text stringlengths 284 8.14k |
|---|
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The article describes the malicious document and the Seduploader reconnaissance malware , especially the difference with the previous versions .' [/INST] [The:O, article:O, describes:O, the:O, malicious:O, document:O, and:O, the:O, Seduploader:S-MAL, reconnaissance:O, malware:O, ,:O, especially:O, the:O, difference:O, with:O, the:O, previous:O, versions:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The decoy document is a flyer concerning the Cyber Conflict U.S. conference with the following filename Conference_on_Cyber_Conflict.doc .' [/INST] [The:O, decoy:O, document:O, is:O, a:O, flyer:O, concerning:O, the:O, Cyber:O, Conflict:O, U.S.:S-LOC, conference:O, with:O, the:O, following:O, filename:O, Conference_on_Cyber_Conflict.doc:S-FILE, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Office document contains a VBA script .' [/INST] [The:O, Office:S-TOOL, document:O, contains:O, a:O, VBA:S-TOOL, script:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The goal of this code is to get information from the properties of the document ( "Subject" , "Company" , "Category" , "Hyperlink base" and finally "Comments" ) .' [/INST] [The:O, goal:O, of:O, this:O, code:O, is:O, to:O, get:O, information:O, from:O, the:O, properties:O, of:O, the:O, document:O, (:O, "Subject":O, ,:O, "Company":O, ,:O, "Category":O, ,:O, "Hyperlink:O, base":O, and:O, finally:O, "Comments":O, ):O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Some of this information can be directly extracted from the Windows explorer by looking at the properties of the file .' [/INST] [Some:O, of:O, this:O, information:O, can:O, be:O, directly:O, extracted:O, from:O, the:O, Windows:S-OS, explorer:O, by:O, looking:O, at:O, the:O, properties:O, of:O, the:O, file:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The "Hyperlink Base" must be extracted using another tool , strings is capable of obtaining this by looking for long strings .' [/INST] [The:O, "Hyperlink:O, Base":O, must:O, be:O, extracted:O, using:O, another:O, tool:O, ,:O, strings:O, is:O, capable:O, of:O, obtaining:O, this:O, by:O, looking:O, for:O, long:O, strings:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Pay close attention to the contents of these fields as they appear base64 encoded .' [/INST] [Pay:O, close:O, attention:O, to:O, the:O, contents:O, of:O, these:O, fields:O, as:O, they:O, appear:O, base64:S-ENCR, encoded:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This extracted information is concatenated together to make a single variable .' [/INST] [This:O, extracted:O, information:O, is:O, concatenated:O, together:O, to:O, make:O, a:O, single:O, variable:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This variable is decoded with the base64 algorithm in order to get a Windows library ( PE file ) which is written to disk .' [/INST] [This:O, variable:O, is:O, decoded:O, with:O, the:O, base64:S-ENCR, algorithm:O, in:O, order:O, to:O, get:O, a:O, Windows:S-OS, library:O, (:O, PE:S-TOOL, file:O, ):O, which:O, is:O, written:O, to:O, disk:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The file is named netwf.dat .' [/INST] [The:O, file:O, is:O, named:O, netwf.dat:S-FILE, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On the next step this file is executed by rundll32.exe via the KlpSvc export .' [/INST] [On:O, the:O, next:O, step:O, this:O, file:O, is:O, executed:O, by:O, rundll32.exe:S-FILE, via:O, the:O, KlpSvc:S-TOOL, export:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We see that this file drops 2 additional files : netwf.bat and netwf.dll .' [/INST] [We:O, see:O, that:O, this:O, file:O, drops:O, 2:O, additional:O, files:O, ::O, netwf.bat:S-FILE, and:O, netwf.dll:S-FILE, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The final part of the VBA script changes the properties of these two files , setting their attributes to Hidden .' [/INST] [The:O, final:O, part:O, of:O, the:O, VBA:S-TOOL, script:O, changes:O, the:O, properties:O, of:O, these:O, two:O, files:O, ,:O, setting:O, their:O, attributes:O, to:O, Hidden:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We can also see 2 VBA variable names : PathPld , probably for Path Payload , and PathPldBt , for Path Payload Batch .' [/INST] [We:O, can:O, also:O, see:O, 2:O, VBA:S-TOOL, variable:O, names:O, ::O, PathPld:O, ,:O, probably:O, for:O, Path:O, Payload:O, ,:O, and:O, PathPldBt:O, ,:O, for:O, Path:O, Payload:O, Batch:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'As opposed to previous campaigns performed by this actor , this latest version does not contain privilege escalation and it simply executes the payload and configures persistence mechanisms .' [/INST] [As:O, opposed:O, to:O, previous:O, campaigns:O, performed:O, by:O, this:O, actor:O, ,:O, this:O, latest:O, version:O, does:O, not:O, contain:O, privilege:O, escalation:O, and:O, it:O, simply:O, executes:O, the:O, payload:O, and:O, configures:O, persistence:O, mechanisms:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The dropper installs 2 files :' [/INST] [The:O, dropper:O, installs:O, 2:O, files:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'netwf.bat :' [/INST] [netwf.bat:S-FILE, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'executes netwf.dll netwf.dll :' [/INST] [executes:O, netwf.dll:S-FILE, netwf.dll:S-FILE, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'the payload .' [/INST] [the:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The dropper implements 2 persistence mechanisms :' [/INST] [The:O, dropper:O, implements:O, 2:O, persistence:O, mechanisms:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'HKCU\Environment\UserInitMprLogonScript to execute the netwf.bat file COM Object hijack of the following CLSID : {BCDE0395-E52F-467C-8E3D-C4579291692E} , the CLSID of the class MMDeviceEnumerator .' [/INST] [HKCU\Environment\UserInitMprLogonScript:O, to:O, execute:O, the:O, netwf.bat:S-FILE, file:O, COM:O, Object:O, hijack:O, of:O, the:O, following:O, CLSID:S-TOOL, ::O, {BCDE0395-E52F-467C-8E3D-C4579291692E}:O, ,:O, the:O, CLSID:S-TOOL, of:O, the:O, class:O, MMDeviceEnumerator:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'These 2 techniques have also been previously used by this actor .' [/INST] [These:O, 2:O, techniques:O, have:O, also:O, been:O, previously:O, used:O, by:O, this:O, actor:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Finally the payload is executed by rundll32.exe ( and the ordinal #1 in argument ) or by explorer.exe if the COM Object hijack is performed .' [/INST] [Finally:O, the:O, payload:O, is:O, executed:O, by:O, rundll32.exe:S-FILE, (:O, and:O, the:O, ordinal:O, #1:O, in:O, argument:O, ):O, or:O, by:O, explorer.exe:S-FILE, if:O, the:O, COM:O, Object:O, hijack:O, is:O, performed:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this case , explorer.exe will instance the MMDeviceEnumerator class and will execute the payload .' [/INST] [In:O, this:O, case:O, ,:O, explorer.exe:S-FILE, will:O, instance:O, the:O, MMDeviceEnumerator:O, class:O, and:O, will:O, execute:O, the:O, payload:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The payload features are similar to the previous versions of Seduploader .' [/INST] [The:O, payload:O, features:O, are:O, similar:O, to:O, the:O, previous:O, versions:O, of:O, Seduploader:S-MAL, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We can compare it to the sample e338d49c270baf64363879e5eecb8fa6bdde8ad9 used in May 2017 by Group 74 .' [/INST] [We:O, can:O, compare:O, it:O, to:O, the:O, sample:O, e338d49c270baf64363879e5eecb8fa6bdde8ad9:S-SHA1, used:O, in:O, May:B-TIME, 2017:E-TIME, by:O, Group:B-APT, 74:E-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Of the 195 functions of the new sample , 149 are strictly identical , 16 match at 90% and 2 match at 80% .' [/INST] [Of:O, the:O, 195:O, functions:O, of:O, the:O, new:O, sample:O, ,:O, 149:O, are:O, strictly:O, identical:O, ,:O, 16:O, match:O, at:O, 90%:O, and:O, 2:O, match:O, at:O, 80%:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In the previous campaign where adversaries used Office document exploits as an infection vector , the payload was executed in the Office word process .' [/INST] [In:O, the:O, previous:O, campaign:O, where:O, adversaries:O, used:O, Office:S-TOOL, document:O, exploits:O, as:O, an:O, infection:O, vector:O, ,:O, the:O, payload:O, was:O, executed:O, in:O, the:O, Office:S-TOOL, word:O, process:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this campaign , adversaries did not use any exploit .' [/INST] [In:O, this:O, campaign:O, ,:O, adversaries:O, did:O, not:O, use:O, any:O, exploit:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Instead ,the payload is executed in standalone mode by rundll32.exe .' [/INST] [Instead:O, ,the:O, payload:O, is:O, executed:O, in:O, standalone:O, mode:O, by:O, rundll32.exe:S-FILE, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Adversaries also changed some constants , such as the XOR key used in the previous version .' [/INST] [Adversaries:O, also:O, changed:O, some:O, constants:O, ,:O, such:O, as:O, the:O, XOR:S-ENCR, key:O, used:O, in:O, the:O, previous:O, version:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The key in our version is : key=b"\x08\x7A\x05\x04\x60\x7c\x3e\x3c\x5d\x0b\x18\x3c\x55\x64" .' [/INST] [The:O, key:O, in:O, our:O, version:O, is:O, ::O, key=b"\x08\x7A\x05\x04\x60\x7c\x3e\x3c\x5d\x0b\x18\x3c\x55\x64":O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The MUTEX name is different too : FG00nxojVs4gLBnwKc7HhmdK0h .' [/INST] [The:O, MUTEX:O, name:O, is:O, different:O, too:O, ::O, FG00nxojVs4gLBnwKc7HhmdK0h:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Here are some of the Seduploader features :' [/INST] [Here:O, are:O, some:O, of:O, the:O, Seduploader:S-MAL, features:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Screenshot capture ( with the GDI API ) ;' [/INST] [Screenshot:O, capture:O, (:O, with:O, the:O, GDI:S-TOOL, API:S-TOOL, ):O, ;:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'data/configuration Exfiltration ;' [/INST] [data/configuration:O, Exfiltration:S-ACT, ;:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Execution of code ;' [/INST] [Execution:O, of:O, code:O, ;:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'File downloading ;' [/INST] [File:O, downloading:O, ;:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Command & Control ( CC ) of the analysed sample is myinvestgroup[.]com .' [/INST] [The:O, Command:B-TOOL, &:I-TOOL, Control:E-TOOL, (:O, CC:S-TOOL, ):O, of:O, the:O, analysed:O, sample:O, is:O, myinvestgroup[.]com:S-DOM, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'During the investigation , the server did not provide any configuration to the infected machines .' [/INST] [During:O, the:O, investigation:O, ,:O, the:O, server:O, did:O, not:O, provide:O, any:O, configuration:O, to:O, the:O, infected:O, machines:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Based on the metadata of the Office documents and the PE files , the attackers had created the file on Wednesday , the 4th of October .' [/INST] [Based:O, on:O, the:O, metadata:O, of:O, the:O, Office:S-TOOL, documents:O, and:O, the:O, PE:S-TOOL, files:O, ,:O, the:O, attackers:O, had:O, created:O, the:O, file:O, on:O, Wednesday:S-TIME, ,:O, the:B-TIME, 4th:I-TIME, of:I-TIME, October:E-TIME, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Analysis of this campaign shows us once more that attackers are creative and use the news to compromise the targets .' [/INST] [Analysis:O, of:O, this:O, campaign:O, shows:O, us:O, once:O, more:O, that:O, attackers:O, are:O, creative:O, and:O, use:O, the:O, news:O, to:O, compromise:O, the:O, targets:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This campaign has most likely been created to allow the targeting of people linked to or interested by cybersecurity , so probably the people who are more sensitive to cybersecurity threats .' [/INST] [This:O, campaign:O, has:O, most:O, likely:O, been:O, created:O, to:O, allow:O, the:O, targeting:O, of:O, people:O, linked:O, to:O, or:O, interested:O, by:O, cybersecurity:O, ,:O, so:O, probably:O, the:O, people:O, who:O, are:O, more:O, sensitive:O, to:O, cybersecurity:O, threats:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In this case , Group 74 did not use an exploit or any 0-day but simply used scripting language embedded within the Microsoft Office document .' [/INST] [In:O, this:O, case:O, ,:O, Group:B-APT, 74:E-APT, did:O, not:O, use:O, an:O, exploit:O, or:O, any:O, 0-day:S-VULNAME, but:O, simply:O, used:O, scripting:O, language:O, embedded:O, within:O, the:O, Microsoft:S-IDTY, Office:S-TOOL, document:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Due to this change , the fundamental compromise mechanism is different as the payload is executed in a standalone mode .' [/INST] [Due:O, to:O, this:O, change:O, ,:O, the:O, fundamental:O, compromise:O, mechanism:O, is:O, different:O, as:O, the:O, payload:O, is:O, executed:O, in:O, a:O, standalone:O, mode:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The reasons for this are unknown , but , we could suggest that they did not want to utilize any exploits to ensure they remained viable for any other operations .' [/INST] [The:O, reasons:O, for:O, this:O, are:O, unknown:O, ,:O, but:O, ,:O, we:O, could:O, suggest:O, that:O, they:O, did:O, not:O, want:O, to:O, utilize:O, any:O, exploits:O, to:O, ensure:O, they:O, remained:O, viable:O, for:O, any:O, other:O, operations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Actors will often not use exploits due to the fact that researchers can find and eventually patch these which renders the actors weaponized platforms defunct .' [/INST] [Actors:O, will:O, often:O, not:O, use:O, exploits:O, due:O, to:O, the:O, fact:O, that:O, researchers:O, can:O, find:O, and:O, eventually:O, patch:O, these:O, which:O, renders:O, the:O, actors:O, weaponized:O, platforms:O, defunct:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Additionally the author did some small updates after publications from the security community , again this is common for actors of this sophisticated nature , once their campaigns have been exposed they will often try to change tooling to ensure better avoidance .' [/INST] [Additionally:O, the:O, author:O, did:O, some:O, small:O, updates:O, after:O, publications:O, from:O, the:O, security:O, community:O, ,:O, again:O, this:O, is:O, common:O, for:O, actors:O, of:O, this:O, sophisticated:O, nature:O, ,:O, once:O, their:O, campaigns:O, have:O, been:O, exposed:O, they:O, will:O, often:O, try:O, to:O, change:O, tooling:O, to:O, ensure:O, better:O, avoidance:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'For example the actor changed the XOR key and the MUTEX name .' [/INST] [For:O, example:O, the:O, actor:O, changed:O, the:O, XOR:S-ENCR, key:O, and:O, the:O, MUTEX:O, name:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT28 : AT THE CENTER OF THE STORM .' [/INST] [APT28:S-APT, ::O, AT:O, THE:O, CENTER:O, OF:O, THE:O, STORM:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The Democratic National Committee βs ( DNC ) June 2016 announcement attributing its network breach to the Russian Government triggered an international debate over Russia βs sponsorship of information operations against the U.S.' [/INST] [The:O, Democratic:B-IDTY, National:I-IDTY, Committee:E-IDTY, βs:O, (:O, DNC:S-IDTY, ):O, June:B-TIME, 2016:E-TIME, announcement:O, attributing:O, its:O, network:O, breach:O, to:O, the:O, Russian:O, Government:O, triggered:O, an:O, international:O, debate:O, over:O, Russia:S-LOC, βs:O, sponsorship:O, of:O, information:O, operations:O, against:O, the:O, U.S.:S-LOC] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our visibility into the operations of APT28 - a group we believe the Russian Government sponsors - has given us insight into some of the government βs targets , as well as its objectives and the activities designed to further them .' [/INST] [Our:O, visibility:O, into:O, the:O, operations:O, of:O, APT28:S-APT, -:O, a:O, group:O, we:O, believe:O, the:O, Russian:O, Government:O, sponsors:O, -:O, has:O, given:O, us:O, insight:O, into:O, some:O, of:O, the:O, government:O, βs:O, targets:O, ,:O, as:O, well:O, as:O, its:O, objectives:O, and:O, the:O, activities:O, designed:O, to:O, further:O, them:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We have tracked and profiled this group through multiple investigations , endpoint and network detections , and continuous monitoring .' [/INST] [We:O, have:O, tracked:O, and:O, profiled:O, this:O, group:O, through:O, multiple:O, investigations:O, ,:O, endpoint:O, and:O, network:O, detections:O, ,:O, and:O, continuous:O, monitoring:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Our visibility into APT28 βs operations , which date to at least 2007 , has allowed us to understand the group βs malware , operational changes , and motivations .' [/INST] [Our:O, visibility:O, into:O, APT28:S-APT, βs:O, operations:O, ,:O, which:O, date:O, to:O, at:O, least:O, 2007:S-TIME, ,:O, has:O, allowed:O, us:O, to:O, understand:O, the:O, group:O, βs:O, malware:O, ,:O, operational:O, changes:O, ,:O, and:O, motivations:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This intelligence has been critical to protecting and informing our clients , exposing this threat , and strengthening our confidence in attributing APT28 to the Russian Government .' [/INST] [This:O, intelligence:O, has:O, been:O, critical:O, to:O, protecting:O, and:O, informing:O, our:O, clients:O, ,:O, exposing:O, this:O, threat:O, ,:O, and:O, strengthening:O, our:O, confidence:O, in:O, attributing:O, APT28:S-APT, to:O, the:O, Russian:O, Government:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On December 29 , 2016 , the Department of Homeland Security ( DHS ) and Federal Bureau of Investigation ( FBI ) released a Joint Analysis Report confirming FireEye βs long held public assessment that the Russian Government sponsors APT28 .' [/INST] [On:O, December:B-TIME, 29:I-TIME, ,:I-TIME, 2016:E-TIME, ,:O, the:O, Department:B-IDTY, of:I-IDTY, Homeland:I-IDTY, Security:E-IDTY, (:O, DHS:S-IDTY, ):O, and:O, Federal:B-IDTY, Bureau:I-IDTY, of:I-IDTY, Investigation:E-IDTY, (:O, FBI:S-IDTY, ):O, released:O, a:O, Joint:O, Analysis:O, Report:O, confirming:O, FireEye:S-SECTEAM, βs:O, long:O, held:O, public:O, assessment:O, that:O, the:O, Russian:O, Government:O, sponsors:O, APT28:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Since at least 2007 , APT28 has engaged in extensive operations in support of Russian strategic interests .' [/INST] [Since:O, at:O, least:O, 2007:S-TIME, ,:O, APT28:S-APT, has:O, engaged:O, in:O, extensive:O, operations:O, in:O, support:O, of:O, Russian:O, strategic:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The group , almost certainly compromised of a sophisticated and prolific set of developers and operators , has historically collected intelligence on defense and geopolitical issues .' [/INST] [The:O, group:O, ,:O, almost:O, certainly:O, compromised:O, of:O, a:O, sophisticated:O, and:O, prolific:O, set:O, of:O, developers:O, and:O, operators:O, ,:O, has:O, historically:O, collected:O, intelligence:O, on:O, defense:O, and:O, geopolitical:O, issues:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APT28 