Artificial Deception: The State Of "AI" In Defense and Offense

If you have seen any of my talks, I often say that the infosec industry wouldn't exist without deception.
Although I've seen enough nature documentaries to know deception exists throughout the rest of the animal kingdom, humans have the cunning ability to deceive each other to gain resources, whether in war or crime.
Of course, it has evolved with the evolution of technology into the world of cybercrime - the use of artificial intelligence is no different.
At Black Hat and Def Con this year, I saw an interesting dichotomy in the realm of AI, specifically the application of data science and machine learning in defensive and offensive security.
Machine learning models are only as good as the data they are fed.
As any data scientist will tell you, the majority of their job is data prep and cleansing, this also makes these models themselves susceptible to deception through data poisoning and model manipulation.
The application of LLM through tools such as ChatGPT has been a fantastic breakthrough in the application of data science, with the promise of increasing productivity across many different industries.
LLM is a machine learning model that uses Natural Language Processing to scan massive amounts of text.
Some companies have been deceptive about how this technology works, confusing the industry.
Although LLM technology can magically create content from a prompt out of thin air, there is more to it than meets the eye.
LLMs rely on data inputs like any other model, so they leverage existing works, whether articles, blog posts, art, or even code.
Interestingly, we can be deceived by this technology by accident; however, the same technology can and is being used offensively to manipulate data models and people and, in many respects, is ahead of the defense.
The increasingly widespread use of this technology will pose a significant threat to organizations and individuals, mainly as many non-tech-savvy folks are unaware of it, and the models become increasingly convincing.
The use of generative AI to create videos and images that are progressively realistic is already finding its way into propaganda, fraud, and social engineering at a horrifying rate, and most security awareness training programs and other defenses for these types of attacks are slow to catch up.
In creating AI tools to make us more productive and creative, we also opened a Pandora's Box, as these same tools can be used to deceive us.
Organizations also need to consider the potential liability of using some of these tools, given the technology is new, questions about data provenance, and potential legislation regarding their use.
By keeping the human in the center, we are better able to harness the power of AI while at the same time ensuring it has the proper inputs and monitoring of its outputs.
Trained humans are still better than machines at identifying patterns and detecting human deception; the challenge is that they are overwhelmed with data, tooling, and threats.
The more we can leverage AI to enhance the analysts' capabilities to make their jobs easier, the better we will defend against a whole new generation of threats - or maybe this post was written by an AI to convince you that's the case ;-). About the Author.
He has been in the cybersecurity field for over 15 years working with companies to improve their security posture, through detection engineering, threat hunting, insider threat programs, and vulnerability research.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Fri, 05 Jan 2024 06:13:06 +0000


Cyber News related to Artificial Deception: The State Of "AI" In Defense and Offense

