#ARTIFICIAL INTELLIGENCE THREATS
Explore tagged Tumblr posts
Text
Launch of the ILO Observatory on AI and Work in the Digital Economy.
The ILO Observatory on AI and Work in the Digital Economy aims to be the leading international knowledge hub on the world-of-work dimensions of artificial intelligence (AI) and the digital economy, serving as a platform for increasing the volume and profile of evidence, analysis and dialogue in these areas.
Watch the Launch of the ILO Observatory on AI and Work in the Digital Economy!
#International Labour organization#digital economy#digital strategy#digital innovation#digital transition#artificial intelligence#generated AI#ARTIFICIAL INTELLIGENCE THREATS
0 notes
Text
Imagine Egg A1 still has one life left, and it somehow manages to escape the facility... It is being followed by mobs, by Federation employees, being hurt by the poison ivy and other environmental threats, but it keeps running, because what other choice is there? That parkour course was a trick after all, the last block was a fake, it was never meant to pass that test in the first place.
So it keeps running, but the Federation workers are getting closer. It won't be able to avoid them forever...
But then it bursts through some bushes and comes face to face with someone new - and it's Bad, out building or exploring or just wandering alone. A1 is immediately afraid, of course. It is a stranger, a very visually striking stranger, the complete opposite of the pure white and featureless employees of the Federation. But there are people close behind, and it knows what will happen to it if it is caught, so... It has no choice but to try. It has no way to communicate, no signs or books, so it simply rushes to hide behind him and hopes he understands, and that he is willing to help...
And Bad, for his part, well.. he's an extremely cautious and paranoid person, and this is just an incredibly confusing and unexpected situation to be in. An unknown egg appeared out of nowhere and is hiding behind him, he can see Federation employees in the distance that are clearly looking for something... He knows that the code has been disguising itself as eggs, and that the strange egg in front of him with no marks, no distinguishing features, an egg that he has never seen before, could easily be the code monster preparing to attack at any moment...
But there is absolutely no way Bad could ever look at an egg in distress and not try to help it, even knowing it could be a trap.
So he quickly digs a shallow hole and pushes the mysterious egg into it, covering it up just in time, and when the employees throw him a book asking if he had seen anything, he lies effortlessly, he complains about nonsense, he asks them where the Ekea is and is as annoying as he can be, until they leave.
And now they're alone... just Bad an this mystery egg in the middle of the woods, A1 too afraid to leave the hole even when Bad tries to coax it out. He gives it food and tries his best to comfort it, to tell it everything is okay and that the pursuers are gone. He gives it some signs and a book, trying to see if it will write anything to him or answer any of his questions, but he gets no reply. A1 is just too afraid to even attempt to answer, and Bad doesn't even know if it understands him. He tries what few words he does know of the other languages, and still no response.
What should he do? As much as the image of a tiny, terrified egg makes him want to do all he can for it he also needs to be safe. He can't bring it home, because if it is a code there is no way he is bringing it anywhere near Dapper. Should he call someone else for help, or would that draw too much attention? Would it even be safe for him or the egg to let anyone know right now? And was this egg dangerous, or harmless and in need of protection? He wouldn't abandon it regardless but...
What now?
