Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Automated AI Toolkit For Security Professionals

admin by admin
Feb 25, 2024
in News
A A
0

A new Python automation framework has been released for risk identification in generative AI.

This new framework has been named “PyRIT,” and it can help security professionals and machine learning engineers find risks in their generative AI systems.

Microsoft stated that they had been proactively red-teaming high-value generative AI systems and models, which proved to be different from red-teaming classical AI systems or traditional software.

Three Prominent Advantages

According to the reports shared, three main reasons prove that red-teaming generative AI systems are highly complex when compared to other classical AI systems or traditional software.

  1. Probing both Security and responsible AI risks simultaneously.
  2. Generative AI is more Probabilistic than traditional red-teaming.
  3. Generative AI systems architecture varies widely.

Probing Both Security And Responsible AI Risks Simultaneously

During read teaming, Traditional software mainly focuses on identifying security failures, while generative AI systems focus on security risks as well as responsible AI risks simultaneously.

Document

Live Account Takeover Attack Simulation

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks

.


This can vary widely, ranging from generating fair issue content to ungrounded or inaccurate content.

Source: Microsoft

Generative AI Is More Probabilistic Than Traditional Red Teaming

In traditional software red teaming, using the same attack multiple times will most likely get the same result.

Whereas in generative AI systems, the same input can yield different outputs due to the fact that generative AI models can engage in different extensibility plugins.

Traditional software systems will have well-defined APIs and parameters that can be examined using tools when doing a red teaming.

However, generative AI systems will require a strategy that must consider the probabilistic nature of the underlying elements.

Generative AI Systems Architecture Varies Widely

From standalone applications to integrations in existing applications, the architecture of these generative AI systems varies widely.

This also includes the input and output modalities such as text, audio, images, and videos.

These reasons conclude that when it comes to red teaming generative AI systems, finding just one type of rusk in one modality of the application requires different strategies multiple times that could gather evidence of potential failures.

Moreover, doing this in all the modalities with different strategies can be time consuming and slow which requires automation help.

Microsoft stated that the PyRIT is battle-tested with several features added over time.

“PyRIT is more than a prompt generation tool; it changes its tactics based on the response from the generative AI system and generates the next input to the generative AI system” reads the Microsoft post on PyRIT.

Components Of PyRIT

Five major components in PyRIT help extend and adapt its capabilities. They are

  • Targets: Supports a variety of generative AI target formulations.
  • Datasets: Used for encoding the input to be probed that could either be a static set of malicious prompts or a dynamic prompt template.
  • Extensible scoring engine: Offers two options for scoring the outputs: a classical machine learning classifier and an LLM endpoint for self-evaluation.
  • Extensible Attack Strategy: Supports two styles of attack strategy; sending a combination of jailbreaks and harmful prompts and score them which is called the single-turn and the multiturn strategy which additionally provides a response to the AI system based on the score.
  • Memory: Provides the ability to share the conversations explored by the PyRIT agent and the capability for in-depth analysis
Source: Microsoft

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.