Abstract: Highlights•Comprehensive review of LLMs for cyber threat detection stage.•Explore four suitable cyber threat detection scenarios for LLMs.•Explore different roles of LLMs in common cyber threat detection tasks.•Discussion of extra prevalent topics between cybersecurity and LLMs.•Some potential applications of LLMs in threat detection based on existing work.
Loading