Archive for the ‘Ai’ Category

AI Avatars Will Soon Attend Your Work Meetings, Claims Tech CEO – NDTV

Artificial intelligence has proliferated rapidly in past few months.

A tech CEO has said that by the end of this year, artificial intelligence (AI) avatars will be able to attend work meetings for you. Sam Liang, who is the chief executive of Otter, said that these avatars will be able to act, talk and solve problems like the worker on which they are based. Mr Liang said he attends at least 10 meetings every day, so came up with a tech-driven solution for the problem.

"A prototype can be made working later this year," Mr Liang told Business Insider.

"AI models are generally trained using a set of data to get them to behave in human-like ways. AI avatars should be trained on the recorded meeting notes and voice data of the specific people they're trying to replicate, so that they can act and converse exactly like them. Once they have enough information, the avatars (in theory) will be able to speak in the cadence of individual workers, participate in conversations, and answer questions based on the worker's unique perspectives," he added.

In trials conducted by Mr Liang's company, the AI avatars were able to answer 90 per cent of the questions they faced during meeting. "When it got stuck on the remaining 10%, the questions were sent to the human worker with a note saying, 'Hey, I don't know how to answer this question - can you help me?'" he added.

Mr Liang said these AI avatars will save employees' time and boost their productivity. By sending these bots to meetings on customer support, sales and team status updates, employees can utilise the extra hours in their day to focus on more creative tasks and, in turn, make companies more money.

The toughest part is to add emotional intelligence to an AI persona so that it can participate in a meeting in productive ways - raise its voice when needed, and remain calm when required.

This is yet another stride in the field of AI, which is fast becoming an integral part of the global landscape, transforming how businesses operate.

But there are some people and organisations that are warning against the rapid proliferation of AI.

The Future of Life Institute, a non-profit aimed at reducing catastrophic risks from advanced artificial intelligence, made headlines in March 2023 when it released an open letter calling for a six-month pause on the training of AI systems more powerful than OpenAI's GPT-4. It warned that AI labs have been "locked in an out-of-control race" to develop "powerful digital minds that no one - not even their creators - can understand, predict, or reliably control.

It also said that developing ever-more powerful AI will also risk eliminating jobs to a point where it may be impossible for humans to simply learn new skills and enter other industries.

Another emerging threat that politicians and tech leaders must guard against is the possibility of AI becoming so powerful that it becomes a threat to humanity.

See original here:

AI Avatars Will Soon Attend Your Work Meetings, Claims Tech CEO - NDTV

Tags:

AI In Focus Ahead Of Nvidia’s Earnings, Assessing AIO’s Outlook (NYSE:AIO) – Seeking Alpha

Vertigo3d

AI has been all the rage so far this year. Shares of NVIDIA (NVDA) have been on fire, up more than 40% in 2024 and +230% YoY, while the latest speculative stock of the day is Super Micro Computer (SMCI). Investors will get new information this week when the worlds third most valuable publicly traded company reports results on Thursday. How NVDA trades post-earnings will play a key role in how the AI theme unfolds as we head into the tail end of Q1.

I reiterate my buy rating on Virtus Artificial Intelligence & Technology Opportunities Fund (NYSE:AIO). This closed-end fund (CEF) features solid diversification while still giving investors AI exposure. What's more, the technical picture remains attractive.

Goldman Sachs

According to the issuer, AIO seeks to generate a stable income stream and growth of capital by focusing on one of the most significant long-term secular growth opportunities in markets today. A multi-asset approach based on fundamental research is employed, dynamically allocating to attractive segments of a companys debt and equity in order to offer an attractive risk/reward profile. The fund normally invests at least 80% of its net assets (plus any borrowings for investment purposes) in a combination of securities issued by AI firms and in other companies that stand to benefit from AI and other technology opportunities.

AIO is still a small ETF despite increased volume and share-price appreciation in the last several months. Total assets under management sum to just $723 million as of February 16, 2024, while its dividend yield is high at 9.4% on a trailing 12-month basis. Being a closed-end fund, the expense ratio is high due to the cost of borrowing the latest figure is 1.41%.

Share-price momentum has been healthy recently, but its not a super highflyer compared to other, more concentrated, AI funds. Liquidity can be an issue at times considering the low average daily volume of just 137,000 shares, so using limit orders during the trading day is prudent in my view.

Digging into the portfolio, AIO plots on the upper-right portion of the style box, given a high allocation to the large-cap growth niche of the stock market (when analyzing the equity portion of AIO). What is attractive is that the CEFs price-to-earnings ratio is under 23x. Compare that to the Information Technology sectors forward operating P/E of 28x.