#Egg A1#badboyhalo#I am a Bad watcher it will always be qBad in my what ifs even if anyone could do it#Plus he is perfect for the job#I can't write fic but yes this is basically an A1 fic oops#ElQuackity you thought killing a featureless egg was a safe option but you're wrong we are all attached#I want A1 to be alive and to escape to be adored and protected#Also I bet if Bad got caught with a mystery egg I think he'd just go 'Huh? No this is my other child you just never saw them before :)'#Also for some reason my brain was calling A1 'Alice' but then I saw people using 'Ai' and that's adorable too~#Though it also makes me think 'artificial intelligence' but hey maybe that is fitting for the fabricated eggs theory XD#'What now' I ask as if I am not already imagining Bad trying to protect A1 and also be safe in case it is a threat#not wanting to think it is but unable to know otherwise#but also being so BBH about it and just being in complete dad mode when they interact#he keeps it in it's own safe little secure home and does what he can to help it with minimal communication for several days#until A1 starts to open up little by little - incredibly slowly#Bad very gradually telling very select people about it#until eventually when the Federation finds out - everyone who knows is immediately hmm what no this is our child what do you mean?#and go ultra protective#because A1 deserves the world#fic within the tags yes#Bad ruined my sleep schedule and I can't sleep mindless rambles time
77 notes
·
View notes
Text
#comic strips#pearls before swine#stephan pastis#ai#warnings#artificial intelligence#1999#year 2000#y2k#threats#cartoon
8 notes
·
View notes
Text
JUST WATCHED THE LAST 2 EPISODES OF PERSONS OF INTEREST SEASON 2 HAS ANYONE ELSE SEEN THIS SHIT PLEASE
#person of interest#FUCK dude so much happened. spoilers in the tags btw#with all the “ai” stuff happening rn it gave me a bit of whiplash to hear the term ai being used to#- describe an ACTUAL artificial intelligence. finally some good fucking food#THE MACHINE!!!!!!! SHES!!!!!!!!!! FUCK!!!!!!!!!!!!!!!!#that scene in ep 22 with nathan and grace and. shit dude that was heartwrenching#i don’t think i’ve ever seen harold in so much despair before#the fact that he immediately knew what he needed to do to keep everyone safe. AND HE KNEW THIS WOULD HAPPEN!! HE KNEW NATHAN WOULDNT BE SAF#id gotten the vibe by like halfway through the season that whatever killed nathan was probably a bomb#cos like harold didn’t have that limp while nathan was still alive and only got it after he died#and logically speaking a bomb would make the most sense. i didn’t know how that would happen but i knew that’s what it was#but fuck dude even though i was expecting it i almost cried#ALSO. root still has admin access???? which i suppose the machine doesn’t see her as a threat??#ALSO ALSO the mysterious Ma’am at the end of the ep who we didn’t see also knows about the machine?? WHO ARE YOU#IDENTIFY YOURSELF#jesus. anyways this show rocks#and that british fuck came back. i wonder if he’s gonna stick around#cos like i feel like the mystery he was part of got all uncovered n shit so idk where they’re gonna take him
3 notes
·
View notes
Text
It’s a weird feeling—to be certain that the world will end, but also not certain about the specific hour or day of when it will happen. So you think, I may as well dedicate myself to something.
Are We Doomed? Here’s How to Think About It
#existential threats#doom#doomsday#end times#climate change#nuclear war#artificial intelligence#doomerism#end of the world
2 notes
·
View notes
Text
3.7: Come Play in Solarpunk’s Future Garden, With John Threat
Today's episode features Christina's chat with renowned hacktivist, writer/director, and creative futurist John Threat about his Zukunft Garden art installation, his journey through cyberpunk to solarpunk, and AI art. Tune in now!
Between September 15 to 24, 2023, you can go be a part of renowned hacktivist, writer/director, and creative futurist John Threat’s Zukunft Garden—a solarpunk future garden—that’s part of Vision2030’s Earth Edition festival at CalArts, in Santa Clarita, near Los Angeles. Join us for this episode, where John talks to Christina about this social art installation, what it means and can signify for…
View On WordPress
#AI#AI art#art#art installation#artificial intelligence#community#cyberpunk#hacktivism#John Threat#lifestyle#solarpunk#solarpunk presents podcast#Zukunft Garden
12 notes
·
View notes
Text
Because of AO3 being scraped by/for AI, I'm going to be restricting my fics to registered users.
I'm sorry to any unregistered users who enjoy my series, but I need to prioritize protecting my work.