espionage activity has primarily targeted entities in the U.S. , Europe , and the countries of the former Soviet Union , including governments and militaries , defense attaches , media entities , and dissidents and figures opposed to the current Russian Government .' [/INST] [APT28:S-APT, espionage:O, activity:O, has:O, primarily:O, targeted:O, entities:O, in:O, the:O, U.S.:S-LOC, ,:O, Europe:S-LOC, ,:O, and:O, the:O, countries:O, of:O, the:O, former:O, Soviet:B-LOC, Union:E-LOC, ,:O, including:O, governments:O, and:O, militaries:O, ,:O, defense:O, attaches:O, ,:O, media:O, entities:O, ,:O, and:O, dissidents:O, and:O, figures:O, opposed:O, to:O, the:O, current:O, Russian:O, Government:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Over the past two years , Russia appears to have increasingly leveraged APT28 to conduct information operations commensurate with broader strategic military doctrine .' [/INST] [Over:O, the:O, past:O, two:O, years:O, ,:O, Russia:S-LOC, appears:O, to:O, have:O, increasingly:O, leveraged:O, APT28:S-APT, to:O, conduct:O, information:O, operations:O, commensurate:O, with:O, broader:O, strategic:O, military:O, doctrine:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'After compromising a victim organization , APT28 will steal internal data that is then leaked to further political narratives aligned with Russian interests .' [/INST] [After:O, compromising:O, a:O, victim:O, organization:O, ,:O, APT28:S-APT, will:O, steal:O, internal:O, data:O, that:O, is:O, then:O, leaked:O, to:O, further:O, political:O, narratives:O, aligned:O, with:O, Russian:O, interests:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'To date these have included the conflict in Syria , NATO-Ukraine relations , the European Union refugee and migrant crisis , the 2016 Olympics and Paralympics Russian athlete doping scandal , public accusations regarding Russian state-sponsored hacking , and the 2016 U.S. presidential election .' [/INST] [To:O, date:O, these:O, have:O, included:O, the:O, conflict:O, in:O, Syria:S-LOC, ,:O, NATO-Ukraine:O, relations:O, ,:O, the:O, European:B-IDTY, Union:E-IDTY, refugee:O, and:O, migrant:O, crisis:O, ,:O, the:O, 2016:S-TIME, Olympics:S-IDTY, and:O, Paralympics:S-IDTY, Russian:O, athlete:O, doping:O, scandal:O, ,:O, public:O, accusations:O, regarding:O, Russian:O, state-sponsored:O, hacking:O, ,:O, and:O, the:O, 2016:S-TIME, U.S.:S-LOC, presidential:O, election:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'This report details our observations of APT28 βs targeting , and our investigation into a related breach .' [/INST] [This:O, report:O, details:O, our:O, observations:O, of:O, APT28:S-APT, βs:O, targeting:O, ,:O, and:O, our:O, investigation:O, into:O, a:O, related:O, breach:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'We also provide an update on shifts in the group βs tool development and use , and summarize the tactics APT28 employs to compromise its victims .' [/INST] [We:O, also:O, provide:O, an:O, update:O, on:O, shifts:O, in:O, the:O, group:O, βs:O, tool:O, development:O, and:O, use:O, ,:O, and:O, summarize:O, the:O, tactics:O, APT28:S-APT, employs:O, to:O, compromise:O, its:O, victims:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In October 2014 , FireEye released APT28 : A Window into Russia βs Cyber Espionage Operations? , and characterized APT28 βs activity as aligning with the Russian Government βs strategic intelligence requirements .' [/INST] [In:O, October:B-TIME, 2014:E-TIME, ,:O, FireEye:S-SECTEAM, released:O, APT28:S-APT, ::O, A:O, Window:S-OS, into:O, Russia:S-LOC, βs:O, Cyber:O, Espionage:O, Operations?:O, ,:O, and:O, characterized:O, APT28:S-APT, βs:O, activity:O, as:O, aligning:O, with:O, the:O, Russian:O, Government:O, βs:O, strategic:O, intelligence:O, requirements:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'While tracking APT28 , we noted the group βs interest in foreign governments and militaries , particularly those of European and Eastern European nations , as well as regional security organizations , such as the North Atlantic Treaty Organization ( NATO ) and the Organization for Security and Cooperation in Europe ( OSCE ) , among others .' [/INST] [While:O, tracking:O, APT28:S-APT, ,:O, we:O, noted:O, the:O, group:O, βs:O, interest:O, in:O, foreign:O, governments:O, and:O, militaries:O, ,:O, particularly:O, those:O, of:O, European:O, and:O, Eastern:O, European:O, nations:O, ,:O, as:O, well:O, as:O, regional:O, security:O, organizations:O, ,:O, such:O, as:O, the:O, North:B-IDTY, Atlantic:I-IDTY, Treaty:I-IDTY, Organization:E-IDTY, (:O, NATO:S-IDTY, ):O, and:O, the:O, Organization:B-IDTY, for:I-IDTY, Security:I-IDTY, and:I-IDTY, Cooperation:I-IDTY, in:I-IDTY, Europe:E-IDTY, (:O, OSCE:S-IDTY, ):O, ,:O, among:O, others:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Table 