Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Adobe brings AI image generation to Acrobat

Computerworld.com [Hacking News] - 17 Červen, 2024 - 21:05

Adobe Acrobat users can now generate and edit images in PDFs via text prompts with the addition of Adobe’s Firefly AI image model.

The update gives Acrobat and Reader users access to some of the same image creation and editing capabilities available in Adobe design apps such as Photoshop, without the need to switch tools. This means it’s possible to create new images from scratch using Adobe’s latest Firefly Image 3 model — which Adobe claims will enable greater realism and more control over the images produced compared to previous models — or manipulate existing content with Generative Fill and Remove Background tools.

The Firefly image feature, announced Monday, is available for Adobe Acrobat Standard and Pro customers; they will receive 250 “generative credits” to use with the Edit Image and Generate Image features each month at no additional cost through January 2025 an Adobe spokesperson said. The price after that date point has yet to be determined. 

“Adobe has done workers a service by building technologies like the generative capabilities of Adobe Firefly and working to integrate them across a range of their applications and tools,” said Matt Arcaro, IDC research director for computer vision and AI. By building Firefly into familiar apps such as Acrobat, the level of friction involved in accessing a new technology is reduced, he said. 

Adobe has also added new features to the AI Assistant for Acrobat and Reader apps announced in February

The generative AI (genAI) assistant can now summarize information from multiple documents — including PDF, Word, PowerPoint, and other file formats — at the same time. That lets users identify common trends and generate an overview summary with citations that point to the source of information, Adobe said. Users can then direct the AI assistant to format the content for a specific purpose, such as turning it into an email that can be sent to colleagues. 

The ability to query multiple documents adds value to Adobe’s “document chat” tool, said Arcaro. “This creates a significant speed up for gathering key insights, but also to put together a more comprehensive perspective across multiple similar or different documents,” he said.

The Acrobat AI assistant can also be used to summarize the transcription of a Microsoft Teams meeting or webinar, or upload a “VTT” transcript file generated in another meeting app. 

The Acrobat AI Assistant is available for free until June 28, after which it will cost an additional $4.99 each month for individual Acrobat Standard and Pro subscribers under Adobe’s “early access pricing.” This pricing is available up to Sept. 4. 

Adobe didn’t respond to a request for pricing details after this date. 