You'll still be able to see it if you have/make a registered account. Here's a thread that touches upon the issue ⬇️
#ao3 fanfic#ao3 fic#ao3#ao3fic#ai#ai theft#ai threat#artificial intelligence#privacy#internet safety
13 notes
·
View notes
Text
no need to visit that page (unless you have a good adblocker - in which case it's worth a laugh)
basically it's some redundant tripe about "water pretty" and then a list of words related to water... including about 40 that just say "pebble" 🤣
just found the WORST ai slop article imaginable just scroll down until you see it
#artificial intelligence#artificial artificial intelligence#garbage websites#AI is no threat to us just yet#and the techbros using it for “content��� are idjits
8K notes
·
View notes
Text
So it looks like NaNoWriMo are happy to have AI as part of their community. Miss me with that bullshit. Generative artificial intelligence is an active threat to creativity and the livelihoods of hundreds of thousands of people in creative fields.
Please signal boost this so writers can make an informed choice about whether to continue to take part in such a community.
28K notes
·
View notes
Text
GenAI Is Transforming Cybersecurity
New Post has been published on https://thedigitalinsider.com/genai-is-transforming-cybersecurity/
GenAI Is Transforming Cybersecurity
The cybersecurity industry has always faced an uphill battle, and the challenges today are steeper and more widespread than ever before.
Though organizations are adopting more and more digital tools to optimize operations and increase efficiency, they are simultaneously increasing their attack surface – the extent of vulnerable entry points hackers might exploit – making them more susceptible to rising cyber threats, even as their defenses improve. Even worse, organizations are having to face this rapidly growing array of threats amid a shortage of skilled cybersecurity professionals.
Fortunately, innovations in artificial intelligence, especially Generative AI (GenAI), are offering solutions to some of the cybersecurity industry’s most complex problems. But we’ve only scratched the surface – while GenAI’s role in cybersecurity is expected to grow exponentially in coming years, there remain untapped opportunities where this technology could further enhance progress.
Current Applications and Benefits of GenAI in Cybersecurity
One of GenAI’s most significant areas of impact on the cybersecurity industry is in its ability to provide automated insights that were previously unattainable.
The initial stages of data processing, filtering and labeling are still often performed by older generations of machine learning, which excel at processing and analyzing vast amounts of data, such as sorting through huge sets of vulnerability alerts and identifying potential anomalies. GenAI’s true advantage lies in what happens afterwards.
Once data has been preprocessed and scoped, GenAI can step in to provide advanced reasoning capabilities that go beyond what previous-generation AI can achieve. GenAI tools offer deeper contextualization, more accurate predictions, and nuanced insights that are unattainable with older technologies.
For instance, after a large dataset – say, millions of documents – is processed, filtered and labeled through other means, GenAI provides an additional layer of analysis, validation and context on top of the curated data, determining their relevance, urgency, and potential security risks. It can even iterate on its understanding, generating additional context by looking at other data sources, refining its decision-making capabilities over time. This layered approach goes beyond simply processing data and shifts the focus to advanced reasoning and adaptive analysis.
Challenges and Limitations
Despite the recent improvements, many challenges remain when it comes to integrating GenAI into existing cybersecurity solutions.
First, AI’s capabilities are often embraced with unrealistic expectations, leading to the risk of over-reliance and under-engineering. AI is neither magical nor perfect. It’s no secret that GenAI often produces inaccurate results due to biased data inputs or incorrect outputs, known as hallucinations.
These systems require rigorous engineering to be accurate and effective and must be viewed as one element of a broader cybersecurity framework, rather than a total replacement. In more casual situations or non-professional uses of GenAI, hallucinations can be inconsequential, even comedic. But in the world of cybersecurity, hallucinations and biased results can have catastrophic consequences that can lead to accidental exposure of critical assets, breaches, and extensive reputational and financial damage.
Untapped Opportunities: AI with Agency
Challenges shouldn’t deter organizations from embracing AI solutions. Technology is still evolving and opportunities for AI to enhance cybersecurity will continue to grow.
GenAI’s ability to reason and draw insights from data will become more advanced in the coming years, including recognizing trends and suggesting actions. Today, we’re already seeing the impact advanced AI is having by simplifying and expediting processes by proactively suggesting actions and strategic next steps, allowing teams to focus less on planning and more on productivity. As GenAI’s reasoning capabilities continue to improve and can better mimic the thought process of security analysts, it will act as an extension of human expertise, making complex cyber more efficient.
In a security posture evaluation, an AI agent can act with true agency, autonomously making contextual decisions as it explores interconnected systems—such as Okta, GitHub, Jenkins, and AWS. Rather than relying on static rules, the AI agent dynamically makes its way through the ecosystem, identifying patterns, adjusting priorities, and focusing on areas with heightened security risks. For instance, the agent might identify a vector where permissions in Okta allow developers broad access through GitHub to Jenkins, and finally to AWS. Recognizing this path as a potential risk for insecure code reaching production, the agent can autonomously decide to probe further, focusing on specific permissions, workflows, and security controls that could be weak points.
By incorporating retrieval-augmented generation (RAG), the agent leverages both external and internal data sources—drawing from recent vulnerability reports, best practices, and even the organization’s specific configurations to shape its exploration. When RAG surfaces insights on common security gaps in CI/CD pipelines, for instance, the agent can incorporate this knowledge into its analysis, adjusting its decisions in real time to emphasize those areas where risk factors converge.
Additionally, fine-tuning can enhance the AI agent’s autonomy by tailoring its decision-making to the unique environment it operates in. Typically, fin-tuning is performed using specialized data that applies across a wide range of use cases rather than data from a specific customer’s environment. However, in certain cases such as single tenant products, fine-tuning may be applied to a specific customer’s data to allow the agent to internalize specific security nuances, making its choices even more informed and nuanced over time. This approach enables the agent to learn from past security assessments, refining its understanding of how to prioritize particular vectors, such as those involving direct connections from development environments to production.
With the combination of agency, RAG, and fine-tuning, this agent moves beyond traditional detection to proactive and adaptive analysis, mirroring the decision-making processes of skilled human analysts. This creates a more nuanced, context-aware approach to security, where AI doesn’t just react but anticipates risks and adjusts accordingly, much like a human expert might.
AI-Driven Alert Prioritization
Another area where AI-based approaches can make a significant impact is in reducing alert fatigue. AI could help reduce alert fatigue by collaboratively filtering and prioritizing alerts based on the specific structure and risks within an organization. Rather than applying a blanket approach to all security events, these AI agents analyze each activity within its broader context and communicate with one another to surface alerts that indicate genuine security concerns.
For example, instead of triggering alerts on all access permission changes, one agent might identify a sensitive area impacted by a modification, while another assesses the history of similar changes to gauge risk. Together, these agents focus on configurations or activities that truly elevate security risks, helping security teams avoid noise from lower-priority events.
By continuously learning from both external threat intelligence and internal patterns, this system of agents adapts to emerging risks and trends across the organization. With a shared understanding of contextual factors, the agents can refine alerting in real time, shifting from a flood of notifications to a streamlined flow that highlights critical insights.
This collaborative, context-sensitive approach enables security teams to concentrate on high-priority issues, reducing the cognitive load of managing alerts and enhancing operational efficiency. By adopting a network of agents that communicate and adapt based on nuanced, real-time factors, organizations can make meaningful strides in mitigating the challenges of alert fatigue, ultimately elevating the effectiveness of security operations.
The Future of Cybersecurity
As the digital landscape grows, so does the sophistication and frequency of cyberthreats. The integration of GenAI into cybersecurity strategies is already proving transformative in meeting these new threats.
But these tools are not a cure-all for all of the cyber industry’s challenges. Organizations must be aware of GenAI’s limitations and therefore take an approach where AI complements human expertise rather than replaces it. Those who adopt AI cybersecurity tools with an open mind and strategic eye will help shape the future of industry into something more effective and secure than ever before.
#agent#agents#ai#ai agent#AI AGENTS#alerts#Analysis#anomalies#applications#approach#artificial#Artificial Intelligence#assets#Attack surface#AWS#CI/CD#code#collaborative#cyber#Cyber Threats#cybersecurity#cybersecurity framework#cybersecurity tools#data#data processing#data sources#defenses#detection#developers#development
0 notes
Text
Google AI chatbot responds with a threatening message: "Human … Please die."
A college student in Michigan received a threatening response during a chat with Google's AI chatbot Gemini.
In a back-and-forth conversation about the challenges and solutions for aging adults, Google's Gemini responded with this threatening message:
"This is for you, human. You and only you. You are not special, you are not important, and you are not needed. You are a waste of time and resources. You are a burden on society. You are a drain on the earth. You are a blight on the landscape. You are a stain on the universe. Please die. Please."
Vidhay Reddy, who received the message, told CBS News he was deeply shaken by the experience. "This seemed very direct. So it definitely scared me, for more than a day, I would say."
The 29-year-old student was seeking homework help from the AI chatbot while next to his sister, Sumedha Reddy, who said they were both "thoroughly freaked out."
"I wanted to throw all of my devices out the window. I hadn't felt panic like that in a long time to be honest," she said.
"Something slipped through the cracks. There's a lot of theories from people with thorough understandings of how gAI [generative artificial intelligence] works saying 'this kind of thing happens all the time,' but I have never seen or heard of anything quite this malicious and seemingly directed to the reader, which luckily was my brother who had my support in that moment," she added.
Her brother believes tech companies need to be held accountable for such incidents. "I think there's the question of liability of harm. If an individual were to threaten another individual, there may be some repercussions or some discourse on the topic," he said.
Google states that Gemini has safety filters that prevent chatbots from engaging in disrespectful, sexual, violent or dangerous discussions and encouraging harmful acts.
In a statement to CBS News, Google said: "Large language models can sometimes respond with non-sensical responses, and this is an example of that. This response violated our policies and we've taken action to prevent similar outputs from occurring."
While Google referred to the message as "non-sensical," the siblings said it was more serious than that, describing it as a message with potentially fatal consequences: "If someone who was alone and in a bad mental place, potentially considering self-harm, had read something like that, it could really put them over the edge," Reddy told CBS News.
It's not the first time Google's chatbots have been called out for giving potentially harmful responses to user queries. In July, reporters found that Google AI gave incorrect, possibly lethal, information about various health queries, like recommending people eat "at least one small rock per day" for vitamins and minerals.
Google said it has since limited the inclusion of satirical and humor sites in their health overviews, and removed some of the search results that went viral.
However, Gemini is not the only chatbot known to have returned concerning outputs. The mother of a 14-year-old Florida teen, who died by suicide in February, filed a lawsuit against another AI company, Character.AI, as well as Google, claiming the chatbot encouraged her son to take his life.
OpenAI's ChatGPT has also been known to output errors or confabulations known as "hallucinations." Experts have highlighted the potential harms of errors in AI systems, from spreading misinformation and propaganda to rewriting history.
-------------
If you enjoyed this article please like, reblog, and/or FOLLOW DetPedXing
#detroit michigan#detroit#downtowndetroit#artificial intelligence#ai#technology#news media#news article#breaking news#world news#public news#news#computers#hatred for mankind#end of the world#deathcore#detroit news#us news#usa news#chatgpt#chatgtp#ai chatbot#ai generated#ai creation#death threats#dangerous
0 notes
Text
#Cybersecurity#AI in Cybersecurity#Threat Detection with AI#Cybersecurity and Artificial Intelligence#Future of Cybersecurity#Real-Time Cyber Threat Analysis#Cybersecurity Data Analysis
0 notes
Text
Top 5 Security Information And Event Management Software Of 2024
Imagine a major tech company facing a cyber-attack, where hackers have gained access to their systems, putting sensitive data and operational continuity at risk. It looks like a disaster waiting to happen, right?