1 highlights some recent examples of this activity .' [/INST] [Table:O, 1:O, highlights:O, some:O, recent:O, examples:O, of:O, this:O, activity:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'OSCE :' [/INST] [OSCE:S-IDTY, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NOVEMBER 2016 , The OSCE confirmed that it had suffered an intrusion , which a Western intelligence service attributed to APT28 .' [/INST] [NOVEMBER:B-TIME, 2016:E-TIME, ,:O, The:O, OSCE:S-IDTY, confirmed:O, that:O, it:O, had:O, suffered:O, an:O, intrusion:O, ,:O, which:O, a:O, Western:O, intelligence:O, service:O, attributed:O, to:O, APT28:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Germany 's Christian Democratic Union ( CDU ) :' [/INST] [Germany:S-LOC, 's:O, Christian:B-IDTY, Democratic:I-IDTY, Union:E-IDTY, (:O, CDU:S-IDTY, ):O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'APRIL - MAY 2016 , Researchers at Trend Micro observed APT28 establish a fake CDU email server and launch phishing emails against CDU members in an attempt to obtain their email credentials and access their accounts .' [/INST] [APRIL:B-TIME, -:I-TIME, MAY:I-TIME, 2016:E-TIME, ,:O, Researchers:O, at:O, Trend:O, Micro:O, observed:O, APT28:S-APT, establish:O, a:O, fake:O, CDU:S-IDTY, email:S-TOOL, server:O, and:O, launch:O, phishing:E-ACT, emails:S-TOOL, against:O, CDU:S-IDTY, members:O, in:O, an:O, attempt:O, to:O, obtain:O, their:O, email:S-TOOL, credentials:O, and:O, access:O, their:O, accounts:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Pussy Riot AUGUST :' [/INST] [Pussy:O, Riot:O, AUGUST:S-TIME, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: '2015 , APT28 targets Russian rockers and dissidents Pussy Riot via spear-phishing emails .' [/INST] [2015:S-TIME, ,:O, APT28:S-APT, targets:O, Russian:O, rockers:O, and:O, dissidents:O, Pussy:O, Riot:O, via:O, spear-phishing:S-ACT, emails:S-TOOL, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'NATO , Afghan Ministry of Foreign Affairs , Pakistani Military :' [/INST] [NATO:S-IDTY, ,:O, Afghan:B-IDTY, Ministry:I-IDTY, of:I-IDTY, Foreign:I-IDTY, Affairs:E-IDTY, ,:O, Pakistani:B-IDTY, Military:E-IDTY, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'JULY 2015 , APT28 used two domains ( nato-news.com and bbc-news.org ) to host an Adobe Flash zero-day exploit to target NATO , the Afghan Ministry of Foreign Affairs , and the Pakistani military .' [/INST] [JULY:B-TIME, 2015:E-TIME, ,:O, APT28:S-APT, used:O, two:O, domains:O, (:O, nato-news.com:S-DOM, and:O, bbc-news.org:S-DOM, ):O, to:O, host:O, an:O, Adobe:S-IDTY, Flash:S-TOOL, zero-day:S-VULNAME, exploit:O, to:O, target:O, NATO:S-IDTY, ,:O, the:O, Afghan:B-IDTY, Ministry:I-IDTY, of:I-IDTY, Foreign:I-IDTY, Affairs:E-IDTY, ,:O, and:O, the:O, Pakistani:B-IDTY, military:E-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'German Bundestag & Political Parties :' [/INST] [German:B-IDTY, Bundestag:I-IDTY, &:I-IDTY, Political:I-IDTY, Parties:E-IDTY, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'JUNE 2015 , Germany βs Federal Office for Security in Information Technology ( BSI ) announced that APT28 was likely responsible for the spear phishing emails sent to members of several German political parties .' [/INST] [JUNE:B-TIME, 2015:E-TIME, ,:O, Germany:S-LOC, βs:O, Federal:O, Office:O, for:O, Security:O, in:O, Information:O, Technology:O, (:O, BSI:O, ):O, announced:O, that:O, APT28:S-APT, was:O, likely:O, responsible:O, for:O, the:O, spear:B-ACT, phishing:E-ACT, emails:S-TOOL, sent:O, to:O, members:O, of:O, several:O, German:O, political:O, parties:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The head of Germany βs domestic intelligence agency , Bundesamt fΓΌr Verfassungsschutz ( BfV ) , also attributed the June 2015 compromise of the Bundestag βs networks to APT28 .' [/INST] [The:O, head:O, of:O, Germany:S-LOC, βs:O, domestic:O, intelligence:O, agency:O, ,:O, Bundesamt:B-IDTY, fΓΌr:I-IDTY, Verfassungsschutz:E-IDTY, (:O, BfV:S-IDTY, ):O, ,:O, also:O, attributed:O, the:O, June:B-TIME, 2015:E-TIME, compromise:O, of:O, the:O, Bundestag:O, βs:O, networks:O, to:O, APT28:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Kyrgyzstan Ministry of Foreign Affairs :' [/INST] [Kyrgyzstan:B-IDTY, Ministry:I-IDTY, of:I-IDTY, Foreign:I-IDTY, Affairs:E-IDTY, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'OCTOBER 2014 THROUGH SEPTEMBER 2015 , FireEye iSight Intelligence identified changes made to domain name server ( DNS ) records that suggest that APT28 intercepted email traffic from the Kyrgyzstan Ministry of Foreign Affairs after maliciously modifying DNS records of the ministry βs authoritative DNS servers .' [/INST] [OCTOBER:B-TIME, 