Kategorie: Hacking & Security

Emojis as Weapons: Dissecting DISGOMOJI's Malware Assault on Government Security

LinuxSecurity.com - 17 Červen, 2024 - 19:38
DISGOMOJI malware represents an innovative development in cyber espionage tactics, particularly its refined approach to targeting government agencies in India. Originating from altering an open-source cybersecurity project previously known as discord-c2, its appearance reinforces an emerging trend of adapting and evolving existing tools into intricate cyberespionage campaigns.DISGOMOJI's deployment is highly sophisticated. It employs Discord's widespread use to communicate command and control (C2) messages using emojis, effectively concealing malicious activities within seemingly innocent traffic and complicating efforts to detect and neutralize this threat.A recent analysis by cybersecurity firm Volexity reports that the DISGOMOJI malware appears to be targeting systems running the Linux distribution BOSS, which is widely utilized by Indian government entities. The attackers behind this initiative--identified by Pakistan-based threat actor UTA0137--is clearly intent on infiltrating and potentially breaching Indian government infrastructure.DISGOMOJI appears to gain entry through phishing attacks , an effective and common method for credential theft and malware delivery. What distinguishes DISGOMOJI is its persistent mechanism and use of emoji commands, like using a camera with the flash emoji to take screenshots or the Fox Emoji to zip all Firefox profiles on target devices. Such commands demonstrate its clever design and allow attackers to acquire sensitive data without leaving a trace on compromised systems.DISGOMOJI's open-source nature and adaptable design create a further risk; the malware can be adjusted and deployed against additional targets beyond India's government. Furthermore, its ability to bypass Discord's attempts at shutting down malicious servers by managing tokens to allow attackers to update client configuration easily demonstrates the difficulty of countering such an advanced threat.Additional ConsiderationsThe open-source nature of DISGOMOJI raises important issues about the duality of publicly available cybersecurity tools and projects. While open-source projects provide great resources for research, education, and legitimate defensive purposes, they also serve as blueprints that could be modified maliciously.Linux administrators and cybersecurity professionals, particularly in industries vulnerable to being targeted by espionage-focused malware, should view DISGOMOJI as an illustration of cyberspace's ongoing arms race. This would emphasize the necessity for constant vigilance, education on emerging threat vectors, and implementation of multilayered security measures that detect and prevent such targeted threats.DISGOMOJI malware targeting Linux systems marks a striking change in cyber threats targeting these environments. While traditional malware relies on textual-based command and control (C2) mechanisms, DISGOMOJI's use of emoticons for command transmission through Discord is both novel and alarming - bypassing security systems designed to monitor more conventional indicators of compromise thereby creating new difficulties for detection and mitigation.How Does DISGOMOJI Compare with Other Linux Malware and Ransomware?To better assess this threat, it would be useful to compare DISGOMOJI against other significant malware threats like other significant Linux malware and ransomware such as DISGOMOJI that has appeared lately. When comparing them side-by-side, several aspects stand out:Method of Communication: Most Linux-targeting threats, like Ebury botnet, employ traditional botnet communication methods like IRC channels or HTTP-based C2 infrastructures for command and control (C2). But DISGOMOJI stands out by employing popular, legitimate services for C2, making its traffic harder to distinguish from benign communications.Targeting and Sophistication: Where Mirai uses brute-force attacks against IoT devices to create large botnets for DDoS purposes, DISGOMOJI appears more focused on espionage with targeted attacks against specific government agencies - suggesting an even higher level of sophistication behind its operations that may include state actors.Stealth and Persistence: DISGOMOJI utilizes advanced stealth techniques, such as displaying a decoy PDF, to avoid detection while employing persistence mechanisms like cron jobs and XDG autostart entries, similar to those used by other sophisticated malware. This makes it more complex and more challenging for security analysts to detect and remove it, making it resistant to removal.How Concerned Should Linux and InfoSec Administrators Be?Linux and InfoSec administrators should view DISGOMOJI with great concern due to its unique C2 strategy, targeted nature, sophisticated deployment mechanisms, and sophisticated persistence mechanisms. Awareness and preparation can greatly reduce its threat; an understanding that Linux systems are susceptible to targeted attacks is paramount, so security posture adjustments must be made accordingly. mes Mitigation StrategiesAdministrators need to implement various mitigation strategies to protect themselves from threats such as DISGOMOJI:Enhance Monitoring and Detection : Employ advanced monitoring solutions capable of analyzing network traffic behavior and detecting anomalous patterns such as using legitimate services like Discord for potential C2 communications.Regular System and Patch Updates and Patching : Regular system and application updates help protect against vulnerabilities that could serve as entryways to infections, acting as initial infection vectors for hackers and cybercriminals.Phishing Awareness Training : Since DISGOMOJI utilizes phishing as the initial entryway into their network, training staff to identify and respond to any attempted phishing is an essential defense against infection.Segregation : By isolating critical networks and restricting access to essential services only, network segmentation helps contain any malware outbreaks should an infection arise.Application Whitelisting and Restricted Script Execution : Block any unapproved applications from running and restrict script execution capabilities to limit malware's ability to launch payload or establish persistence.Utilize Security Tools with Machine Learning Capabilities : For effective defense against new attack vectors, implement solutions that leverage machine learning for threat identification and blocking using behavioral analysis. This approach may be more successful in blocking threats with novel behaviors than traditional solutions.Improved Email Filtering : Email security measures must be strengthened with robust filtering rules to prevent phishing scams from succeeding.Discord Usage Policy : Organizations should implement policies to review and potentially restrict the use of Discord and similar platforms when necessary or monitor its usage on sensitive systems.Community Vigilance : As this open-source malware is spread widely through threat vectors, cybersecurity communities should remain vigilant in monitoring and sharing intelligence on variations of DISGOMOJI malware as a collective defense approach.While DISGOMOJI poses a substantial threat to Linux systems, increased awareness, advanced detection tools, and robust security practices can reduce its threat.
Kategorie: Hacking & Security

How to use iCloud with Windows

Computerworld.com [Hacking News] - 17 Červen, 2024 - 17:59

If you have an Apple ID, you can use iCloud with Windows, which means you can access your email, videos, photos, calendars, bookmarks, files and other iCloud data from your PC – useful when you’re at your desk or traveling without an Apple device, or if you are inside Boot Camp on your Mac.

How to use iCloud with Windows

There are two ways to use iCloud with Windows: via a browser or using a dedicated application called iCloud for Windows, but there are differences between the two:

The browser

On the surface, the most straightforward approach to using iCloud with Windows systems might appear to be accessing your iCloud account from your favorite web browser.

The app

That’s great up to a point, but to unlock the power of sync across all the devices you have logged into your iCloud account, including your Windows systems, it is far better to download and install Apple’s iCloud for Windows software on your PC. The software is available for free download directly from Microsoft’s app store.

Once installed and set up, you’ll be able to use iCloud to get to all your photos, documents and bookmarks on your Windows PC to update automatically across all your Apple devices, and vice versa, which is what you get when you use iCloud for Windows

Borrowed from One Drive

The most recently published version of iCloud for Windows uses Microsoft’s Cloud Files API, (One Drive’s Files On Demand feature) which makes the solution more robust and faster.

This means new assets will swiftly sync across all your devices, “enabling users to be more productive offline on mobile devices and quickly share files on iOS,” according to Microsoft Engineering General Manager Giorgio Sardo. In part, this is because the system is smart enough to just download a “breadcrumb” (around 1k in size) of each of your files, downloading the full item on request.

How does iCloud Drive work?

If you already use iCloud Drive, you’ll be familiar with what it does. If not, then the easiest way to understand the feature is as online storage for all the files and projects you are working on. Anything you save into any folder of the iCloud Drive will sync across all your Apple ID devices (it’s very like Dropbox in this). You will also be able to access items saved to iCloud Drive on your Mac, iPhone, or iPad within this folder on your PC using File Explorer. Fully searchable, the service also lets you share your files with others.

How do I access iCloud using a browser?

At those times when it makes sense to use the browser to access your iCloud data — such as when travelling and using a borrowed machine.  It’s easy: just navigate to iCloud.com using your browser and log in using your Apple ID and password. 

In a neat touch, any active Reminders you might have will appear at the top of the iCloud main page when you log in. You’ll also find an icon-based set of links to take you to your  iCloud apps and services, including your iCloud Drive.

  • Mail
  • Contacts
  • Calendar
  • Photos
  • iCloud Drive
  • Notes
  • Reminders
  • Find iPhone
  • Account Settings

You’ll also find fully functional online versions of Pages, Numbers and Keynote, which you can use to create documents compatible with both Mac and PC. You may also find News Publisher, if you have enabled that app.

NB: There are a small number of useful tasks you can only achieve using iCloud via your browser, such as creating rules to help improve email management across all your systems.

Accessing iCloud using a browser is especially useful on borrowed machines, during emergencies, while visiting Internet cafes or even using a machine you don’t own that you happen to have access to. Just remember to log out.

Of course, the beauty of iCloud is its ability to sync across all your devices, but to sync from a Windows system you need to install iCloud for Windows.

How to set up iCloud for Windows

Apple’s iCloud for Windows software should install automatically once downloaded. If it does not, open File Explorer, launch iCloud Setup and restart your PC. 

Setting up the app will create iCloud Photos and iCloud Drive folders on your Windows 10 device. These will sync with your iCloud account and connected devices, and should automatically appear in File Explorer’s Quick Access menu.

What are the system requirements?

The current iteration of iCloud for Windows requires that you are running at least Windows 10 and that you re signed into your Microsoft account. You’ll also need Outlook and a web browser (Microsoft Edge, Firefox, Chrome).

If you use Windows 7 or Windows 8, you can download compatible versions of iCloud for Windows directly from the Apple website. (Some iCloud services might work differently, as detailed here.)

Once the software is installed and open, you’ll be asked to enter your Apple ID to sign into iCloud, and you’ll then need to choose which iCloud features you want to use. To do this, you’ll be shown a window in which you check or uncheck each feature:

  • iCloud Drive,
  • Photos & videos, including sharing albums of images and videos.
  • Mail, Contacts, Calendars, Tasks
  • Bookmarks.