Morningstar

With a decent valuation for its high earnings growth, the sector breakout is concentrated. Tech is 44% of the CEF while Health Care, a top-performing area of the S&P 500 so far in 2024, is an overweight at 22%. There is no Utilities or Consumer Staples exposure, two of the more defensive sectors.

Thus, I would consider AIO a risk-on fund. The story does not end there, however. Forty-nine percent of the CEF is invested in common stocks, but 32% is in Convertible Securities with 16% in High Yield Bonds, according to the issuer. That mix helps create the high yield.

NVDA is the largest single-stock position at 3.3%, and the top 10 equities represent just 22.5% of the portfolio. Thus, concentration is not all that high, which I like from a risk point of view.

Seeking Alpha

Seasonally, AIOs track record only goes back to October 2019. Still, we uncover a key risk when assessing historical performance patterns. February and March have often been tough months for AIO, producing negative returns more than half the time. Shares have tended to rally from April through August, though.

StockCharts.com

With a reasonable valuation and diversification across sectors and asset classes, AIOs chart continues to look strong. Notice in the graph below that shares recently rallied to levels not seen since May 2022. AIO notched a bullish double-bottom low at the $15 mark on a successful retest of the October 2022 low just a few months ago. A tremendous year-end rally to almost $20 has recently been consolidated, but AIO remains above key support at the $19.10 mark. Technicians call this a throwback - a retreat to a point of polarity.

Also, take a look at the RSI momentum indicator at the top of the chart as price notched new highs, so too did momentum. That is a positive confirmation of the broader AIO rally. Whats more, we can take the previous $5 range and project a price target for the CEF. Based on the $15 to $20 range from mid-2022 through late last year, an upside measured move objective of $25 is now in play. Finally, with an air pocket of light volume by price up to $25, the fund could rise without much bearish overhead supply to halt the rally.

Overall, $19 is key support, while the upside target is $25.

StockCharts.com

I reiterate my buy rating on AIO. The fundamental valuation appears attractive ahead of NVIDIAs earnings report later this week. The technicals, meanwhile, appear sound.

View post:

AI In Focus Ahead Of Nvidia's Earnings, Assessing AIO's Outlook (NYSE:AIO) - Seeking Alpha

Tags:

Scoop: N.Y. governor wants to criminalize deceptive AI – Axios

Scoop: N.Y. governor wants to criminalize deceptive AI  Axios

Read this article:

Scoop: N.Y. governor wants to criminalize deceptive AI - Axios

Tags:

What Are AI Text Generators? 8 Best Tools To Improve Writing – Forbes

What Are AI Text Generators? 8 Best Tools To Improve Writing  Forbes

Link:

What Are AI Text Generators? 8 Best Tools To Improve Writing - Forbes

Tags:

Staying ahead of threat actors in the age of AI – Microsoft

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors, including prompt-injections, attempted misuse of large language models (LLM), and fraud. Our analysis of the current use of LLM technology by threat actors revealed behaviors consistent with attackers using AI as another productivity tool on the offensive landscape. You can read OpenAIs blog on the research here. Microsoft and OpenAI have not yet observed particularly novel or unique AI-enabled attack or abuse techniques resulting from threat actors usage of AI. However, Microsoft and our partners continue to study this landscape closely.

The objective of Microsofts partnership with OpenAI, including the release of this research, is to ensure the safe and responsible use of AI technologies like ChatGPT, upholding the highest standards of ethical application to protect the community from potential misuse. As part of this commitment, we have taken measures to disrupt assets and accounts associated with threat actors, improve the protection of OpenAI LLM technology and users from attack or abuse, and shape the guardrails and safety mechanisms around our models. In addition, we are also deeply committed to using generative AI to disrupt threat actors and leverage the power of new tools, including Microsoft Copilot for Security, to elevate defenders everywhere.

The progress of technology creates a demand for strong cybersecurity and safety measures. For example, the White Houses Executive Order on AI requires rigorous safety testing and government supervision for AI systems that have major impacts on national and economic security or public health and safety. Our actions enhancing the safeguards of our AI models and partnering with our ecosystem on the safe creation, implementation, and use of these models align with the Executive Orders request for comprehensive AI safety and security standards.

In line with Microsofts leadership across AI and cybersecurity, today we are announcing principles shaping Microsofts policy and actions mitigating the risks associated with the use of our AI tools and APIs by nation-state advanced persistent threats (APTs), advanced persistent manipulators (APMs), and cybercriminal syndicates we track.

These principles include:

Microsoft remains committed to responsible AI innovation, prioritizing the safety and integrity of our technologies with respect for human rights and ethical standards. These principles announced today build on Microsofts Responsible AI practices, our voluntary commitments to advance responsible AI innovation and the Azure OpenAI Code of Conduct. We are following these principles as part of our broader commitments to strengthening international law and norms and to advance the goals of the Bletchley Declaration endorsed by 29 countries.

Because Microsoft and OpenAIs partnership extends to security, the companies can take action when known and emerging threat actors surface. Microsoft Threat Intelligence tracks more than 300 unique threat actors, including 160 nation-state actors, 50 ransomware groups, and many others. These adversaries employ various digital identities and attack infrastructures. Microsofts experts and automated systems continually analyze and correlate these attributes, uncovering attackers efforts to evade detection or expand their capabilities by leveraging new technologies. Consistent with preventing threat actors actions across our technologies and working closely with partners, Microsoft continues to study threat actors use of AI and LLMs, partner with OpenAI to monitor attack activity, and apply what we learn to continually improve defenses. This blog provides an overview of observed activities collected from known threat actor infrastructure as identified by Microsoft Threat Intelligence, then shared with OpenAI to identify potential malicious use or abuse of their platform and protect our mutual customers from future threats or harm.

Recognizing the rapid growth of AI and emergent use of LLMs in cyber operations, we continue to work with MITRE to integrate these LLM-themed tactics, techniques, and procedures (TTPs) into the MITRE ATT&CK framework or MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) knowledgebase. This strategic expansion reflects a commitment to not only track and neutralize threats, but also to pioneer the development of countermeasures in the evolving landscape of AI-powered cyber operations. A full list of the LLM-themed TTPs, which include those we identified during our investigations, is summarized in the appendix.

The threat ecosystem over the last several years has revealed a consistent theme of threat actors following trends in technology in parallel with their defender counterparts. Threat actors, like defenders, are looking at AI, including LLMs, to enhance their productivity and take advantage of accessible platforms that could advance their objectives and attack techniques. Cybercrime groups, nation-state threat actors, and other adversaries are exploring and testing different AI technologies as they emerge, in an attempt to understand potential value to their operations and the security controls they may need to circumvent. On the defender side, hardening these same security controls from attacks and implementing equally sophisticated monitoring that anticipates and blocks malicious activity is vital.

While different threat actors motives and complexity vary, they have common tasks to perform in the course of targeting and attacks. These include reconnaissance, such as learning about potential victims industries, locations, and relationships; help with coding, including improving things like software scripts and malware development; and assistance with learning and using native languages. Language support is a natural feature of LLMs and is attractive for threat actors with continuous focus on social engineering and other techniques relying on false, deceptive communications tailored to their targets jobs, professional networks, and other relationships.

Importantly, our research with OpenAI has not identified significant attacks employing the LLMs we monitor closely. At the same time, we feel this is important research to publish to expose early-stage, incremental moves that we observe well-known threat actors attempting, and share information on how we are blocking and countering them with the defender community.

While attackers will remain interested in AI and probe technologies current capabilities and security controls, its important to keep these risks in context. As always, hygiene practices such as multifactor authentication (MFA) and Zero Trust defenses are essential because attackers may use AI-based tools to improve their existing cyberattacks that rely on social engineering and finding unsecured devices and accounts.

The threat actors profiled below are a sample of observed activity we believe best represents the TTPs the industry will need to better track using MITRE ATT&CK framework or MITRE ATLAS knowledgebase updates.

Forest Blizzard (STRONTIUM) is a Russian military intelligence actor linked to GRU Unit 26165, who has targeted victims of both tactical and strategic interest to the Russian government. Their activities span across a variety of sectors including defense, transportation/logistics, government, energy, non-governmental organizations (NGO), and information technology. Forest Blizzard has been extremely active in targeting organizations in and related to Russias war in Ukraine throughout the duration of the conflict, and Microsoft assesses that Forest Blizzard operations play a significant supporting role to Russias foreign policy and military objectives both in Ukraine and in the broader international community. Forest Blizzard overlaps with the threat actor tracked by other researchers as APT28 and Fancy Bear.

Forest Blizzards use of LLMs has involved research into various satellite and radar technologies that may pertain to conventional military operations in Ukraine, as well as generic research aimed at supporting their cyber operations. Based on these observations, we map and classify these TTPs using the following descriptions:

Similar to Salmon Typhoons LLM interactions, Microsoft observed engagement from Forest Blizzard that were representative of an adversary exploring the use cases of a new technology. As with other adversaries, all accounts and assets associated with Forest Blizzard have been disabled.