2014:E-TIME, THROUGH:O, SEPTEMBER:B-TIME, 2015:E-TIME, ,:O, FireEye:S-SECTEAM, iSight:O, Intelligence:O, identified:O, changes:O, made:O, to:O, domain:O, name:O, server:O, (:O, DNS:S-PROT, ):O, records:O, that:O, suggest:O, that:O, APT28:S-APT, intercepted:O, email:S-TOOL, traffic:O, from:O, the:O, Kyrgyzstan:B-IDTY, Ministry:I-IDTY, of:I-IDTY, Foreign:I-IDTY, Affairs:E-IDTY, after:O, maliciously:O, modifying:O, DNS:S-PROT, records:O, of:O, the:O, ministry:O, βs:O, authoritative:O, DNS:S-PROT, servers:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Polish Government & Power Exchange websites :' [/INST] [Polish:O, Government:O, &:O, Power:O, Exchange:O, websites:O, ::O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'JUNE AND SEPTEMBER 2014 , APT28 employed β Sedkit β in conjunction with strategic web compromises to deliver β Sofacy β malware on Polish Government websites , and the websites of Polish energy company Power Exchange .' [/INST] [JUNE:B-TIME, AND:I-TIME, SEPTEMBER:I-TIME, 2014:E-TIME, ,:O, APT28:S-APT, employed:O, β:O, Sedkit:S-MAL, β:O, in:O, conjunction:O, with:O, strategic:O, web:O, compromises:O, to:O, deliver:O, β:O, Sofacy:S-MAL, β:O, malware:O, on:O, Polish:O, Government:O, websites:O, ,:O, and:O, the:O, websites:O, of:O, Polish:O, energy:O, company:O, Power:O, Exchange:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On September 13 , WADA confirmed that APT28 had compromised its networks and accessed athlete medical data .' [/INST] [On:O, September:B-TIME, 13:E-TIME, ,:O, WADA:S-IDTY, confirmed:O, that:O, APT28:S-APT, had:O, compromised:O, its:O, networks:O, and:O, accessed:O, athlete:O, medical:O, data:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'On September 12 , 2016 , the β Fancy Bears β Hack Team β persona claimed to have compromised WADA and released athletes β medical records as β proof of American athletes taking doping. β' [/INST] [On:O, September:B-TIME, 12:I-TIME, ,:I-TIME, 2016:E-TIME, ,:O, the:O, β:O, Fancy:B-APT, Bears:E-APT, β:O, Hack:O, Team:O, β:O, persona:O, claimed:O, to:O, have:O, compromised:O, WADA:S-IDTY, and:O, released:O, athletes:O, β:O, medical:O, records:O, as:O, β:O, proof:O, of:O, American:O, athletes:O, taking:O, doping.:O, β:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'The DNC announced it had suffered a network compromise and that a subsequent investigation found evidence of two breaches , attributed to APT28 and APT29 .' [/INST] [The:O, DNC:S-IDTY, announced:O, it:O, had:O, suffered:O, a:O, network:O, compromise:O, and:O, that:O, a:O, subsequent:O, investigation:O, found:O, evidence:O, of:O, two:O, breaches:O, ,:O, attributed:O, to:O, APT28:S-APT, and:O, APT29:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye analyzed the malware found on DNC networks and determined that it was consistent with our previous observations of APT28 tools .' [/INST] [FireEye:S-SECTEAM, analyzed:O, the:O, malware:O, found:O, on:O, DNC:S-IDTY, networks:O, and:O, determined:O, that:O, it:O, was:O, consistent:O, with:O, our:O, previous:O, observations:O, of:O, APT28:S-APT, tools:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In June 2016 , shortly after the DNC βs announcement , the Guccifer 2.0 persona claimed responsibility for the DNC breach and leaked documents taken from the organization βs network .' [/INST] [In:O, June:B-TIME, 2016:E-TIME, ,:O, shortly:O, after:O, the:O, DNC:S-IDTY, βs:O, announcement:O, ,:O, the:O, Guccifer:S-APT, 2.0:O, persona:O, claimed:O, responsibility:O, for:O, the:O, DNC:S-IDTY, breach:O, and:O, leaked:O, documents:O, taken:O, from:O, the:O, organization:O, βs:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Guccifer 2.0 continued to leak batches of DNC documents through September .' [/INST] [Guccifer:S-APT, 2.0:O, continued:O, to:O, leak:O, batches:O, of:O, DNC:S-IDTY, documents:O, through:O, September:S-TIME, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Investigators found that John Podesta , Hillary Clinton βs presidential campaign chairman , was one of thousands of individuals targeted in a mass phishing scheme using shortened URLs that security researchers attributed to APT28 .' [/INST] [Investigators:O, found:O, that:O, John:O, Podesta:O, ,:O, Hillary:O, Clinton:O, βs:O, presidential:O, campaign:O, chairman:O, ,:O, was:O, one:O, of:O, thousands:O, of:O, individuals:O, targeted:O, in:O, a:O, mass:O, phishing:E-ACT, scheme:O, using:O, shortened:O, URLs:O, that:O, security:O, researchers:O, attributed:O, to:O, APT28:S-APT, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Throughout October and into early November , WikiLeaks published 34 batches of email correspondence stolen from John Podesta βs personal email account .' [/INST] [Throughout:O, October:S-TIME, and:O, into:O, early:O, November:S-TIME, ,:O, WikiLeaks:S-TOOL, published:O, 