As you enable each of these categories, iCloud for Windows will create folders for those categories in File Explorer, so you can dive in to access or add to your iCloud content. You can also share and collaborate on files held in your iCloud Drive from within File Explorer, with edits synced across your devices.

Here is how to use each of these features:

How does iCloud Photos work?

When enabled, iCloud for Windows creates an iCloud Photos folder in File Explorer. Any images of videos you add to this folder will then be synced across all the devices you own that logged into this Apple ID. You can share galleries of images using iCloud Photo Sharing.

iCloud for Windows will keep lightweight copies of your images on your PC, only downloading full-res versions on request.

When you set yourself up with iCloud for Windows you’ll see an ‘Options’ item appear beside Photos. Tap this and you’ll find the following choices:

  • iCloud Photo Library: Enable this and any images/videos saved to the iCloud Photos folder on your Windows device will be stored in iCloud. You can also change which folders are used for photo and video sync.
  • My Photo Stream: Downloads all your most recent images from your devices to your Windows system.
  • Download new photos and videos to my PC: This option appears when you enable iCloud Photo Library, and is self explanatory.
  • Keep high-efficiency originals if available: Check this if you have plenty of drive space.
  • Upload new photos and videos from my PC: Disable this if you only want to view items captured by your other iCloud devices.
  • iCloud Photo Sharing: You can view items shared with you by others.
Mail, Contacts, Calendars, Tasks and Bookmarks

The final selection of iCloud items you can access using Windows. Once you enable this all your iCloud mail (typically sent to [email protected]) will be made available in the folder pane on Outlook. You’ll also find all your other calendaring data there, and bookmarks will be made available through your browser.

Apple recently made an extension available for the Chrome browser on Windows to ensure it remains compatible with iCloud and iCloud for Windows. Once the new version is installed, users should find a new “Passwords” section in the app with an iCloud Keychain logo.

Everything else

If you have any problems with these features, please refer to Apple’s extensive Support pages that should help you resolve them. (Don’t forget, you won’t receive email if you failed to create an iCloud email address when setting up your Apple ID).

There are some iCloud services that just don’t work on Windows: Find My iPhone, Back to My Mac, Backup, Notes and Reading List. All these require deeper OS integration, though in the case of Find My iPhone you will be able to track lost devices using iCloud in your browser.

However, if you have valuable data that you want to sync between your Macs, iOS devices and Windows PC, iCloud for Windows should help – though that 5GB of storage Apple supplies remains miserly at best.

(Find out more on how to synchronize iCloud — and what to do when it won’t sync.)

Can I use a Managed Apple ID?

Unfortunately, iCloud for Windows isn’t yet supported if you use a Managed Apple ID.

More useful iCloud tips

Here is a short collection of what may be useful tips for iCloud users on any platform, not just Windows:

Got a story? Please drop me a line via Twitter and let me know. I’d like it if you chose to follow me on Twitter so I can let you know about new articles I publish and reports I find.

Kategorie: Hacking & Security

Apple’s grip on retail tech is strengthening

Computerworld.com [Hacking News] - 17 Červen, 2024 - 16:59

Never underestimate the extent to which Apple technology is gaining ground across industries once seen as closed to it. Things have changed — even grocery stores use Apple products today (and not just to take your money). 

If you shop at big US food retailers such as Albertsons, Safeway, or Shaw’s, you may already have been close to an Apple product. That’s because these chains rely on an AI-augmented store-ordering solution from a company called Afresh to minimize food waste across meat and seafood departments. Grocery Dive informs us that the tech is being deployed at more than 2,200 stores.

Apple at a grocery store near you

What Afresh does is provide an ordering interface supplemented by AI-powered recommendations and guidance to manage specific food products. The idea is that by combining better product care with AI-supported ordering systems, food is kept fresher, less is unprofitably wasted, and ordering systems become streamlined. The system runs, of course, on iPads, and while it doesn’t replace high standards of food storage and hygiene, if those two things are in place, it can help optimize results.

Thousands of iPads and iPhones are also used at more than 400 supermarkets from top US grocery retailer H-E-B, (hat tip to Brian Wayman for noting this). Equipped with custom apps, these are used to improve how food is sold and stored and to help reduce waste.  

The implementation is interesting

When orders are put in, store employees gather the items, scanning them with the iPhone camera as they go; drivers are provided with optimized delivery routes, while iPads are linked to essential sensors, such as temperature sensors, using Bluetooth.

This lets one iPad be used as a mobile control monitoring system to track product storage temperatures across a store, including on shelves or rotisserie; the system also alerts staff when something needs to be put in the fridge to extend its storage. Finally, the Apple system is used with software from Salesforce to help optimize management functions, such as shift schedules, and for maintenance requests, product feedback and more.

Cupertino’s retail wave

UK retailer John Lewis and Partners is another recognized store brand that uses Apple products within its operations. All its staffers have iPhones equipped with the John Lewis app, which helps in terms of inventory management, customer guidance, and customer communication. Back in the US,  independent grocers DeCicco & Sons, Cardiff Seaside Market, Village Market, Fruit Center Marketplace and Caraluzzi’s Markets use FoodStorm’s iOS compatible system to manage their own produce.

Elsewhere in the retail sector, Rituals, Hästens, Laura, and many other stores now use Apple devices at point of sale, as inventory management tools, for pick and collect services, deliveries, warehousing, and more.

Apple, the mobile company

There’s a simple reason Apple’s hardware has picked up more presence in retail; it’s the combination of a powerful and highly secure development ecosystem along with mobile devices available in a myriad of formats. The Mac, iPad, iPhone, Apple Watch — even visionOS systems — might be suitable to handle some back-end functions across multiple enterprises. 

Speaking during Apple’s Q1 FY24 financial call, Apple CFO Luca Maestri confirmed that the company’s reach into industries it might never have made a dent in before has become an opportunity for the Vision Pro.  “We are seeing strong excitement in enterprise. Leading organizations across many industries, such as Walmart, Nike, Vanguard, Striker, Bloomberg and SAP, have started leveraging and investing in Apple Vision Pro as the new platform to bring innovative spatial computing experiences to their customers and employees.”

Now I don’t anticipate we’ll be meeting customer service representatives wearing Vision Pro headsets anytime soon. But as the cost of visionOS devices falls over time and more discreet headsets appear, it’s entirely possible that experiences of that kind will become normalized. And at the current pace of change, this aspect of the digital transformation might not be terribly far away.

The transformations will continue until morale improves

Apple Intelligence could form another string to the company’s bow, as developers of narrow domain-focused AI systems will want to ensure they build in support as seamlessly as possible for enterprise-focused apps on Apple devices. That means thinking about App Intents on the shop floor, or AI as a service in the same way as OpenAI is to be supported on iOS 18.

Such systems could provide contextually relevant information in the moment to optimize store management functions. And, at the current trajectory, they might well carry an Apple logo as they do.

This simply would not have been thought even plausibly possible just a decade ago.

Please follow me on Mastodon, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

Kategorie: Hacking & Security

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models

The Hacker News - 17 Červen, 2024 - 16:39
ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors to bypass authentication. Tracked as CVE-2024-3080, the vulnerability carries a CVSS score of 9.8 out of a maximum of 10.0. "Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device," Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices

The Hacker News - 17 Červen, 2024 - 13:59
A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located in East Asia for a period of about three years, with the adversary establishing persistence using legacy F5 BIG-IP appliances and using it as an internal command-and-control (C&C) for defense evasion purposes. Cybersecurity company Sygnia, which responded to Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices

The Hacker News - 17 Červen, 2024 - 13:59
A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located in East Asia for a period of about three years, with the adversary establishing persistence using legacy F5 BIG-IP appliances and using it as an internal command-and-control (C&C) for defense evasion purposes. Cybersecurity company Sygnia, which responded to
Kategorie: Hacking & Security

What is DevSecOps and Why is it Essential for Secure Software Delivery?

The Hacker News - 17 Červen, 2024 - 13:26
Traditional application security practices are not effective in the modern DevOps world. When security scans are run only at the end of the software delivery lifecycle (either right before or after a service is deployed), the ensuing process of compiling and fixing vulnerabilities creates massive overhead for developers. The overhead that degrades velocity and puts production deadlines at risk. The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

What is DevSecOps and Why is it Essential for Secure Software Delivery?

