• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google expands its bug bounty program to tackle artificial intelligence

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

You are here: Home / General Cyber Security News / Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats
October 27, 2023

Google has introduced that it truly is expanding its Vulnerability Rewards Method (VRP) to reward researchers for getting attack eventualities customized to generative synthetic intelligence (AI) devices in an exertion to bolster AI security and security.

“Generative AI raises new and various worries than conventional electronic security, this kind of as the opportunity for unfair bias, model manipulation or misinterpretations of data (hallucinations),” Google’s Laurie Richardson and Royal Hansen mentioned.

Some of the classes that are in scope involve prompt injections, leakage of delicate facts from teaching datasets, model manipulation, adversarial perturbation attacks that result in misclassification, and model theft.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

It’s well worth noting that Google previously this July instituted an AI Crimson Team to support deal with threats to AI methods as component of its Protected AI Framework (SAIF).

Also declared as portion of its dedication to protected AI are initiatives to improve the AI supply chain through current open up-resource security initiatives this kind of as Offer Chain Concentrations for Application Artifacts (SLSA) and Sigstore.

Artificial Intelligence Threats

“Digital signatures, these kinds of as these from Sigstore, which let people to confirm that the computer software wasn’t tampered with or changed,” Google claimed.

“Metadata this kind of as SLSA provenance that inform us what’s in application and how it was constructed, making it possible for consumers to assure license compatibility, determine recognized vulnerabilities, and detect far more state-of-the-art threats.”

Cybersecurity

The advancement arrives as OpenAI unveiled a new internal Preparedness workforce to “observe, examine, forecast, and shield” from catastrophic hazards to generative AI spanning cybersecurity, chemical, organic, radiological, and nuclear (CBRN) threats.

The two companies, together with Anthropic and Microsoft, have also announced the creation of a $10 million AI Basic safety Fund, centered on promoting research in the industry of AI basic safety.

Identified this write-up attention-grabbing? Comply with us on Twitter  and LinkedIn to browse extra unique articles we article.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «f5 issues warning: big ip vulnerability allows remote code execution F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution
Next Post: How to Keep Your Business Running in a Contested Environment how to keep your business running in a contested environment»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.