Artificial Deception: The State Of "AI" In Defense and Offense

If you have seen any of my talks, I often say that the infosec industry wouldn't exist without deception.
Although I've seen enough nature documentaries to know deception exists throughout the rest of the animal kingdom, humans have the cunning ability to deceive each other to gain resources, whether in war or crime.
Of course, it has evolved with the evolution of technology into the world of cybercrime - the use of artificial intelligence is no different.
At Black Hat and Def Con this year, I saw an interesting dichotomy in the realm of AI, specifically the application of data science and machine learning in defensive and offensive security.
Machine learning models are only as good as the data they are fed.
As any data scientist will tell you, the majority of their job is data prep and cleansing, this also makes these models themselves susceptible to deception through data poisoning and model manipulation.
The application of LLM through tools such as ChatGPT has been a fantastic breakthrough in the application of data science, with the promise of increasing productivity across many different industries.
LLM is a machine learning model that uses Natural Language Processing to scan massive amounts of text.
Some companies have been deceptive about how this technology works, confusing the industry.
Although LLM technology can magically create content from a prompt out of thin air, there is more to it than meets the eye.
LLMs rely on data inputs like any other model, so they leverage existing works, whether articles, blog posts, art, or even code.
Interestingly, we can be deceived by this technology by accident; however, the same technology can and is being used offensively to manipulate data models and people and, in many respects, is ahead of the defense.
The increasingly widespread use of this technology will pose a significant threat to organizations and individuals, mainly as many non-tech-savvy folks are unaware of it, and the models become increasingly convincing.
The use of generative AI to create videos and images that are progressively realistic is already finding its way into propaganda, fraud, and social engineering at a horrifying rate, and most security awareness training programs and other defenses for these types of attacks are slow to catch up.
In creating AI tools to make us more productive and creative, we also opened a Pandora's Box, as these same tools can be used to deceive us.
Organizations also need to consider the potential liability of using some of these tools, given the technology is new, questions about data provenance, and potential legislation regarding their use.
By keeping the human in the center, we are better able to harness the power of AI while at the same time ensuring it has the proper inputs and monitoring of its outputs.
Trained humans are still better than machines at identifying patterns and detecting human deception; the challenge is that they are overwhelmed with data, tooling, and threats.
The more we can leverage AI to enhance the analysts' capabilities to make their jobs easier, the better we will defend against a whole new generation of threats - or maybe this post was written by an AI to convince you that's the case ;-). About the Author.
He has been in the cybersecurity field for over 15 years working with companies to improve their security posture, through detection engineering, threat hunting, insider threat programs, and vulnerability research.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Fri, 05 Jan 2024 06:13:06 +0000


Cyber News related to Artificial Deception: The State Of "AI" In Defense and Offense

Deception Tech: The Art of Cyber Counterintelligence - One of the technologies quickly gaining popularity is deception technology. Unlike standard security methods that directly stop or identify threats, deception technology uses a more subtle strategy. Deception tech is more about being proactive - not ...
1 year ago Securityboulevard.com
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction - There is a possibility that artificial intelligence models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and ...
1 year ago Cysecurity.news
Artificial Deception: The State Of "AI" In Defense and Offense - If you have seen any of my talks, I often say that the infosec industry wouldn't exist without deception. Although I've seen enough nature documentaries to know deception exists throughout the rest of the animal kingdom, humans have the cunning ...
1 year ago Cyberdefensemagazine.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Data Breaches on the Rise: A Deep Dive into the AI-Driven Privacy Crisis - It is becoming increasingly apparent that artificial intelligence has become increasingly widespread in many aspects of our lives as technology continues to advance at an unprecedented rate. It is anticipated that artificial intelligence is going to ...
1 year ago Cysecurity.news
Embracing offensive cybersecurity tactics for defense against dynamic threats - In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. The first line of defense is often ...
1 year ago Helpnetsecurity.com
Trading Tomorrow's Technology for Today's Privacy: The AI Conundrum in 2024 - Artificial Intelligence is a technology that continually absorbs and transfers humanity's collective intelligence with machine learning algorithms. It is becoming increasingly clear that, as technology advances, so does its approach to data ...
1 year ago Cysecurity.news
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report - To illuminate the evolving digital threat landscape and help the cyber community understand today's most pressing threats, we released our annual Microsoft Digital Defense Report. This year's report focuses on five key topics: cybercrime, ...
2 years ago Csoonline.com POLONIUM
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats - Technology is always evolving, and the art field has been on the frontline of a new battle as a result - the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and more important that ...
1 year ago Cysecurity.news
NSC official: Trump administration will ‘change the script’ on offensive side | The Record from Recorded Future News - “It's not offense for offense’s sake, but being able to respond in kind, if we're the victim of foreign aggression, being able to have our own offensive response or to use offense in support” of traditional military activities, Alexei ...
1 month ago Therecord.media
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
1 year ago Feedpress.me
Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today's Multicloud World - According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business ...
1 year ago Feedpress.me
New York's cyber chief on keeping cities and states safe from cyberattacks | The Record from Recorded Future News - And so we think that that'll continue to evolve the security posture of New York State in a way that first and foremost provides the public good, which is, if a government service is not secure, it can't be considered reliable. We're ...
2 months ago Therecord.media
CVE-2019-13945 - A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family < V4.x (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family V4.x (incl. SIPLUS variants) (All ...
4 years ago
Vidar Stealer With New Deception Technique to Steal Browser Cookies & Stored Credentials - Vidar Stealer, an information-stealing malware first identified in 2018, has evolved with a sophisticated new deception technique targeting cybersecurity professionals and system administrators. G Data security researchers identified an unusual Vidar ...
2 months ago Cybersecuritynews.com
What Should We Expect for State and Local Government IT Priorities in 2024? - As we wrap up 2023, it is a great time to reflect on the current state of technology in state and local governments and look ahead to the priorities for the coming year. Maintaining the security of networks and the data they carry continues to be the ...
1 year ago Feedpress.me
Detecting And Responding To New Nation-State Persistence Techniques - This article explores the changing landscape of nation-state persistence, advanced detection strategies, and effective response frameworks to help organizations defend against these evolving threats. Nation-state cyber threats have evolved ...
2 months ago Cybersecuritynews.com
Building a Resilient Cyber Defense - CISO Strategies Unveiled - By bridging technical and business domains, modern security leaders create defense systems that adapt to evolving threats and changing business priorities. By combining strategic vision with tactical execution, security leaders can create defense ...
1 month ago Cybersecuritynews.com
Microsoft: Hackers target defense firms with new FalseFont malware - Microsoft says the APT33 Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack defense contractors worldwide. The DIB sector targeted in these attacks comprises over 100,000 defense companies and ...
1 year ago Bleepingcomputer.com APT3 APT33
CVE-2024-35873 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows & Linux Machines - The attack creates convincing replicas of Ministry of Defense websites across multiple countries, tricking users into downloading what appears to be required security updates or official documents. Initial analysis suggests the campaign began in ...
1 month ago Cybersecuritynews.com
Preserving Literary Integrity: Indian Publishers Plead for Copyright Measures Against AI Models - It may become necessary to amend the Information Technology rules to ensure fair compensation and ensure that news publishers in India are fairly compensated for the use of their content in training generative artificial intelligence models in the ...
1 year ago Cysecurity.news
Pope Francis Urges Binding Treaty To Regulate AI - Annual message from pope to global leaders calls for legally binding international treaty to regulate artificial intelligence. Pope Francis has directly intervened in the discussion about regulating artificial intelligence, with a salient warning ...
1 year ago Silicon.co.uk
Artificial Intelligence Fuels New Wave of Complex Cyber Attacks Challenging Defenders - The O’Reilly 2024 State of Security Survey found 33% of enterprises lack staff capable of countering AI-driven threats, particularly in detecting adversarial machine learning patterns and securing generative AI deployments. While AI-driven threat ...
1 month ago Cybersecuritynews.com Ransomhub
CISOs Respond to Surge in AI-Powered Attacks with Advanced Defense Strategies - As AI becomes central to both attack and defense strategies, organizations must invest in building specialized expertise within their security teams. Unlike traditional attacks, which often rely on manual effort or simple automation, AI-powered ...
2 months ago Cybersecuritynews.com