By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: AI Can Outsmart You, and Cybercriminals Know It | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > AI Can Outsmart You, and Cybercriminals Know It | HackerNoon
Computing

AI Can Outsmart You, and Cybercriminals Know It | HackerNoon

News Room
Last updated: 2025/02/19 at 1:41 PM
News Room Published 19 February 2025
Share
SHARE

Cybersecurity and artificial intelligence share the foundational concept of an ‘adversary’.

In cybersecurity, the adversary is a threat actor— a lone hacker, organized crime group, or even a nation-state—seeking to exploit vulnerabilities in a system. In AI, an adversary is a mechanism designed to manipulate models into making incorrect decisions.

The two adversaries converge in the ongoing AI revolution, where a silent arms race is underway – attackers leverage advanced AI to craft hyper-personalized scams, poison training data, and fool real-world systems, while defenders scramble to harden algorithms and infrastructure.

To be protected in this new era, organizations must adopt a holistic and adversarial view of their systems – tightening up all the links in the chain and leveraging the attackers’ tools in defensive setups. In this article, I discuss novel cybersecurity threats and how to defend against them.

1. Hyper-personalized phishing

In February 2024, a Hong Kong finance worker transferred $25 million to fraudsters, persuaded of the legitimacy of the transaction by a video call where all the other attendees were deepfake representations of the company staff. A similar attack, impersonating WPP’s CEO in an audio message, was foiled in May 2024. Darktrace reports a 135% surge in novel social engineering attacks. Attackers are using AI in increasingly creative ways for phishing attacks. AI impersonation technology today is the weakest it’s ever going to be – and it’s already scarily good. How should organizations guard against this?

  1. Better verification and authentication protocols – no communication through unofficial channels should be trusted.
  2. Consider using decentralized identifiers (DIDs) as a self-identification mechanism. This will help validate that communications originate from you robustly and securely.
  3. Train employees to recognize phishing attempts. A novel strategy – using sophisticated AI-powered ‘phishing drills’ to inoculate employees against suspicious requests.

2. Real-world exploits

It is a mistake to assume that AI attacks only exist in the digital world. Researchers have shown that it’s possible to alter medical reports in an imperceptibly small way to change the classification of a tumor from malignant to benign, and to use innocuous stickers to fool self-driving cars into thinking a stop-sign is a 45 mph speed limit sign. The reason these attacks work is that AI models operate within a high-dimensional space where changes that appear insignificant to us can put the model into ‘uncharted territory’ where it makes incorrect decisions.

If you’re building an AI product, it’s important to put it to the test adversarially – your cyber adversaries will certainly do the same. Large companies often deploy strong ‘adversarial models’ that find inputs that break the core model and then use those inputs to make the target model more resilient.

Attackers can also target the physical components of your product. If you’re operating in a high-risk product space (such as medicine or autonomous robotics), you cannot assume that the hardware has not been compromised. Trusted Platform Modules (TPMs) provide hardware-level security guarantees and are increasingly deployed in self-driving cars. Think adversarially about what an attacker could do if they had full access to the product hardware – could they compromise it in a way that’s hard to detect but can cause disastrous consequences?

3. Data poisoning

Research has shown that contaminating a training dataset by even a small percentage (less than 1%) can profoundly alter the quality of the final model. In a world where training data is often scraped from the internet, it is easy for attackers to sneak in poisoned data that effectively builds backdoors into the models it will be used to train.

Some essential preventative measures:

  1. Evaluate the sourcing of your data carefully – rely on trusted data suppliers wherever possible.
  2. Think of creative ways to filter out poisoned data before it gets into your model. For instance, if your data is text, consider using LLMs to pre-validate the corpus for contamination and inappropriate content.

4. Code vulnerability identification

The coding prowess of LLMs can be put to use in nefarious ways. One emerging attack vector is deploying agents that continually search for vulnerabilities to exploit inaccessible code bases. The cost of detecting zero-day exploits has become lower than ever. Implement the following protections for your code base:

  1. Use LLMs to comb over any code for security vulnerabilities before it can be submitted.

  2. Be careful when taking on any third-party dependencies – your system is only as secure as its weakest link.

Soon enough, the use of LLMs as security reviewers will become increasingly common, to the point where it will be considered as essential to software developers as hand-washing is to medical professionals.

Think adversarially and holistically

The advent of generative and agentic AI promises a time of great upheaval and change. The internet was an enormous boon to human productivity, but it also gave malicious actors new tools and landscapes with which to harm others.

The AI revolution will be no different. Companies looking to stay ahead of novel security threats should think adversarially – leveraging the same tools as the attackers to make their systems more secure and resilient. Companies should also think holistically, not limiting themselves to the digital realm, and examining all the links in their product chain as potential targets.

n

n

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Humane AI Pin going offline after HP sale, and buyers are screwed
Next Article Apple no longer sells new iPhones with Lightning ports
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Rare deal: AL HydraBlast Bluetooth speaker drops to $31 for the first time
News
The Startup Playbook Is a Lie. Ask Better Questions. | HackerNoon
Computing
The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge
Gadget
SNAG The LG 55-inch UT75 4K tv at Its lowest price evr at amazon
Software

You Might also Like

Computing

The Startup Playbook Is a Lie. Ask Better Questions. | HackerNoon

6 Min Read
Computing

General Motors reduces workforce in China, mulls restructuring with partner · TechNode

1 Min Read
Computing

Top 12 White Label SaaS Software and Platforms |

26 Min Read
Computing

Stop Spooking Customers With “AI” and Start Hooking Them With Solutions | HackerNoon

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?