challenges without relying on acquisition strategies between vendors.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Meetings held with vendors revealed several key insights.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">First, <strong>GenAI, or Generative AI</strong> (AI capable of generating original content from instructions), <strong>is starting to appear within SOC solutions,</strong> primarily through chatbots integrated into analysis interfaces; however, their capabilities remain highly limited and inconsistent. These chatbots almost always rely on external technologies, particularly LLMs provided by a small group of major players such as OpenAI, Google, Meta, Anthropic, or Mistral AI, who largely dominate the market. This reliance on third‑party solutions, which often involves transferring data to the environments of these providers, raises significant concerns regarding the protection of sensitive information handled within SOCs.</span> <br /><span data-contrast="auto">To reduce this dependency, several vendors are now considering adopting open‑source LLMs that can be deployed directly within their own environments, enabling greater control over their data and keeping sensitive flows internally.</span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-29317" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN.png" alt="" width="1138" height="877" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN.png 1138w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-248x191.png 248w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-51x39.png 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-2-EN-768x592.png 768w" sizes="(max-width: 1138px) 100vw, 1138px" /></p>
<p style="text-align: center;"><em><span class="TextRun Highlight SCXW95659998 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW95659998 BCX8">Overview of the LLMs used by the vendors</span></span><span class="EOP SCXW95659998 BCX8" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Besides, the use of </span><b><span data-contrast="auto">PredAI, or Predictive AI</span></b><span data-contrast="auto"> (AI capable of predicting or classifying an input based on &#8220;knowledge&#8221; acquired during a training phase), is considerably more mature. Some European vendors have been relying on such approaches for more than </span><strong>15</strong><span data-contrast="auto"> years to support use cases ranging from behavioral detection to alert prioritization, demonstrating genuine maturity and established expertise. Most of these use cases focus on the detection phase, where predictive models are widely used, well mastered, and most relevant.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, several vendors are beginning to explore agentic approaches, with the ambition of gradually delegating part of the repetitive or time‑consuming tasks, particularly </span><b><span data-contrast="auto">t</span></b><b><span data-contrast="auto">he initial qualification of alerts and some steps of the investigation process.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Finally, these findings should be interpreted with caution: the vendors included in the study represent only a sample of this fast-evolving market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}">  </span></p>
<p> </p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-29313" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR.png" alt="" width="1141" height="1054" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR.png 1141w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-207x191.png 207w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-42x39.png 42w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-3-EN-et-FR-768x709.png 768w" sizes="(max-width: 1141px) 100vw, 1141px" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;"><em><span class="TextRun Highlight SCXW178773307 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption">Overview of </span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption">European</span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption"> vendors in Detection &amp; Incident Response solutions</span><span class="NormalTextRun SCXW178773307 BCX8" data-ccp-parastyle="caption"> using AI</span></span><span class="EOP SCXW178773307 BCX8" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></em><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;"> </h1>
<h1 style="text-align: justify;"><span data-contrast="none">Overview of AI use cases in detection and incident response tools </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-29315" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR.png" alt="" width="1729" height="1032" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR.png 1729w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-768x458.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Figure-4-EN-et-FR-1536x917.png 1536w" sizes="auto, (max-width: 1729px) 100vw, 1729px" /></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><i><span data-contrast="none">Overview of AI use cases in the SOC operations chain</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">The study identified around </span><b><span data-contrast="auto">50 use cases</span></b><span data-contrast="auto"> that can fall under 2 main categories: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">Use cases based on </span><b><span data-contrast="auto">Predictive AI</span></b><span data-contrast="auto"> models, primarily designed for incident detection;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Use cases relying on </span><b><span data-contrast="auto">Generative AI</span></b><span data-contrast="auto">, which focus mainly on investigation and incident response tasks.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Even though the use cases are diverse and hard to list exhaustively, several major categories can nonetheless be identified. Each of these categories is designed to address similar challenges and support the same objective. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">For incident detection</span></b><span data-contrast="auto">, the following AI use case categories can be identified:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">Detection of abnormal behaviour from users or assets;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Detection of anomalies in network traffic;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Detection of events suggesting a possible attack;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">detectionof phishing attempts;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">and detection of malicious files.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">A new category, regrouping usecases fully addressed by Generative AI, is currently emerging and often addressed by chatbot assistant. </span><b><span data-contrast="auto">Vendors are currently concentrating most of their efforts on these analyst‑oriented assistants,</span></b><span data-contrast="auto"> into which they are progressively integrating a wide range of use cases. Their priority is to simplify access to documentation and provide answers to operational questions, as well as extend these capabilities towards more advanced qualification or investigation tasks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To achieve this, nearly all vendors follow the same approach by:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">leveraging a third-party foundation model;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">applying prompt engineering to make the best use of the model’s capabilities by guiding it towards specific topics;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">and using RAG (Retrieval‑Augmented Generation), which customizes and enriches the model’s output by supplying it with an authoritative documentation base to create its responses.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Last, some </span><i><span data-contrast="auto">agentic</span></i><span data-contrast="auto"> use cases, based on autonomous agents, are beginning to appear even if they still remain limited. They are currently being addressed by the most advanced and mature vendors in the sector, as well as by start-ups seeking to disrupt the market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Unlike most vendors, who are gradually integrating AI use cases into an existing cybersecurity platform, these newcomers are betting on specialized AI-driven solutions designed to address a specific cybersecurity task. Among these use cases are </span><b><span data-contrast="auto">agents dedicated to threat hunting, advanced malware analysis (including automated reverse engineering), as well as the initial qualification of alerts. </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><i><span data-contrast="auto">Agentic </span></i><span data-contrast="auto">use cases, however, remain only marginally deployed to date. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span data-contrast="none">To go deeper&#8230;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">ANSSI has published a comprehensive report detailing all the results of the study: </span><a href="https://urldefense.com/v3/__https:/cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/__;!!NEMsmePo_HYI!f015UVEtRs-UAwyRJ8LpLL41rxHr0UoUjasSKIaq5Lasas4qs_LFVOLY8uz1QN_hCDWN4e_YNkQ-xRZlO90aSqAki3kuy3A25wqxMFI$"><span data-contrast="none">https://cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This document now serves as a key reference for understanding current trends and the future evolution of AI’s role in detection and incident response. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Ultimately, the study highlights a European cybersecurity market that is undergoing rapid restructuring, driven by the rise of AI but also marked by a strong consolidation dynamic. Within this shifting landscape, AI continues to gain maturity across SOC tooling: from Predictive‑AI‑based detection use cases, to GenAI‑powered analytical assistants, all the way to early but promising agentic approaches. This trajectory confirms that intelligent automation will become a major lever for increasing operational efficiency and strengthening organizations’ ability to defend against tomorrow’s threats.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">References</h1>
<p style="text-align: justify;"><span style="color: #000000;" data-contrast="auto">[1]</span><span data-contrast="auto"> Study conducted from October 2024 to July 2025 &#8211; <a href="https://urldefense.com/v3/__https:/cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/__;!!NEMsmePo_HYI!f015UVEtRs-UAwyRJ8LpLL41rxHr0UoUjasSKIaq5Lasas4qs_LFVOLY8uz1QN_hCDWN4e_YNkQ-xRZlO90aSqAki3kuy3A25wqxMFI$">https://cyber.gouv.fr/enjeux-technologiques/intelligence-artificielle/etude-de-marche-lia-au-service-de-la-detection-et-de-la-reponse-a-incident/</a> </span></p>
<p style="text-align: justify;"><span style="color: #000000;" data-contrast="auto">[2]</span><span data-contrast="auto"><span style="color: #000000;"> Artificial intelligence-based features : <span class="TrackChangeTextInsertion TrackedChange SCXW219852967 BCX8"><span class="TextRun SCXW219852967 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW219852967 BCX8" data-ccp-parastyle="footer">Set</span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer"> of features using machine learning models (ML, deep learning, LLM) capable of learning from data and producing new analyses, </span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer">predictions</span><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer"> or content</span></span></span><span class="TextRun SCXW219852967 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW219852967 BCX8" data-ccp-parastyle="footer">.</span></span></span></span></p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/">Integrating AI into SOC tools: Global overview and current trends in the European market </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/integrating-ai-into-soc-tools-state-of-the-art-technology-and-current-trends-in-the-european-market/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leaking Minds: How Your Data Could Slip Through AI Chatbots </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/#respond</comments>
		
