Summarization
Transformers
PyTorch
Safetensors
Enawené-Nawé
bart
text2text-generation
security
shorts
infosec
Instructions to use venkycs/securityShots with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- Transformers
How to use venkycs/securityShots with Transformers:
# Use a pipeline as a high-level helper # Warning: Pipeline type "summarization" is no longer supported in transformers v5. # You must load the model directly (see below) or downgrade to v4.x with: # 'pip install "transformers<5.0.0' from transformers import pipeline pipe = pipeline("summarization", model="venkycs/securityShots")# Load model directly from transformers import AutoTokenizer, AutoModelForSeq2SeqLM tokenizer = AutoTokenizer.from_pretrained("venkycs/securityShots") model = AutoModelForSeq2SeqLM.from_pretrained("venkycs/securityShots") - Notebooks
- Google Colab
- Kaggle
Update README.md
Browse files
README.md
CHANGED
|
@@ -1,18 +1,18 @@
|
|
| 1 |
---
|
| 2 |
tags:
|
| 3 |
-
-
|
| 4 |
- summarization
|
|
|
|
|
|
|
| 5 |
language:
|
| 6 |
- unk
|
| 7 |
widget:
|
| 8 |
- text: "LockBit 30 Ransomware Cybersecurity News Platform Followed by 376 million Resources About Site ContactTip Us Follow Us On Social Media Aug 26 2023THNEndpoint Security Cyber Threat The leak of the builder last year has led to threat actors abusing the tool to spawn new variants Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure The attacker behind this incident decided to use a different ransom note with a headline related to a previously unknown group called NATIONAL HAZARD AGENCY security researchers Eduardo Ovalle and Francesco Figurelli The revamped ransom note directly specified the amount to be paid"
|
| 9 |
-
datasets:
|
| 10 |
-
- venkycs/autotrain-data-urlshortsbard
|
| 11 |
co2_eq_emissions:
|
| 12 |
emissions: 38.597620011381935
|
| 13 |
---
|
| 14 |
|
| 15 |
-
# Model Trained
|
| 16 |
|
| 17 |
- Problem type: Summarization
|
| 18 |
- Model ID: 85203142751
|
|
|
|
| 1 |
---
|
| 2 |
tags:
|
| 3 |
+
- security
|
| 4 |
- summarization
|
| 5 |
+
- shorts
|
| 6 |
+
- infosec
|
| 7 |
language:
|
| 8 |
- unk
|
| 9 |
widget:
|
| 10 |
- text: "LockBit 30 Ransomware Cybersecurity News Platform Followed by 376 million Resources About Site ContactTip Us Follow Us On Social Media Aug 26 2023THNEndpoint Security Cyber Threat The leak of the builder last year has led to threat actors abusing the tool to spawn new variants Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure The attacker behind this incident decided to use a different ransom note with a headline related to a previously unknown group called NATIONAL HAZARD AGENCY security researchers Eduardo Ovalle and Francesco Figurelli The revamped ransom note directly specified the amount to be paid"
|
|
|
|
|
|
|
| 11 |
co2_eq_emissions:
|
| 12 |
emissions: 38.597620011381935
|
| 13 |
---
|
| 14 |
|
| 15 |
+
# Model Trained on Cyber Security Content
|
| 16 |
|
| 17 |
- Problem type: Summarization
|
| 18 |
- Model ID: 85203142751
|