Deception Tech: The Art of Cyber Counterintelligence - One of the technologies quickly gaining popularity is deception technology. Unlike standard security methods that directly stop or identify threats, deception technology uses a more subtle strategy. Deception tech is more about being proactive - not ...
10 months ago Securityboulevard.com
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction - There is a possibility that artificial intelligence models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and ...
9 months ago Cysecurity.news
Artificial Deception: The State Of "AI" In Defense and Offense - If you have seen any of my talks, I often say that the infosec industry wouldn't exist without deception. Although I've seen enough nature documentaries to know deception exists throughout the rest of the animal kingdom, humans have the cunning ...
10 months ago Cyberdefensemagazine.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Data Breaches on the Rise: A Deep Dive into the AI-Driven Privacy Crisis - It is becoming increasingly apparent that artificial intelligence has become increasingly widespread in many aspects of our lives as technology continues to advance at an unprecedented rate. It is anticipated that artificial intelligence is going to ...
9 months ago Cysecurity.news
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report - To illuminate the evolving digital threat landscape and help the cyber community understand today's most pressing threats, we released our annual Microsoft Digital Defense Report. This year's report focuses on five key topics: cybercrime, ...
1 year ago Csoonline.com
Embracing offensive cybersecurity tactics for defense against dynamic threats - In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. The first line of defense is often ...
9 months ago Helpnetsecurity.com
Trading Tomorrow's Technology for Today's Privacy: The AI Conundrum in 2024 - Artificial Intelligence is a technology that continually absorbs and transfers humanity's collective intelligence with machine learning algorithms. It is becoming increasingly clear that, as technology advances, so does its approach to data ...
10 months ago Cysecurity.news
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats - Technology is always evolving, and the art field has been on the frontline of a new battle as a result - the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and more important that ...
10 months ago Cysecurity.news
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
5 months ago Feedpress.me
Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today's Multicloud World - According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business ...
9 months ago Feedpress.me
CVE-2019-13945 - A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family < V4.x (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family V4.x (incl. SIPLUS variants) (All ...
4 years ago
What Should We Expect for State and Local Government IT Priorities in 2024? - As we wrap up 2023, it is a great time to reflect on the current state of technology in state and local governments and look ahead to the priorities for the coming year. Maintaining the security of networks and the data they carry continues to be the ...
10 months ago Feedpress.me
CVE-2024-35873 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
Microsoft: Hackers target defense firms with new FalseFont malware - Microsoft says the APT33 Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack defense contractors worldwide. The DIB sector targeted in these attacks comprises over 100,000 defense companies and ...
10 months ago Bleepingcomputer.com
Strength in Numbers: The Case for Whole-of-State Cybersecurity - Public Sector: Bigger Challenges, Fewer Resources When thinking about how many people public sector organizations must secure, consider that the average US county has a population of 106,007, according to census data, analogous to all of Procter & ...
9 months ago Darkreading.com
Preserving Literary Integrity: Indian Publishers Plead for Copyright Measures Against AI Models - It may become necessary to amend the Information Technology rules to ensure fair compensation and ensure that news publishers in India are fairly compensated for the use of their content in training generative artificial intelligence models in the ...
9 months ago Cysecurity.news
Pope Francis Urges Binding Treaty To Regulate AI - Annual message from pope to global leaders calls for legally binding international treaty to regulate artificial intelligence. Pope Francis has directly intervened in the discussion about regulating artificial intelligence, with a salient warning ...
10 months ago Silicon.co.uk
Ukraine sacks top cybersecurity officials in corruption probe involving software purchases - KYIV, Ukraine - Ukraine fired its top two civilian cybersecurity officials on Monday as prosecutors announced an embezzlement investigation involving software purchases from 2020-2022 in which the head of the state intelligence service was allegedly ...
11 months ago Abcnews.go.com
Federal Cybersecurity Agency Launches Program to Boost Support for State, Local Election Offices - The nation's cybersecurity agency has launched a program aimed at boosting election security in the states, shoring up support for local offices and hoping to provide reassurance to voters that this year's presidential elections will be safe and ...
8 months ago Securityweek.com
Dozens of Rogue California Police Agencies Still Sharing Driver Locations with Anti-Abortion States - SAN FRANCISCO-California Attorney General Rob Bonta should crack down on police agencies that still violate Californians' privacy by sharing automated license plate reader information with out-of-state government agencies, putting abortion seekers ...
9 months ago Eff.org
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
1 year ago Securityweek.com
US, UK Announce Charges and Sanctions Against Two Russian Hackers - The United States and United Kingdom on Thursday announced charges and sanctions against two individuals allegedly involved in hacking and other cyber operations on behalf of Russia's FSB security service. Microsoft and Five Eyes security agencies on ...
10 months ago Securityweek.com
How To Use AI to Optimize DevOps - DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on ...
10 months ago Feeds.dzone.com
Missouri secretary of state accused of withholding cybersecurity reviews of election authorities - Missouri Auditor Scott Fitzpatrick released an audit report on Monday that alleges Missouri Secretary of State Jay Ashcroft refused to provide him with copies of the cybersecurity reviews of Missouri's 116 local election authorities, which he said ...
9 months ago Statescoop.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)