34:O, batches:O, of:O, email:S-TOOL, correspondence:O, stolen:O, from:O, John:O, Podesta:O, βs:O, personal:O, email:S-TOOL, account:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Correspondence of other individuals targeted in the same phishing campaign , including former Secretary of State Colin Powell and Clinton campaign staffer William Rinehart , were published on the β DC Leaks β website .' [/INST] [Correspondence:O, of:O, other:O, individuals:O, targeted:O, in:O, the:O, same:O, phishing:E-ACT, campaign:O, ,:O, including:O, former:O, Secretary:O, of:O, State:O, Colin:O, Powell:O, and:O, Clinton:O, campaign:O, staffer:O, William:O, Rinehart:O, ,:O, were:O, published:O, on:O, the:O, β:O, DC:O, Leaks:O, β:O, website:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In July , the DCCC announced that it was investigating an ongoing β cybersecurity incident β that the FBI believed was linked to the compromise of the DNC .' [/INST] [In:O, July:S-TIME, ,:O, the:O, DCCC:S-IDTY, announced:O, that:O, it:O, was:O, investigating:O, an:O, ongoing:O, β:O, cybersecurity:O, incident:O, β:O, that:O, the:O, FBI:S-IDTY, believed:O, was:O, linked:O, to:O, the:O, compromise:O, of:O, the:O, DNC:S-IDTY, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'House Speaker Nancy Pelosi later confirmed that the DCCC had suffered a network compromise .' [/INST] [House:O, Speaker:O, Nancy:O, Pelosi:O, later:O, confirmed:O, that:O, the:O, DCCC:S-IDTY, had:O, suffered:O, a:O, network:O, compromise:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Investigators indicated that the actors may have gained access to DCCC systems as early as March .' [/INST] [Investigators:O, indicated:O, that:O, the:O, actors:O, may:O, have:O, gained:O, access:O, to:O, DCCC:S-IDTY, systems:O, as:O, early:O, as:O, March:S-TIME, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In August , the Guccifer 2.0 persona contacted reporters covering U.S. House of Representative races to announce newly leaked documents from the DCCC pertaining to Democratic candidates .' [/INST] [In:O, August:S-TIME, ,:O, the:O, Guccifer:S-APT, 2.0:O, persona:O, contacted:O, reporters:O, covering:O, U.S.:S-LOC, House:B-IDTY, of:I-IDTY, Representative:E-IDTY, races:O, to:O, announce:O, newly:O, leaked:O, documents:O, from:O, the:O, DCCC:S-IDTY, pertaining:O, to:O, Democratic:O, candidates:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'From August to October , Guccifer 2.0 posted several additional installments of what appear to be internal DCCC documents on β his β WordPress site .' [/INST] [From:O, August:S-TIME, to:O, October:S-TIME, ,:O, Guccifer:S-APT, 2.0:O, posted:O, several:O, additional:O, installments:O, of:O, what:O, appear:O, to:O, be:O, internal:O, DCCC:S-IDTY, documents:O, on:O, β:O, his:O, β:O, WordPress:O, site:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In February , FireEye identified CORESHELL traffic beaconing from TV5Monde βs network , confirming that APT28 had compromised TV5Monde βs network .' [/INST] [In:O, February:S-TIME, ,:O, FireEye:S-SECTEAM, identified:O, CORESHELL:S-TOOL, traffic:O, beaconing:O, from:O, TV5Monde:S-IDTY, βs:O, network:O, ,:O, confirming:O, that:O, APT28:S-APT, had:O, compromised:O, TV5Monde:S-IDTY, βs:O, network:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'In April 2015 , alleged pro-ISIS hacktivist group CyberCaliphate defaced TV5Monde βs websites and social media profiles and forced the company βs 11 broadcast channels offline .' [/INST] [In:O, April:B-TIME, 2015:E-TIME, ,:O, alleged:O, pro-ISIS:O, hacktivist:O, group:O, CyberCaliphate:S-APT, defaced:O, TV5Monde:S-IDTY, βs:O, websites:O, and:O, social:O, media:O, profiles:O, and:O, forced:O, the:O, company:O, βs:O, 11:O, broadcast:O, channels:O, offline:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'FireEye identified overlaps between the domain registration details of CyberCaliphate βs website and APT28 infrastructure .' [/INST] [FireEye:S-SECTEAM, identified:O, overlaps:O, between:O, the:O, domain:O, registration:O, details:O, of:O, CyberCaliphate:S-APT, βs:O, website:O, and:O, APT28:S-APT, infrastructure:O, .:O] </s> |
<s>[INST] You are a cybersecurity and NLP expert tasked with named entity extraction. You need to provide the named entities for each token in the given sentence. You will be penalized for incorrect predictions. Identify the entities for the following sentence: 'Ukrainian officials revealed that the investigation into the compromise of the CEC βs internal network identified malware traced to APT28 .' [/INST] [Ukrainian:O, officials:O, revealed:O, that:O, the:O, investigation:O, into:O, the:O, compromise:O, of:O, the:O, CEC:S-IDTY, βs:O, internal:O, network:O, identified:O, malware:O, traced:O, to:O, APT28:S-APT, .:O] </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.