Security News

OpenAI, Meta, and TikTok Crack Down on Covert Influence Campaigns, Some AI-Powered
2024-05-31 08:11

OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence...

OpenAI is very smug after thwarting five ineffective AI covert influence ops
2024-05-30 23:29

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

NIST unveils ARIA to evaluate and verify AI capabilities, impacts
2024-05-30 03:30

The program comes shortly after several recent announcements by NIST around the 180-day mark of the Executive Order on trustworthy AI and the U.S. AI Safety Institute's unveiling of its strategic vision and international safety network. "With the ARIA program, and other efforts to support Commerce's responsibilities under President Biden's Executive Order on AI, NIST and the U.S. AI Safety Institute are pulling every lever when it comes to mitigating the risks and maximizing the benefits of AI," Raimondo continued.

How's Uncle Sam getting on with Biden's AI exec order? Pretty good, we're told
2024-05-27 16:56

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

#AI
Chronon: Open-source data platform for AI/ML applications
2024-05-27 04:00

Chronon is an open-source, end-to-end feature platform designed for machine learning teams to build, deploy, manage, and monitor data pipelines for machine learning. Chronon enables you to harness all the data within your organization, including batch tables, event streams, and services, to drive your AI/ML projects without the need to manage the typically required orchestration.

Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data
2024-05-25 09:11

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to...

#AI
AI Seoul Summit: 4 Key Takeaways on AI Safety Standards and Regulations
2024-05-24 13:56

One of the key aims was to move progress towards the formation of a global set of AI safety standards and regulations. U.K. Technology Secretary Michelle Donelan said in a closing statement, "The agreements we have reached in Seoul mark the beginning of Phase Two of our AI Safety agenda, in which the world takes concrete steps to become more resilient to the risks of AI and begins a deepening of our understanding of the science that will underpin a shared approach to AI safety in the future."

Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias
2024-05-23 19:46

With this map, the researchers can explore how neuron-like data points, called features, affect a generative AI's output. Some of these features are "Safety relevant," meaning that if people reliably identify those features, it could help tune generative AI to avoid potentially dangerous topics or actions.

Personal AI Assistants and Privacy
2024-05-23 11:00

One of the promises of generative AI is a personal digital assistant. It will act trustworthy, but it will not be trustworthy.

CISOs pursuing AI readiness should start by updating the org’s email security policy
2024-05-23 05:00

Conduct regular security training, especially with staff members who work with sensitive data and with executives who are often the targets of BEC. This should include live instruction, security awareness training videos and testing, and phishing simulation testing that use current, real-world attacks as examples. Finally, gamifying the cyber-aware culture by rewarding the employee with "Most reported emails" or the "Fastest reporter" promotes contributing to the overall security posture of the organization while keeping reporting engaging and fun.