The Hacker News - 17 Červen, 2024 - 13:26
Traditional application security practices are not effective in the modern DevOps world. When security scans are run only at the end of the software delivery lifecycle (either right before or after a service is deployed), the ensuing process of compiling and fixing vulnerabilities creates massive overhead for developers. The overhead that degrades velocity and puts production deadlines at risk.
Kategorie: Hacking & Security

What is a CAIO — and what should they know?

Computerworld.com [Hacking News] - 17 Červen, 2024 - 12:00

Though it’s a relatively new title, the role of chief artificial intelligence officer (CAIO) is gaining prominence at organizations deploying generative AI (genAI) technology — whether they’re moving deliberately or plowing ahead quickly.

By last October, 11% of midsize and large organizations had already filled a CAIO role, according to research firm IDC — and another 21% were actively seeking one. Just over half of 97 CIOs surveyed last fall said their organization had plans to have an individual leader responsible for AI and about half of those CIOs expect that person to be part of the C-Suite, IDC said.

Newly hired or appointed CAIOs “are not only part of an organization’s C-suite, but they are expected to be one of the most strategic members of the organization,” IDC said in its report.

IDC

As organizations chase efficiency and the productivity promise of AI, the CAIO title is expected to emerge on LinkedIn and other social media feeds, according to Forrester Research Analyst Zeid Khater. In fact, the role could soon surface in one out of eight executive leadership teams. 

In a recent Forrester survey, 12% of companies said their CAIO is primarily responsible for the overall enterprise AI strategy; only 2% attributed that responsibility to a chief data officer (CDO). “This doesn’t mean that CDOs are on the verge of extinction,” Khater wrote in a blog post. “Data is still a vital and often unleveraged resource within organizations due to challenges around quality, governance, and access.”

He urged companies to “ensure your AI and data leaders are in lockstep to spin data straw into insights gold. The CAIO brings technical knowledge, while the CDO provides quality data. It’s a powerful partnership for AI success.”

One big factor every CAIO will have to consider is cost; deploying AI models is expensive because cloud providers and proprietary genAI use cases require a lot of computing power — high-end, expensive computing power. And the chips that power learning and inference processes in large language models can cost thousands of dollars. (Nvidia makes most of the GPUs for the AI industry, and its primary data center workhorse chip costs $10,000; the company’s lock on the AI chip market is, however, being challenged by others who hope to undercut it with lower chip prices.)

All federal agencies will have CAIOs

It’s not just private companies looking to hire. In March, US President Joseph R. Biden Jr. gave all federal agencies two months to appoint CAIOs who be responsible for promoting AI innovation, coordinating with other agencies, and managing risks associated with the technology. The 60-day deadline highlighted the urgent need for governance as AI continues its meteoric adoption.

“While AI is improving operations and service delivery across the Federal Government, agencies must effectively manage its use,” Biden’s memo said. “The risks… result from any reliance on AI outputs to inform, influence, decide, or execute agency decisions or actions, which could undermine the efficacy, safety, equitableness, fairness, transparency, accountability, appropriateness, or lawfulness of such decisions or actions.”

Twenty-four federal agencies had appointed CAIOs by the May 30 deadline. In all, the Biden administration plans to hire 100 AI professionals by this summer and is requiring all federal agencies to establish AI governance boards to coordinate adoption efforts and establish rules for the use of AI and genAI.

“The decision to institutionalize the role of CAIOs demonstrates a clear acknowledgment of AI’s strategic significance,” Joel Meyer, former deputy assistant secretary of the US Department of Homeland Security, said in a recent Fedscoop article. (Meyer led the creation of DHS’s AI Task Force.)

Lt. Gen. John Shanahan, who co-authored the article with Meyer and was the nation’s first director of the Department of Defense Joint Artificial Intelligence Center, said one CAIO responsibility “is to identify low-hanging fruit. AI pilots can be chosen thoughtfully to demonstrate hypotheses that can then be affirmed in each department’s AI strategy. These quick wins can build momentum for broader AI strategy implementation.”