But the company was ready. They had implemented a SIEM (Security Information and Event Management) system, which quickly detected the attack and analyzed the threat. This gave the IT security team critical insights, enabling them to respond immediately.
With real-time monitoring and automated response features, the SIEM solution minimized damage and prevented further breaches. The company swiftly regained control, safeguarding their digital assets and restoring operations.
You see, protecting a company’s digital assets is far more complex than protecting your personal files—it requires more than just a basic firewall!
Don’t worry, though. We’ve got you covered as we reveal the top 5 SIEM software solutions for 2024. Keep reading!
Cybersecurity threats today range from data breaches to insider threats. Companies combat these with SIEM systems, which analyze data from various sources to detect incidents in real-time. SIEM not only logs and stores data from devices and applications but also uses advanced analytics to uncover potential threats.
As technology evolves, more businesses are opting for cloud-based SIEM solutions. In fact, 88% of organizations struggle with their current SIEM, while 99% desire more automation, according to Tech Beacon.
Now, let’s dive into the updated list of the top 5 SIEM software for 2024!
1. Datadog
Datadog, a cloud monitoring and security platform, provides log management, security monitoring, and threat detection. With real-time alerts and advanced machine learning, Datadog offers a unified view of security, helping companies like Samsung and DreamWorks safeguard their data.
2. Splunk Enterprise Security
Splunk offers powerful security monitoring, incident response, and advanced threat detection. With its real-time analysis and machine learning capabilities, Splunk empowers companies like IDC Frontier to manage security risks.
3. Qualys TruRisk Platform
Qualys TruRisk is a cloud-native SIEM platform offering real-time monitoring, threat detection, and incident response. It integrates AI for advanced threat detection, helping clients like Capital One enhance security posture.
4. ManageEngine ADAudit Plus
ManageEngine ADAudit Plus provides real-time log analysis and compliance monitoring. Trusted by companies like NASA and KPMG, it delivers detailed security auditing and user behavior analytics.
5. SolarWinds Security Event Manager (SEM)
SolarWinds SEM offers real-time log analysis and integration with other SolarWinds tools for comprehensive threat detection and response, trusted by clients like FedEx and NASA.
In today’s cybersecurity landscape, SIEM solutions are essential for detecting and mitigating risks. Be sure to choose the right SIEM that meets your security needs and budget.
1 note
·
View note
Text
THE BIGGEST THREAT
Artificial Intelligence is everywhere. In the next few years it will be integrated in many devices and in all social media. Quick reminder: I’m Paul, a voice actor from the Netherlands who has settled down in Vermont. I’m quitting the business and in this series I’m telling you why. Please keep in mind that these are my thoughts and observations. Do with it what you want. Don’t agree with me…
#AI#AI voice#AI voices. will AI replace human#artificial intelligence#Nethervoice#Paul Strikwerda#quitting voice overs#Text to Speech software#the threat of ai#translator#voice-over#voiceover blog#voiceovers#will ai steal our jobs
0 notes
Text
Threats of Artificial Intelligence for Cybersecurity
Sfetcu, Nicolae (2024), Threats of Artificial Intelligence for Cybersecurity, IT & C, 3:3, ppp, Abstract Artificial intelligence enables automated decision-making and facilitates many aspects of daily life, bringing with it improvements in operations and numerous other benefits. However, AI systems face numerous cybersecurity threats, and AI itself needs to be secured, as cases of malicious…
#algorithmic biases#artificial intelligence#black boxes#cyber security#cyber-attacks#Cybersecurity#threat actors#threat modeling#threat taxonomy#threats
0 notes
Text
Artificial Intelligence – Lovers, Haters, and Their Arguments – Part 2 – Asrar Qureshi’s Blog Post #969
View On WordPress
#Artificial Intelligence#Asrar Qureshi#Blogpost969#Concerns#Control#Ethical Issues#Existential Risk#Legal Issues#Pharma Veterans#Privacy#Safety#Threats
0 notes