Emerald Sleet (THALLIUM) is a North Korean threat actor that has remained highly active throughout 2023. Their recent operations relied on spear-phishing emails to compromise and gather intelligence from prominent individuals with expertise on North Korea. Microsoft observed Emerald Sleet impersonating reputable academic institutions and NGOs to lure victims into replying with expert insights and commentary about foreign policies related to North Korea. Emerald Sleet overlaps with threat actors tracked by other researchers as Kimsuky and Velvet Chollima.

Emerald Sleets use of LLMs has been in support of this activity and involved research into think tanks and experts on North Korea, as well as the generation of content likely to be used in spear-phishing campaigns. Emerald Sleet also interacted with LLMs to understand publicly known vulnerabilities, to troubleshoot technical issues, and for assistance with using various web technologies. Based on these observations, we map and classify these TTPs using the following descriptions:

All accounts and assets associated with Emerald Sleet have been disabled.

Crimson Sandstorm (CURIUM) is an Iranian threat actor assessed to be connected to the Islamic Revolutionary Guard Corps (IRGC). Active since at least 2017, Crimson Sandstorm has targeted multiple sectors, including defense, maritime shipping, transportation, healthcare, and technology. These operations have frequently relied on watering hole attacks and social engineering to deliver custom .NET malware. Prior research also identified custom Crimson Sandstorm malware using email-based command-and-control (C2) channels. Crimson Sandstorm overlaps with the threat actor tracked by other researchers as Tortoiseshell, Imperial Kitten, and Yellow Liderc.

The use of LLMs by Crimson Sandstorm has reflected the broader behaviors that the security community has observed from this threat actor. Interactions have involved requests for support around social engineering, assistance in troubleshooting errors, .NET development, and ways in which an attacker might evade detection when on a compromised machine. Based on these observations, we map and classify these TTPs using the following descriptions:

All accounts and assets associated with Crimson Sandstorm have been disabled.

Charcoal Typhoon (CHROMIUM) is a Chinese state-affiliated threat actor with a broad operational scope. They are known for targeting sectors that include government, higher education, communications infrastructure, oil & gas, and information technology. Their activities have predominantly focused on entities within Taiwan, Thailand, Mongolia, Malaysia, France, and Nepal, with observed interests extending to institutions and individuals globally who oppose Chinas policies. Charcoal Typhoon overlaps with the threat actor tracked by other researchers as Aquatic Panda, ControlX, RedHotel, and BRONZE UNIVERSITY.

In recent operations, Charcoal Typhoon has been observed interacting with LLMs in ways that suggest a limited exploration of how LLMs can augment their technical operations. This has consisted of using LLMs to support tooling development, scripting, understanding various commodity cybersecurity tools, and for generating content that could be used to social engineer targets. Based on these observations, we map and classify these TTPs using the following descriptions:

All associated accounts and assets of Charcoal Typhoon have been disabled, reaffirming our commitment to safeguarding against the misuse of AI technologies.

Salmon Typhoon (SODIUM) is a sophisticated Chinese state-affiliated threat actor with a history of targeting US defense contractors, government agencies, and entities within the cryptographic technology sector. This threat actor has demonstrated its capabilities through the deployment of malware, such as Win32/Wkysol, to maintain remote access to compromised systems. With over a decade of operations marked by intermittent periods of dormancy and resurgence, Salmon Typhoon has recently shown renewed activity. Salmon Typhoon overlaps with the threat actor tracked by other researchers as APT4 and Maverick Panda.

Notably, Salmon Typhoons interactions with LLMs throughout 2023 appear exploratory and suggest that this threat actor is evaluating the effectiveness of LLMs in sourcing information on potentially sensitive topics, high profile individuals, regional geopolitics, US influence, and internal affairs. This tentative engagement with LLMs could reflect both a broadening of their intelligence-gathering toolkit and an experimental phase in assessing the capabilities of emerging technologies.

Based on these observations, we map and classify these TTPs using the following descriptions:

Salmon Typhoons engagement with LLMs aligns with patterns observed by Microsoft, reflecting traditional behaviors in a new technological arena. In response, all accounts and assets associated with Salmon Typhoon have been disabled.

In closing, AI technologies will continue to evolve and be studied by various threat actors. Microsoft will continue to track threat actors and malicious activity misusing LLMs, and work with OpenAI and other partners to share intelligence, improve protections for customers and aid the broader security community.

Using insights from our analysis above, as well as other potential misuse of AI, were sharing the below list of LLM-themed TTPs that we map and classify to the MITRE ATT&CK framework or MITRE ATLAS knowledgebase to equip the community with a common taxonomy to collectively track malicious use of LLMs and create countermeasures against:

See the original post:

Staying ahead of threat actors in the age of AI - Microsoft

Tags: