• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google open sources magika: ai powered file identification tool

Google Open Sources Magika: AI-Powered File Identification Tool

You are here: Home / General Cyber Security News / Google Open Sources Magika: AI-Powered File Identification Tool
February 17, 2024

Google has introduced that it is open-sourcing Magika, an synthetic intelligence (AI)-powered resource to discover file forms, to assist defenders accurately detect binary and textual file styles.

“Magika outperforms common file identification strategies giving an over-all 30% accuracy improve and up to 95% larger precision on traditionally difficult to determine, but probably problematic written content these kinds of as VBA, JavaScript, and Powershell,” the business claimed.

The software package takes advantage of a “custom made, highly optimized deep-understanding product” that allows the specific identification of file styles inside milliseconds. Magika implements inference features applying the Open up Neural Network Trade (ONNX).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Google said it internally takes advantage of Magika at scale to assist boost users’ protection by routing Gmail, Travel, and Risk-free Searching files to the proper security and material plan scanners.

Cybersecurity

In November 2023, the tech huge unveiled RETVec (shorter for Resilient and Productive Text Vectorizer), a multilingual text processing product to detect perhaps damaging articles these types of as spam and malicious email messages in Gmail.

Amid an ongoing discussion on the threats of the swiftly developing technology and its abuse by country-condition actors connected with Russia, China, Iran, and North Korea to raise their hacking attempts, Google claimed deploying AI at scale can reinforce electronic security and “tilt the cybersecurity stability from attackers to defenders.”

Google Open Sources Magika

It also emphasized the want for a well balanced regulatory approach to AI use and adoption in get to stay clear of a long term wherever attackers can innovate, but defenders are restrained thanks to AI governance options.

“AI enables security industry experts and defenders to scale their perform in risk detection, malware examination, vulnerability detection, vulnerability correcting and incident response,” the tech giant’s Phil Venables and Royal Hansen observed. “AI affords the finest possibility to upend the Defender’s Problem, and tilt the scales of cyberspace to give defenders a decisive benefit around attackers.”

Issues have also been elevated about generative AI models’ use of web-scraped details for instruction reasons, which may possibly also incorporate particular information.

Cybersecurity

“If you will not know what your design is heading to be utilized for, how can you make certain its downstream use will respect data protection and people’s legal rights and freedoms?,” the U.K. Info Commissioner’s Business office (ICO) pointed out last month.

What’s additional, new research has proven that big language versions can purpose as “sleeper brokers” that may well be seemingly innocuous but can be programmed to have interaction in deceptive or malicious behavior when unique criteria are met or particular directions are presented.

“These backdoor behavior can be built persistent so that it is not removed by common protection education tactics, like supervised fantastic-tuning, reinforcement learning, and adversarial instruction (eliciting unsafe actions and then teaching to eliminate it), researchers from AI startup Anthropic explained in the study.

Uncovered this article intriguing? Abide by us on Twitter  and LinkedIn to read extra special material we post.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «cisa warning: akira ransomware exploiting cisco asa/ftd vulnerability CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability
Next Post: How Businesses Can Safeguard Their Communication Channels Against Hackers how businesses can safeguard their communication channels against hackers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.