{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Embracing Digital Transformation","title":"#160 Security in Generative AI","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/4c497792\"></iframe>","width":"100%","height":180,"duration":1897,"description":"In this episode, host Darren Pulsipher is joined by Dr. Jeffrey Lancaster to delve into the intersection of generative AI and security. The conversation dives deep into the potential risks and challenges surrounding the use of generative AI in nefarious activities, particularly in the realm of cybersecurity. The Threat of Personalized Phishing AttacksOne significant concern highlighted by Dr. Lancaster is the potential for personalized and sophisticated phishing attacks. With generative AI, malicious actors can scale their attacks and craft personalized messages based on information they gather from various sources, such as social media profiles. This poses a significant threat because personalized phishing attacks are more likely to bypass traditional spam filters or phishing detection systems. Cybercriminals can even leverage generative AI to clone voices and perpetrate virtual kidnappings.To combat this threat, organizations and individuals need to be extra vigilant in verifying the authenticity of messages they receive. Implementing secure communication channels with trusted entities is essential to mitigate the risks posed by these personalized phishing attacks. Prompt Injection: A New Avenue for HackingThe podcast also delves into the concept of prompt injection and the potential security threats it poses. Prompt injection involves manipulating the input to large language models, allowing bad actors to extract data or make the model behave in unintended ways. This opens up a new avenue for hacking and cyber threats.Companies and individuals utilizing large language models need to ensure the security of their data inputs and outputs. The recent Samsung IP leak serves as a cautionary example, where sensitive information was inadvertently stored in the model and accessible to those who know the right prompts. The podcast emphasizes the importance of considering the security aspect from the beginning and incorporating it into conversations about using large...","thumbnail_url":"https://img.transistorcdn.com/IRrW2aizIeoZDn3gKLEax-JYQ8V_WzaFpHdgsslDx3k/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jM2Ji/MDk1OTdiYzA4ZWMw/NWNlOTY0N2RhMWQ3/YmY5Mi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}