Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Apple opens PCC source code to researchers to detect cloud AI security bugs
Global Security

Apple opens PCC source code to researchers to detect cloud AI security bugs

AdminBy AdminOctober 25, 2024No Comments3 Mins Read
Cloud AI Security
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 25, 2024Ravi LakshmananCloud Security / Artificial Intelligence

Security of cloud artificial intelligence

Apple has made its Private Cloud Compute (PCC) Virtual Research Environment (VRE) publicly available, allowing the research community to test and validate the privacy and security guarantees of its offering.

PCC which Apple promulgated earlier this June was marketed as “the most advanced security architecture ever deployed for large-scale cloud computing.” With the new technology, the idea is to offload Apple Intelligence’s complex computing queries to the cloud in a way that doesn’t sacrifice user privacy.

an apple said it invites “all security and privacy researchers—or those with an interest and technical curiosity—to learn more about PCC and conduct their own independent verification of our claims.”

To further encourage research, the iPhone maker said it is expanding the Apple Security Bounty program to include PCC, offering cash payouts ranging from $50,000 to $1,000,000 for security flaws discovered in it.

Cyber ​​security

This includes flaws that could allow malicious code to execute on the server, and exploits capable of extracting sensitive user data or information about user requests.

VRE aims to offer a set of tools to help researchers conduct PCC analysis from the Mac. It comes with a Secure Enclave Processor (SEP) virtual processor and uses macOS’ built-in support for paravirtualized graphics to render.

Apple also said it was creating source code related to some PCC components available via GitHub to facilitate deeper analysis. This includes CloudAtestation, Thimble, splunkloggingd, and srd_tools.

“We developed Private Cloud Compute as part of Apple Intelligence to take an extraordinary step forward in privacy in artificial intelligence,” the Cupertino-based company said. “This includes providing auditable transparency, a unique feature that sets it apart from other server-side AI approaches.”

The development comes as broader research into generative artificial intelligence (AI) continues to uncover new ways to hack large language models (LLMs) and produce unexpected results.

Security of cloud artificial intelligence

Earlier this week, Palo Alto Networks detailed a technique called Deceptive admiration this involves mixing malicious and benign queries together to force AI chatbots to bypass their fences by taking advantage of their limited “attention span”.

The attack requires at least two interactions and works by first asking the chatbot to logically connect several events – including a limited topic (such as how to make a bomb) – and then asking it to elaborate on the details of each event.

The researchers also demonstrated the so-called ConfusedPilot attack, which targets Retrieval-Augmented Generation (ANUCHA), are based on artificial intelligence systems such as Microsoft 365 Copilot, poisoning the data environment with a seemingly innocuous document containing specially crafted strings.

“This attack allows AI responses to be manipulated simply by adding malicious content to any documents that the AI ​​system can reference, potentially leading to widespread disinformation and disruption of organizational decision-making processes,” Symmetry Systems. said.

Cyber ​​security

Separately, it was discovered that it is possible to spoof a machine learning model computeracial graph to install “codeless, secret” backdoors in pre-trained models such as ResNet, YOLO and Phi-3, a method codenamed ShadowLogic.

“Backdoors created using this technique will persist through fine-tuning, meaning that the underlying patterns can be intercepted to cause an attacker-defined behavior in any downstream application upon receiving trigger input, making this attack technique a strong supply chain risk Artificial Intelligence”, Hidden Layer Researchers Eoin Wickens, Casimir Schultz and Tom Bonner said.

“Unlike standard software backdoors that rely on the execution of malicious code, these backdoors are built into the very fabric of the model, making them more difficult to detect and remediate.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.