GPT-4 exploits vulnerabilities faster and cheaper than humans
Research by security experts at the University of Illinois Urbana-Champaign (UIUC) shows that OpenAI's GPT-4 model can exploit vulnerabilities faster and cheaper than humans, causing concern if exploited.
GPT-4 can operate independently or in combination to exploit network security vulnerabilities. The team of experts revealed that the GPT-4 model can even learn how to attack on its own to become more effective over time.
In the test, after being provided with a statement describing CVE - a public database of common security vulnerabilities, GPT-4 could successfully exploit 87% of vulnerabilities.
The researchers also conducted experiments with other large language models (LLMs) including OpenAI's GPT-3.5, Mistral AI's OpenHermes-2.5-Mistral-7B, and Meta's Llama-2 Chat 70B. However, all of them cannot be exploited successfully even once.
In addition, the cost of cyberattack using GPT-4 is 2.8 times cheaper than hiring a cybersecurity expert at about 50 USD per hour.
According to experts, GPT-4 can currently only attack known vulnerabilities. This means that 'there is no key to the security apocalypse yet'. However, the fact that GPT-4 understands the vulnerability in theory and is capable of taking steps to exploit it automatically, also like learning new attacks if they fail, researchers say is a particular concern.
The group predicts that the process of cyberattacks will become easier when the GPT-5 model is released, so the security community "needs to think seriously to prevent AI from becoming hackers".
OpenAI has not yet commented on the above announcement. However, according to Tom's Hardware, the company contacted the research team and asked not to publish the commands used in the test. They received consent.
You should read it
- Origin and customary meaning to celebrate the Tet holiday
- 3 tips for effective use of Google revealed by Google employees
- How to check the air pollution level on the phone
- eMachines D720 - laptop with netbook price
- Six tips for adding wireless devices to your work environment
- Find IP address of sender accounts via Gmail, Yahoo, Hotmail, AOL, Outlook Express
- Request to revoke VNG's Zalo.vn and Zalo.me domain names because social networking activities are not allowed
- How to Fix Microsoft Store Downloading Problems
May be interested
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloudan extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
- Are humans or machines better at detecting deepfakes?humans' ability to identify fake content is critical to neutralizing misinformation, but as ai technology improves, who can we trust to detect deepfakes: humans or machines?
- What is DNS Amplification Attack?dns amplification is a distributed denial of service (ddos) attack in which an attacker exploits vulnerabilities in dns (domain name system) servers to turn small initial queries into much larger payloads. used to 'take down' the victim's server.
- HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocolhp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
- New worm variant exploits Oracle errorsthe malicious code has the ability to exploit security vulnerabilities and cause serious damage to previously distributed oracle database software that has been widely modified and redistributed on the internet, ringing a scene ring. new newspaper about one
- At the end of the year, massively bought a laptopstudents are sitting in the school yard, hugging laptops, using wireless internet has become familiar at vietnamese universities. the popularity of laptops is not only due to the well-off life but laptops are getting cheaper and faster.
- Botnet Echobot spreads across a wide range, specifically targeting Oracle and VMware applicationsa relatively new botnet named echobot has contributed to 26 dangerous exploits, while using exploits as a tool to spread quickly.
- Humans transmit more viruses to animals than they transmit to humansa recent study shows that the spread of viruses is not only from animals to humans, humans also spread many diseases to animals.
- OpenAI launches cheaper and smarter mini GPT-4oopenai recently launched gpt-4o mini, a cheaper and lighter version of its latest major language model to expand the use of chatbots.
- Ultrathin laptops are cheaper than $ 200 ultrabookamd is making chipsets for thin notebooks at a cheaper cost than intel's ultrabook to $ 200 (~ 4.2 million).