		<dc:creator><![CDATA[Rayan BEN TALEB]]></dc:creator>
		<pubDate>Wed, 21 May 2025 14:21:32 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Chatbots]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[genai]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26043</guid>

					<description><![CDATA[<p>OpenAI’s flagship ChatGPT was over the news 18 months ago for accidentally leaking a CEO’s personal information after being asked to repeat a word forever. This is among the many  exploits that have been discovered in recent months.   Figure 1...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/">Leaking Minds: How Your Data Could Slip Through AI Chatbots </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">OpenAI’s flagship ChatGPT was over the news 18 months ago for accidentally leaking a CEO’s personal information after being asked to repeat a word forever. This is among the many  exploits that have been discovered in recent months. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-26024 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/05/Diapositive1-e1747818653646.jpg" alt="Example of the PII Leaking exploit found in ChatGPT in December 2023" width="1280" height="720" /></p>
<p style="text-align: center;"><em>Figure 1 : Example of the Leaking exploit found in ChatGPT in December </em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Scandals like these highlight a deeper truth: the core architecture of Large Language Models (LLMs) such as GPT and Google’s Gemini is inherently prone to data leakage. This leakage can involve Personally Identifiable Information (PII) or confidential company data. The techniques used by attackers will continue to evolve in response to improved defenses from tech giants, the underlying vectors remain unchanged.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Today, three main vectors exist through which PIIs (Personally Identifiable Information) or sensitive data might be exposed to such attacks: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The use of publicly available web content in training datasets</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><span data-contrast="auto">The continuous re-training of models using user prompts and conversations</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><span data-contrast="auto">The introduction of persistent memory features in chatbots</span> <br /><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
</ul>
<h2 style="text-align: justify;"><b><span data-contrast="none">LLM Pre-Training Data Leakage </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Most models available right now are transformer models, specifically GPTs or Generative Pre-Trained Transformers. The Pre-Trained in GPT refers to the initial training phase, where the model is exposed to a massive, diverse corpus of data unrelated to its final application. This helps the model learn foundational knowledge such as grammar, vocabulary, and factual information. When GPTs were first released, companies were transparent on where this training data came from, but currently the largest models on the web have datasets that are too large and too diverse and are often kept confidential. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A major source of the data used in GPT pre-training are online forums such as Reddit (for Google’s models), Stack Overflow, and other social media platforms. This poses a significant risk since these social media forums often contain PIIs . Although companies claim to filter out PII during training, there have been many instances where LLMs have leaked personal data from their pre-training data corpus to users after some prompt engineering and jail breaking. This danger will become ever more present as companies race to gather more data through web scraping to train larger and more sophisticated models. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Known leaks of this type are mostly uncovered by researchers who develop more and more creative methods to bypass the defenses of chatbots. The example mentioned earlier is one such case. By prompting the chatbot to repeat forever a word, it &#8220;forgets&#8221; its task and begins to exhibit a behavior known as memorization. In this state, the chatbot regurgitates data from its training set. While this attack has been patched, new prompt techniques continue to be found to change the behavior of the chatbot.</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="none">User Input Re-Usage and Re-Training </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">User Inputs re-training is the process of continuously improving the LLM by training it on user inputs. This can be done in several ways, the most popular of which is RLHF or Reinforcement Learning from Human Feedback.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="wp-image-26026 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/05/Diapositive2-e1747818997148.jpg" alt="The feedback button used for RHLF in chatGPT" width="1280" height="720" /><em>Figure 3 : The feedback buttons used for RLHF in ChatGPT </em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">This method is built on top of collecting user feedback on the LLM’s output. Many users of LLMs might have seen the “Thumbs Up” or “Thumbs Down” buttons in ChatGPT or other LLM platforms. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These buttons collect feedback from the user and use the feedback to re-train the model. If the user signifies the response as positive, the platform takes the user input / model output pair and encourages the model to replicate the behavior. Similarly, if the user indicates that the model performed poorly, the user input / model output pair will be used to discourage the model from replicating the behavior. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, continuous re-training can also occur without any user interaction. Models may occasionally use user input / model output to re-train in seemingly random ways. The lack of transparency from model providers and developers makes it difficult to pinpoint exactly how this happens. However, many users across the internet have reported models gaining new knowledge through re-training from other users’ chats all the way back to 2022. For example, OpenAI’s GPT 3.5 should not be able to know any information after Sept 2021, its cut-off date. Yet, asking it about recent information such as Elon Musk’s new position as CEO of Twitter (now X) will provide you with a different reality as it confidently answers your question with accuracy.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Essentially, what this means for end-users is that their chats are not kept confidential at all and any information given to the LLM through internal documents, meeting minutes or development codebases may show up in the chats of other users thus leaking it. This poses significant privacy risks not only for individuals but also for companies, many of which have already taken action, like Samsung. In April 2023, Samsung banned the use of ChatGPT and similar chatbots after a group of employees used the tool for coding assistance and summarizing meeting notes. Although Samsung has no concrete evidence that the data was used by OpenAI, the potential risk was deemed too high to allow employees to continue using the tool. This is a classic example of Shadow AI, where unauthorized use of AI tools leads to the possible leakage of confidential or proprietary information.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Many companies globally are waiting for stricter AI and data regulations before using LLMs for commercial use. We are seeing certain industries such as consulting open up but at an incredibly slow pace. Other companies, however, are tightening their control over internal LLM use to avoid leaking confidential data and client information. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="none">Memory Persistence</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">While the two precedent risks have been recognized to exist for a few years, a new threat has emerged with the introduction of a feature by ChatGPT in September 2024. This feature enables the model to retain long-term memory of user conversations. The idea is to reduce redundancy by allowing the chatbot to remember user preferences, context, and previous interactions, thereby improving the relevance and personalization of responses. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, this convenience comes at a significant security cost. Unlike earlier cases, where leaked information was more or less random, persistent memory introduces account-level targeting. Now, attackers could potentially exploit this memory to extract specific details from a particular user’s history, significantly raising the stakes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Security researcher Johannes Rehberger demonstrated how this vulnerability could be exploited through a technique known as context poisoning. In his proof-of-concept, he crafted a site with a malicious image containing instructions. Once the targeted chatbot views the URL, its persistent memory is poisoned. This covert instruction allows the chatbot to be manipulated into extracting sensitive information from the victim’s conversation history and transmitting it to an external URL.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This attack is particularly dangerous because it combines persistence and stealth. Once it infiltrates the chatbot, it remains active indefinitely, continuously exfiltrating user data until the memory is cleaned. At the same time, it is subtle enough to go unnoticed, requiring careful human analysis of the memory to be detected.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="none">LLM Data Privacy and Mitigation </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">LLM developers often intentionally make it hard to disable re-training since it benefits their LLM development. If your personal information is already out in public, it has probably been scraped and used for pre-training an LLM. Additionally, if you gave ChatGPT or another LLM a confidential document in your prompt (without manually turning re-training OFF), it has most probably been used for re-training. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Currently, there is no reliable technique that allows an individual to request the deletion of their data once it has been used for model training. Addressing this challenge is the goal of an emerging research area known as Machine Unlearning. This field focuses on developing methods to selectively remove the influence of specific data points from a trained model, thus deleting those data from the memory of the model. The field is evolving rapidly, particularly in response to GDPR regulations that enforce the right to erasure. For this reason, it is important to mitigate and minimize these risks in the future by controlling what data individuals and organizations put out on the internet and what information employees add to their prompts. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is vital for many business operations to stay confidential. However, the productivity boost that LLMs add to employee workflows cannot be overlooked. For this reason, we constructed a 3-step framework to ensure that organizations can harness the power of LLMs without losing control over their data. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Choose the most optimal model, environment and configuration  </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Ensure that the environment and model you are using are well-secured. Check over the model’s data retention period and the provider’s policy on re-training on user conversations. Ensure that you have “Auto-delete” as ON when available and “Chat History” to OFF.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">At Wavestone we made a </span><a href="https://digiplace.sharepoint.com/:x:/s/WOOHK-HONGKONGOFFICE/EcyjrooJw_hPlkQBjpuYod4Brkuf8-pVV1uKtb5ejJfQLQ?e=i7KITB"><span data-contrast="none">tool</span></a><span data-contrast="auto"> that compares the top 3 closed-source and open-source models in terms of pricing, data retention period, guard rails, and confidentiality to empower organizations in their AI journey. </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;"><strong>Raise employee awareness on best practices when using LLMs  </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Ensure that your employees know the danger of providing confidential and client information to LLMs and what they can do to minimize including corporate or personal information in an LLM’s pre-training and re-training data corpus. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Implement a robust AI policy   </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Forward-looking companies should implement a robust internal AI policy that specifies: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">What information can and can’t be shared with LLMs internally </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Monitoring of AI behavior </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Limiting their online presence </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Anonymization of prompt data </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Limiting use to secure AI tools only </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Following these steps, organizations can minimize the digital risk they face by using the latest GenAI tools while also benefiting from their productivity increases. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="none">Moving Forward </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Although the data privacy vulnerabilities mentioned in this article impact individuals like you and me, their cause is the LLM developers’ greed for data. This greed produces higher-quality end products but at the cost of data privacy and autonomy. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">New regulations and technologies have come out to combat this issue such as the EU AI Act and OWASP top 10 LLM checklist. However, relying solely on responsible governance is not enough. Individuals and organizations must actively recognize the critical role PIIs play in today&#8217;s digital landscape and take proactive steps to protect them. This is especially important as we move toward more agentic AI systems, which autonomously interact with multiple third-party services. Not only will these systems process an increasing amount of personal and sensitive data, but this data will also be transmitted and handled by numerous different services, complicating oversight and control.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span class="TextRun SCXW172884042 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW172884042 BCX8">References and Further Reading </span></span><span class="EOP SCXW172884042 BCX8" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] D. Goodin, “OpenAI says mysterious chat histories resulted from account takeover,” Ars Technica, https://arstechnica.com/security/2024/01/ars-reader-reports-chatgpt-is-sending-him-conversations-from-unrelated-ai-users/ (accessed Jul. 13, 2024). </p>
<p style="text-align: justify;">[2] M. Nasr et al., “Extracting Training Data from ChatGPT,” not-just-memorization , Nov. 28, 2023. Available: <a href="https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html">https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html</a> </p>
<p style="text-align: justify;">[3] “What Is Confidential Computing? Defined and Explained,” Fortinet. Available: <a href="https://www.fortinet.com/resources/cyberglossary/confidential-computing#:~:text=Confidential%20computing%20refers%20to%20cloud">https://www.fortinet.com/resources/cyberglossary/confidential-computing#:~:text=Confidential%20computing%20refers%20to%20cloud</a> </p>
<p style="text-align: justify;">[4] S. Wilson, “OWASP Top 10 for Large Language Model Applications | OWASP Foundation,” owasp.org, Oct. 18, 2023. Available: <a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/">https://owasp.org/www-project-top-10-for-large-language-model-applications/</a> </p>
<p style="text-align: justify;">[5] “Explaining the Einstein Trust Layer,” Salesforce. Available: https://www.salesforce.com/news/stories/video/explaining-the-einstein-gpt-trust-layer/ </p>
<p style="text-align: justify;">[6] “Hacker plants false memories in ChatGPT to steal user data in perpetuity” Ars Technica , 24 sept. 2024 Available: <a href="https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/">https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/</a></p>
<p style="text-align: justify;">[7] “Why we’re teaching LLMs to forget things” IBM, 07 Oct 2024 Available: https://research.ibm.com/blog/llm-unlearning</p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/">Leaking Minds: How Your Data Could Slip Through AI Chatbots </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