Because federal agencies were given latitude to define the organization under CAIOs, there’s a lot of variety between them in terms of authority, budgets, and what how the role would be executed, according to Amy Jones, US Public Sector AI Market Lead with Ernst & Young.

“Day to day responsibilities [are] pretty varied,” she said. “I think a CAIO’s success would be agency literacy. We all use the internet and email every day, and that requires literacy on both how to use them safely and securely and also how to use them optimally.”

The same is true for genAI technology.

IDC

Data quality matters

One known hurdle for genAI rollouts is the quality of data used to train LLMs. As the saying goes: garbage in, garbage out. It’s both challenging and costly to obtain high-quality, unbiased, and representative data, according to Andrew Rabinovich, who recently took the new position as Head of AI at freelance job platform Upwork.

According Rabinovich, key considerations for new CAIOs looking to deploy AI include:

  • Careful planning and consideration for how the technology will deliver real customer impact rather than moving forward just for the sake of it or to keep pace with the hype cycle.
  • A clear understanding of business objectives and specific customer pain points to solve with AI before launch. 
  • Evaluating and ensuring the quality and reliability of the AI models being created, whether home-grown or by a third-party provider.
  • Ensuring that LLMs are trained on diverse and representative datasets to avoid bias, while consistently monitoring for iterative improvements.

“Ensuring data cleanliness and accuracy often requires extensive pre-processing, which is both time-consuming and resource-intensive — and that’s if you even have access to the right datasets,” Rabinovich said.

CAIOs and others tasked with overseeing AI deployments play an essential role in “shaping an organization’s strategic, informed and responsible use of AI,” he said. “There are many responsibilities baked into the role, but at its core, it’s about steering the direction of AI initiatives and innovation to align with company goals. AI leads must also create a culture of collaboration and continuous learning.”

“All teams across all functions within an organization should be thinking about how they can collaborate on AI projects, experiment with the technology and explore how to equip their teams with the right knowledge, skills and tools to harness AI,” he said.

IDC

At Upwork, Rabinovich is overseeing the company’s use of a GPT-4 LLM to create an AI-powered platform called Uma, which powers features such Best Match insights, aimed at helping businesses find the best potential person for a job by identifying relevant insights like top proposals, client reviews, and skill alignment with the job post.

For genAI to function reliably, CAIOs will need to figure out how to utilize AI and data optimization techniques for improved efficiency, data quality, and ethical considerations. “On paper, [you need] baseline compliance — making sure they [LLMs and genAI] are within regulatory and policies, creating [your] own policy within the agency that’s specific to the mission, [and] identification of inventory of use cases,” Jones said.

Rabinovich agreed. The quality of data used to train AI models is an important aspect of the development process, but it can be hard to obtain high-quality, unbiased, and representative data, he noted.

“Ensuring data cleanliness and accuracy often requires extensive pre-processing, which is both time-consuming and resource-intensive — and that’s if you even have access to the right datasets,” Rabinovich said.

A dedicated CAIO or one with shared duties?

Jenn Kosar, a partner at PricewaterhouseCoopers (PwC), said while most organizations have not yet designated CAIOs as an official C-suite role and title, from a functional perspective a significant number of organizations are filling the role today without the title. Most often, the position is one notch below a CIO, she said.

“Today, we often seen CTOs and CISOs taking this [genAI responsibility] on,” Kosar said. “And that may be OK for where we are today. But the strategic [planning], the change management, the innovation, the ability to take an organization through a transformation — these are really critical skills to the success of this role.

“Unfortunately, what we’re seeing in most instances it’s not a full-time job. In other words, they [CAIOs] have other roles. We believe it should be a dedicated role. They’re being held accountable for how an organization is moving forward with AI.”

While CAIOs might not always be seated at the C-suite table, those who are there are keenly focused on genAI and its potential to drive efficiencies and profits. Without an executive guiding those deployments, achieving the performance and ROI organizations seek will be tough, she said.

“It’s hard to imagine how pieces come together and how you’d bring together so many players,” Kosar said, noting that PwC has more than a dozen LLM-backed tools running internally to power AI tools and products in virtually every business unit.

“You have to have the ability to do short-term and long-term planning and balance the two and stay focused on innovation,” she continued. “At the same time, you need to recognize the pace of change while not getting distracted by the latest shiny object.”

