- Project Overwatch
- Posts
- #042 - Cyber AI Chronicle - Is AI Malware a real thing?
#042 - Cyber AI Chronicle - Is AI Malware a real thing?
PRESENTED BY
Cyber AI Chronicle
By Simon Ganiere · 3rd November 2024
Welcome back!
Project Overwatch is a cutting-edge newsletter at the intersection of cybersecurity, AI, technology, and resilience, designed to navigate the complexities of our rapidly evolving digital landscape. It delivers insightful analysis and actionable intelligence, empowering you to stay ahead in a world where staying informed is not just an option, but a necessity.
Table of Contents
What I learned this week
TL;DR
Most of the 2024 predictions was about AI enabled threats. Obviously, this is a point in time view and things can change extremely fast but we will explore if those predictions were all hyped or if the threat landscape has actually evolved? » READ MORE
SearchGPT is out! You can read all about it here. The search model is based on a fine-tuned version of GPT-4o using a “novel synthetic data generation techniques”. Obviously OpenAI is scrapping the internet for this, you can find here some more details on the user-agent being used (in case you own a website and want to opt-out).
Still in the AI world, Google CEO announced that AI systems now generate more than a quarter of new code for its products. For those interested check the last two weeks newsletter (here and here) for details on AI code generation and the security implications.
Google also released “Learn About”. Seems it’s an experiment and it’s limited to the US (but seems you can use a VPN) at the moment. Interesting way to use LLM and very much align with NotebookLLM.
The US Election is near and the cyber news is, not surprisingly, talking a lot about disinformation and nation state influence operations. Another key news this week was the release from Sophos X-Ops about their five-year investigation tracking China-based groups targeting…surprise…surprise…perimeter devices. Read all about it here. Whilst this report highlight the usual persistence of nation state actors, Sophos employed active defense measures, including deploying custom implants on compromised devices to monitor and counteract the attackers’ activities. Looks like the Pandora box of “hack back” has been open on this one 🙂 Any view on this?