Getting AI right is important because of how much it will be a part of everyday life by the end of the decade, Rabinovich said. By 2030, he believes virtually everyone will interact with AI and the tech will perform in roles varying from personal assistants and tutors to therapists and accountants — even lawyers.

“AI will help humans uplevel and enhance societies, because it’ll enable humans to focus on solving ever more complex problems,” Rabinovich said.

Kategorie: Hacking & Security

Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor

The Hacker News - 17 Červen, 2024 - 08:28
Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake browser updates. "The threat actor employs a multi-stage attack chain involving an infected website, a command-and-control (C2) server, in some cases a fake browser update, and a JScript downloader to deploy a backdoor into the victim's system," German
Kategorie: Hacking & Security

Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor

The Hacker News - 17 Červen, 2024 - 08:28
Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake browser updates. "The threat actor employs a multi-stage attack chain involving an infected website, a command-and-control (C2) server, in some cases a fake browser update, and a JScript downloader to deploy a backdoor into the victim's system," German Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

NiceRAT Malware Targets South Korean Users via Cracked Software

The Hacker News - 17 Červen, 2024 - 07:11
Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet. The attacks, which target South Korean users, are designed to propagate the malware under the guise of cracked software, such as Microsoft Windows, or tools that purport to offer license verification for Microsoft Office. "Due to the nature of crack programs, information sharing amongst
Kategorie: Hacking & Security

NiceRAT Malware Targets South Korean Users via Cracked Software

The Hacker News - 17 Červen, 2024 - 07:11
Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet. The attacks, which target South Korean users, are designed to propagate the malware under the guise of cracked software, such as Microsoft Windows, or tools that purport to offer license verification for Microsoft Office. "Due to the nature of crack programs, information sharing amongst Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain

The Hacker News - 16 Červen, 2024 - 06:31
Law enforcement authorities have allegedly arrested a key member of the notorious cybercrime group called Scattered Spider. The individual, a 22-year-old man from the United Kingdom, was arrested this week in the Spanish city of Palma de Mallorca as he attempted to board a flight to Italy. The move is said to be a joint effort between the U.S. Federal Bureau of Investigation (FBI) and the
Kategorie: Hacking & Security

U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain

The Hacker News - 16 Červen, 2024 - 06:31
Law enforcement authorities have allegedly arrested a key member of the notorious cybercrime group called Scattered Spider. The individual, a 22-year-old man from the United Kingdom, was arrested this week in the Spanish city of Palma de Mallorca as he attempted to board a flight to Italy. The move is said to be a joint effort between the U.S. Federal Bureau of Investigation (FBI) and the Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan

The Hacker News - 15 Červen, 2024 - 11:51
Pakistan has become the latest target of a threat actor called the Smishing Triad, marking the first expansion of its footprint beyond the E.U., Saudi Arabia, the U.A.E., and the U.S. "The group's latest tactic involves sending malicious messages on behalf of Pakistan Post to customers of mobile carriers via iMessage and SMS," Resecurity said in a report published earlier this week. "The goal is
Kategorie: Hacking & Security

Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan

The Hacker News - 15 Červen, 2024 - 11:51
Pakistan has become the latest target of a threat actor called the Smishing Triad, marking the first expansion of its footprint beyond the E.U., Saudi Arabia, the U.A.E., and the U.S. "The group's latest tactic involves sending malicious messages on behalf of Pakistan Post to customers of mobile carriers via iMessage and SMS," Resecurity said in a report published earlier this week. "The goal isNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks

The Hacker News - 15 Červen, 2024 - 10:13
A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting Indian government entities in 2024. Cybersecurity company Volexity is tracking the activity under the moniker UTA0137, noting the adversary's exclusive use of a malware called DISGOMOJI that's written in Golang and is designed to infect Linux systems. "It is a modified version of the public project
Kategorie: Hacking & Security

Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks

The Hacker News - 15 Červen, 2024 - 10:13
A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting Indian government entities in 2024. Cybersecurity company Volexity is tracking the activity under the moniker UTA0137, noting the adversary's exclusive use of a malware called DISGOMOJI that's written in Golang and is designed to infect Linux systems. "It is a modified version of the public project Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah