logo
SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

Forbes29-04-2025
Cyber security, information privacy and data protection concept on server room background.
Software Bills of Materials (SBOMs) are crucial cybersecurity tools because they assist companies in locating, evaluating, and reducing software risks. They allow software updates and vulnerabilities to be tracked over the course of a product's lifecycle.
Modern software is created using code fragments and methods from various sources, including open source and commercial solutions. The software components and dependencies of an application are detailed in a tool known as a Software Bill of Materials (SBOM) (NTIA, 2021). An SBOM is essential for managing and understanding the complexities of contemporary software supply chains and can be compared to an ingredient list on a food product label. A software package and its contents are uniquely identified by an SBOM, which is formal, machine-readable metadata that may also contain information on the software package's contents, such as copyrights and license information.
The increasing complexity of modern software and its vulnerability to programming errors and hacks give rise to serious security dangers and compatibility issues. Additionally, cyberthreats are continually finding ways of evolving, becoming more complicated, and multiplying due to the use of artificial intelligence and the quick acceleration of development velocity. It becomes more difficult to identify and address security vulnerabilities when we are looking not only at our codebase but also at the 70–80% open-source software that we depend on, as well as third-party software components from other vendors. However, a few tools can assist in handling the data protection work.
Recent high-profile events highlight the need for SBOMs in cybersecurity. A programming flaw in the CrowdStrike software, for instance, affected more than 8.5 million Windows computers globally, resulting in billions of dollars' worth of losses. The well-known Linux data compression program XZ Utils was found to contain a backdoor as part of a sophisticated state actor attack around the beginning of 2024. 93% of cloud settings were vulnerable to the zero-day Log4Shell vulnerability in 2021. In the SUNBURST assault, which FireEye discovered in December 2020, harmful code was embedded into SolarWinds' Orion software.
According to Allan Friedman, CISA Senior Advisor and Strategist. 'A thriving ecosystem for SBOM tools and solutions will be key to shaping a more transparent software-driven world.' He notes that 'Vulnerabilities in software are a key risk in cybersecurity, with known exploits being a primary path for bad actors to inflict a range of harms. By leveraging SBOMs as key elements of software security, we can mitigate the risk to the software supply chain and respond to new risks faster, and more efficiently.
The government-wide push to integrate cybersecurity into products supplied to the government and transfer responsibility for cybersecurity from agencies to vendors and integrators is reflected in this emphasis on SBOMs.
By February 2025, almost all new software that the Army purchases or develops will need to have an SBOM. In order to obtain assurances regarding supply-chain security, the Army opted for an SBOM approach rather than self-attestations. This is because SBOMs offer essential information regarding the risks that systems may pose to a network and can assist in organizing an organization to minimize those risks as much as possible.
3D illustration of the text zero trust over black background with padlock shapes in relief. Concept ... More of network security.
SBOMs play a significant role in cybersecurity and align with 'Zero-Trust' policies in both the private and public sectors. Dmitry Raidman. Chief Technology Officer and Co-founder of Cybeats, states, 'One significant advantage of a verified SBOM is its application in cybersecurity and risk mitigation for the downstream customers, for example, a power distribution plant, hospital, or water treatment facility. Industry studies indicate that the average codebase contains 70-80%, and in some cases over 90% open-source software components, many of which have at least one vulnerability, and some of them are highly exploitable, like Log4j. Therefore, understanding and continuously monitoring code components and their vulnerabilities is essential.' He points out that companies that collect from vendors SBOMs and invest in solutions to process and monitor the vulnerability lifecycle management of their assets will be better prepared to deal with cybersecurity challenges in the future and ensure the safety, security, and resilience of their critical systems and infrastructure.
SBOMs can help businesses track vulnerabilities in real time and maintain an accurate software inventory. Continuous security requires ongoing Vulnerability Lifecycle Monitoring. In order to detect and address known vulnerabilities and not just rely on security advisories published by vendors, where it is to the vendor's discretion what vulnerability to disclose, an SBOM can offer transparency into the precise software versions being used and allow complete understanding of the threat landscape. Additionally, it facilitates the management and quantification of commercial software licenses. Organizations can compare SBOM data with databases like NIST NVD and CISA KEV to find and prioritize affected systems when new CVEs are found and also record their findings if the vulnerability doesn't pose a risk in their operations and environment.
To help evaluate SBOM component information against different threat signatures and patterns, the National Security Agency (NSA) supports the use of AI/ML engines and related "data lakes." A crucial component of efficient SBOM management is vulnerability tracking and analysis, which entails delivering daily updates from the National Vulnerability Database (NVD) and additional vulnerability data sources.
SBOMs are crucial for Incident Response and Threat Intelligence. They help security teams quickly identify compromised components in apps and determine available mitigation options and vendor updates during a cyber incident.
A major cause of breaches is vulnerabilities based on the Verizon 2025 DBIR Report. There is a 34% increase in attackers exploiting vulnerabilities to gain initial access and cause security breaches, compared to 2024. The bling spot of awareness and a patching strategy is a significant factor affecting these numbers. Risk-Based Patch Management suggests that not every vulnerability needs immediate fixing. Teams can prioritize threats by combining SBOMs with Vulnerability Threat Intelligence (VTI), particularly if there's a known exploit for mitigating vulnerability.
Compliance and regulation concept. Enforcement of laws, regulations, and standards, requirements, ... More internal policies and procedures. Minimize legal and financial risks, protect corporate reputation.
GRC, SBOMs assist in ensuring compliance and regulatory readiness throughout the procurement lifecycle and can help to avoid buying non maintained and non-secure product. Organizations are required to demonstrate that they monitor and manage risk throughout their software supply chain lifecycle in accordance with new government regulations regarding safe software development. SBOMs provide documentation for compliance with FDA, NIST, PCI DSS, PCI SSF, EU CRA, RED, ETSI EN 303 645, BSI TR-03183, EO 14028, as well as the upcoming US DoD procurement requirements.
A "software bill of materials" (SBOM) has become a crucial component of software security and software supply chain risk management, according to CISA. As businesses rely more on third-party components and complex systems, software supply chain security has become a top responsibility. Vulnerability management must be implemented throughout the software lifecycle, from design to deployment and operations, to handle the entire range of security threats. This all-encompassing strategy, sometimes referred to as "shifting left and even more important shifting right, guarantees that vulnerabilities are consistently recognized, evaluated, and reduced.
In 2019, the medical technology sector launched a proof of concept to assess SBOMs' ability to manage operational and cyber risks in medical devices. Device makers (MDM) and healthcare (HDO) providers demonstrated the feasibility of SBOMs by producing, exchanging, and applying data to improve security procedures. In 2025, with a growing digital risk landscape, all industries must utilize SBOMs to help enable better cybersecurity and transparency into software based products they build and the ones they consume.
It does not end with software. As teams embed AI models and language pipelines across their products, an Artificial Intelligence Software Bill of Materials (AI SBOM) becomes essential. An AI SBOM lists every model file, training dataset, agent, and external inference service, giving product security teams the same clear inventory they expect from a traditional SBOM, down to the last line of code. Dmitry Raidman explains that an AI SBOM provides 'an X ray view of the intelligent functionality,' allowing teams to know exactly what is running in production, how it was trained, and what they are receiving from vendors or delivering to customers.
A Hardware Bill of Materials (HBOM) performs the same role for physical components. It maps every chip, board, sensor, and firmware version so security and procurement teams can detect counterfeit parts and unvetted substitutions before they reach production. A long-planned pager hardware supply chain attack reported in Lebanon underscored why HBOM transparency and validation matter; altered pagers were covertly introduced and later exploited, showing how a single tampered device can become a beachhead for wider compromise when hardware provenance is unclear.
A Cryptography Bill of Materials, CBOM, catalogs every algorithm, protocol, library, and certificate in your products, giving security teams a clear map of where cryptography lives. With quantum safe standards such as CRYSTALS Dilithium on the horizon, you must know exactly where RSA 2048-bit or ECC P-256 still protect data so you can schedule timely upgrades to post quantum cryptography. Dmitry Raidman sums it up: 'A CBOM is your migration roadmap. When quantum capable attackers will be on the horizon you cannot replace vulnerable ciphers, you do not even know you have.'
SBOMs, HBOMs, and CBOMs will be crucial for risk management in our digital environment in the future. Even though the 'BOM' adoption cycle is still in its early phases, more transparency and accountability about hardware security, software security, and optimization will benefit both the public and private sectors.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

5 apps I use to turn my iPad into the ultimate workstation
5 apps I use to turn my iPad into the ultimate workstation

Tom's Guide

time4 hours ago

  • Tom's Guide

5 apps I use to turn my iPad into the ultimate workstation

I've been a journalist for 15 years or so, and ever since Apple launched the iPad I've been aching to ditch my laptop and travel with just a tablet. To be honest, ideally I could just do all my work from the smartphone I carry in my pocket all day. And you basically can, if (like me) you work with text for a living and you're willing to splurge on a pair of fancy AR glasses and a nice Bluetooth keyboard. But as a journalist I don't have the scratch for that kind of luxury. Luckily, I can afford to outfit my iPad with a few apps that make it basically just as useful as my laptop without spending an arm and a leg. If you, like me, dream of ditching your bulky work laptop and working from just an iPad, have a look at this list of the top 5 iPad apps I use to get work done on the go. Okay, maybe this is kind of cheating, but I like to keep a good app on my iPad that I can use to remotely connect to my PC at home whenever I need to pull something from it or use it for something. There are a few options on the Apple App Store, but I went with Jump Desktop ($14.99) because it works with both Windows and Mac PCs (and I regularly review both) and supports both RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) protocols for connecting to your PC. Heck, if you really want to feel alive you can connect to both a Windows and Mac PC at the same time and use them both in split-screen mode on your iPad Pro. I also like that Jump Connect seems to support all the features of my iPad's Magic Keyboard without any issues, and it offers virtual mouse support (as well as real mouse support, if you connect one) via gestures on the iPad. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. While it doesn't work well for, say, streaming a PC game to your iPad, I have tried moving files around and streaming movies and music through Jump Connect and it's pretty good if your home and mobile connections are strong. I also appreciate that setting up the client on your PC is easy, and you don't have to deal with router settings if you don't want to. Download Jump Desktop ($14.99) You may have seen Things crop up in the iPad App Store now and again since it's won two Apple Design Awards, but since it costs $20 to use you may not have taken the plunge. I didn't either for a long time, but when I finally did I was hooked. At its core, Things is basically just a fancy to-do list app, but it works in all the exact ways I want it to without bothering me with extraneous clutter. You start by building to-do lists in various areas of your life you denote (work, family, friends etc), and you complete to-dos while working towards major projects. What really charms me about Things is how easy it is to quickly get to grips with these layers and start working it into your daily life. I love that I can just forward an email to my Things address to automatically add it as a to-do, for example, and you can use your iPad's Share function to create to-dos from within other apps. Plus, Things comes with Widgets you can drop on your iPad home screen to keep track of key projects and tasks. While I wish it was a little cheaper, I figure it pays for itself after a year of keeping me on track. Download Things 3 ($19.99) Your mileage may vary here, but I prefer to keep Microsoft Word on my iPad and rely on it for all my writing and editing needs. Since that's my job and my colleagues and freelancers regularly send Word files to me for review, having a version of the app on my iPad frees me up to work from anywhere. And while I sometimes wish I had a full laptop keyboard to type on instead of my little Magic Keyboard, the silver lining is that when I'm editing in Word I can hold the tablet in a comfortable position instead of craning my neck down at a laptop screen. Plus, I love that I can use the Apple Pencil to scribble on documents and mark them up like I was editing a school paper. And while I don't use templates, Word does have a ton of them you can use to quickly generate documents like invoices, resumes and more. Regrettably, you do need to pay Microsoft a tithe (in the form of an annual Microsoft 365 subscription) to enjoy the full features of Word on iPad. I happen to have one through work, but if I didn't I'm not sure I would be willing to pay. Of course, you could swap out Word for Apple's free Pages app and probably be just as happy. You could also use the online Microsoft 365 version of Word on your iPad by accessing it in a web browser, but the online version of Word offers fewer features and is generally a pain to use (in my experience). Download Microsoft Word (Free) We're a Slack shop around these parts so I always make sure to have the app installed on my iPad, but you can swap Slack out for whatever remote communication tool you use most in your work. Whether it's Discord, Slack, Teams or simply Google Chat, staying in touch with your team (and your boss) is a must when working from your iPad. I know because I regularly use my iPad to keep in contact with my colleagues via Slack, posting stories and sharing tasks from wherever I am. I love that we get to use Slack because it integrates with a slew of other apps and services, and I can easily put the app on basically any device I own. This is one of the first apps I install on any new device, and I'd be unable to get much work done without it. Download Slack (Free) As a working journalist for nearly two decades I've traveled somewhere to conduct interviews more times than I can remember, and while I love asking interesting people questions I hate transcribing their responses by hand afterwards. That's why a few years ago I tried Whisper Notes - Speech to Text, a fairly inexpensive iPad app that uses the Whisper AI model to transcribe audio files without sending them out to a third-party service or server. I love that I can either record the audio directly on the iPad or import audio/video files for transcription in Whisper Notes. Of course, nowadays a modern iPad running iPadOS 26 can do a pretty decent job of transcribing audio in the Notes app, but that feature is still pretty new and a bit limited. So for the moment I still use Whisper Notes to transcribe my interviews, and I recommend it if you need a simple, reliable transcription tool. Note that I'm recommending Whisper Notes - Speech to Text and not one of the many similarly Whisper-powered audio apps on Apple's App Store, like Whisper Transcription, Whisper Transcribe - Dictation, or Whisper: Speech to Text. Those other options may work just fine, but many have subscriptions that I can't vouch for them and I don't recommend them. Download Whisper Notes - Speech to Text ($5) Now obviously these apps are chosen to let a writer and editor get work done from just an iPad. If you're a photographer, a coder, a designer or who knows what else, you may have different needs—a photo nerd might prefer to download Lightroom and a podcaster might need a great audio editor like Ferrite. You'll find both (and many more great iPad apps) in our guide to the best iPad apps. If you're looking for more tips on what apps to get, check out my colleague's rundown of the 11 best iPad apps to install first. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.

11 Home Security Setups I Recommend for Easy Vacation Safety
11 Home Security Setups I Recommend for Easy Vacation Safety

CNET

time6 hours ago

  • CNET

11 Home Security Setups I Recommend for Easy Vacation Safety

I know you already have a lot to plan when heading out on vacation, but I've found a few smart home steps can make a world of difference before you're gone. Smart home security isn't just about setting up alarms, though setting up alarms is an important security measure. Security devices can make it easier to manage your home while you're away and protect key weakpoints like your front porch, backyard and windows. Vacation security isn't just about stopping home thieves, either. The right settings and setups can help warn you about other problems or let you fix things you may have forgotten, even if you're hundreds of miles away on a beach. Here are my top steps for your home security before heading out on the road. Read more: My One Must-Do Smart Home Tip When I'm Going on Vacation -- That Everyone Forgets Set up Away or Vacation modes Many smart devices have vacation or away modes you can set up to simulate a lived-in house. CNET Today's smart home and home security settings don't just have Away modes, they also frequently have a Vacation mode. That's a routine you can set up to work while you're away for several days or more (if your home app doesn't have a vacation mode, you can tweak your Away or Eco mode, or set a whole new routine). Devices like Philips Hue lights and platforms like IFTTT make it easy to create full routines that cover multiple devices. CNET Vacation routines can switch smart lights on and off, indoors and out, to make it look like someone is still home. They can also operate other compatible devices, such as managing smart irrigation systems, arming smart cameras and more. Set a routine like this once, and you can use it over and over for trips. Check the motion detection settings for your video doorbell A key tool for keeping watch on your house: video doorbells. Ring/CNET Video doorbells excel at keeping an eye on the action, and their algorithms are getting consistently better at detecting humans and other objects. Companies like Eufy are even working on motion detection that can identify suspicious behavior like dodging main pathways and can look for poor security. However, the motion detection that works best in your daily life isn't always the kind of detection that works when you're on vacation. We suggest visiting the doorbell and home camera apps to look at your motion detection settings. Consider steps like: Turning up motion detection sensitivity Set object detection to only humans to cut down on alerts Set detection zones to close-up spots at your house and windows where people may try to get access Turn up beeps or light indicators that show a camera is on and watching Set notification to push to your phone screen instead of staying only within the app Look for web app options, like Nest's support for online viewing and controls, which is ideal for overseas vacations Additionally, if you pay for a subscription plan, check if it supports 24/7 emergency assistance contact so you can immediately call the police or fire department from an alert. It may be worth upgrading to that type of plan if you'll be gone for a month or two. Finally, Batten security expert Kirk MacDowell also mentioned checking that the lenses on all your home security cameras are clean. If it's been a long, dirty winter you should gently clean off video doorbells and cams so they have the clearest view when you're away. Keep your curtains open or automated To keep your home looking lived in, it's a good idea to have your curtains open during vacations (and it lets the sun in to keep things from getting musty). Or if you have smart curtains or smart shades -- which are also available as a retrofit for existing curtains -- you can program them. Create a schedule for them to open during the day and close at night for best effect. Smart blinds like these don't have to be expensive: Even Ikea has an affordable version. Manage remote entry with a smart lock Aqara's smart lock deadbolt replacement looks and feels great. CNET/Tyler Lacoma Smart locks don't just let you know if you forget to lock the door. They also autolock for you under certain conditions and support a variety of scheduling options. Most useful smart locks, like the Aqara U100 or the Schlage Smart Lever, allow you to create passes or temporary codes to give to visitors. That lets you arrange checkups for pet sitters, plant waterers, helpful neighbors and others you might want to let inside, but only at certain times. Smart locks combine especially well with video doorbells -- just make sure you're in an area with a reliable Wi-Fi connection to use them remotely. Adjust your heating and cooling Ecobee offers a dedicated vacation mode for its smart thermostat. Ecobee/CNET Smart thermostats from Nest, Ecobee and others also have Eco and Away modes you can use to set up separate vacation schedules. Ecobee also has a dedicated Vacation mode in its thermostat settings you can use just for this. The best temperature range varies by season but should be less than you schedule while you're home. For summer, that would mean setting the thermostat 5 to 10 degrees higher in the day, but with a hard cap around 80 to 85 degrees to protect indoor plants and so on. For winter, aim for the reverse with a hard cap around 50 degrees for the daytime. That temperature calculus changes if you have pets in a hot climate. You'll want to keep the home more comfortable by limiting the temperature ranges somewhere in the mid to upper 70s for cooling and around 60 for heating. Set up a "listening" service like Alexa Emergency Assist Alexa's emergency assistant is an affordable listening and contact service. Amazon Listening features use simple algorithms to identify "uh-oh" noises like breaking glass, smoke detector alarms and even dogs barking loudly. Home security systems like Abode or Ring offer listening options, but you don't always need a home security device to enable it. Amazon's Alexa smart speakers and smart displays, for example, have the Alexa Emergency Assist service, the successor to Alexa Guard. It costs around $6 monthly, and gives you access to sound detection as well as 24/7 emergency response services and emergency contacts for family. That's a nice deal to enable for a few months if you're going on plenty of vacations for a season, and the two-way audio on all Alexa speakers means you can talk through them live whenever you want. Keep watch with an armed security system If your home doesn't have a whole house security system that can monitor multiple access points like windows and doors, this is a fine time to consider one. Today's home security systems don't need professional installation, or even a monthly subscription, to guard your home -- and many work with third-party smart devices, too. Take a look at our guides on the best DIY home security systems, the best cheap security systems and the best systems overall for your home to learn a whole lot more about your choices. Add a leak detector to vulnerable home spots Kangaroo includes a climate sensor, aka leak detector, in its expanded eight-piece home monitoring kit. Kangaroo A leak detector is a clever little device with an open circuit lying against the floor. When water completes that circuit, it sets off all sorts of alarm bells and app notifications letting you know there's a leak present. That makes them valuable when you're away from home for extended periods of time. Stick them by the toilet, under the kitchen sink, next to the water heater or under pipes that may be in danger of freezing during a winter vacation. Leak detectors are available as an add-on for most home security systems, but you can also find standalone versions like Eufy's $35 model (requires a HomeBase) or the Alexa-compatible Kidde Leak Detector starting at $45. We suggest these models because they work with apps, which is important when you'll be away from home entirely. Tell your home monitoring center you'll be gone If you do splurge for professional home monitoring, look up their website and find a contact email or phone number to let them know that you'll be on vacation. Many home monitoring centers will adjust their official responses when they know that everyone is going to be away from home. Give your mail service a call (optional) Calling the post office used to be a go-to step when leaving for vacation. And if your vacay is going to be longer than a week or so, we still highly recommend messaging your local mail service and requesting to hold your mail. It's really easy to do and you can complete the steps online in a couple of minutes. However, we aren't getting as much mail these days as we once did, and it's harder than ever for strangers to notice when someone's mail is piling up. If you're only going to be gone for several business days or say, you can probably skip this step safely. Stay cautious about what you post online Vacations are awesome, but be wary about posting too much info on social media. mihailomilovanovic via Getty We know it's tempting to post about your vacation plans on social media, but this can also be an invitation for burglars or trespassers to make a visit. Unfortunately, it's difficult to know and trust everyone on your friends list, or friends of their friends who may see status updates as well. To stay safe, avoid posting info and pics about your trips until they are finished. Then you can cut loose and unleash all those perfect shots on Instagram, TikTok, or Facebook. Bonus tip: If you're renting, look at your lease Some leases require tenants to let landlords know if they'll be going on vacation for a certain amount of time, like longer than a week. Others don't mention it at all. Check your lease for details. Even if you don't have to alert anyone, you may find additional requests like shutting off water mains, setting the temperature to a certain level, arranging pet sitter access and so on. Finally, now is the perfect time to stop by our guide on how to deter burglars from every trying your house in the first place, information on if thieves are actually using Wi-Fi jammers on smart homes, and the all-around security cheat sheet for setting up different parts of home security. Don't miss any of CNET's unbiased tech content and lab-based reviews. Add us as a preferred Google source on Chrome.

Criminals, good guys and foreign spies: Hackers everywhere are using AI now
Criminals, good guys and foreign spies: Hackers everywhere are using AI now

NBC News

time7 hours ago

  • NBC News

Criminals, good guys and foreign spies: Hackers everywhere are using AI now

This summer, Russia's hackers put a new twist on the barrage of phishing emails sent to Ukrainians. The hackers included an attachment containing an artificial intelligence program. If installed, it would automatically search the victims' computers for sensitive files to send back to Moscow. That campaign, detailed in July in technical reports from the Ukrainian government and several cybersecurity companies, is the first known instance of Russian intelligence being caught building malicious code with large language models (LLMs), the type of AI chatbots that have become ubiquitous in corporate culture. Those Russian spies are not alone. In recent months, hackers of seemingly every stripe — cybercriminals, spies, researchers and corporate defenders alike — have started including AI tools into their work. LLMs, like ChatGPT, are still error-prone. But they have become remarkably adept at processing language instructions and at translating plain language into computer code, or identifying and summarizing documents. The technology has so far not revolutionized hacking by turning complete novices into experts, nor has it allowed would-be cyberterrorists to shut down the electric grid. But it's making skilled hackers better and faster. Cybersecurity firms and researchers are using AI now, too — feeding into an escalating cat-and-mouse game between offensive hackers who find and exploit software flaws and the defenders who try to fix them first. 'It's the beginning of the beginning. Maybe moving towards the middle of the beginning,' said Heather Adkins, Google's vice president of security engineering. In 2024, Adkins' team started on a project to use Google's LLM, Gemini, to hunt for important software vulnerabilities, or bugs, before criminal hackers could find them. Earlier this month, Adkins announced that her team had so far discovered at least 20 important overlooked bugs in commonly used software and alerted companies so they can fix them. That process is ongoing. None of the vulnerabilities have been shocking or something only a machine could have discovered, she said. But the process is simply faster with an AI. 'I haven't seen anybody find something novel,' she said. 'It's just kind of doing what we already know how to do. But that will advance.' Adam Meyers, a senior vice president at the cybersecurity company CrowdStrike, said that not only is his company using AI to help people who think they've been hacked, he sees increasing evidence of its use from the Chinese, Russian, Iranian and criminal hackers that his company tracks. 'The more advanced adversaries are using it to their advantage,' he said. 'We're seeing more and more of it every single day,' he told NBC News. The shift is only starting to catch up with hype that has permeated the cybersecurity and AI industries for years, especially since ChatGPT was introduced to the public in 2022. Those tools haven't always proved effective, and some cybersecurity researchers have complained about would-be hackers falling for fake vulnerability findings generated with AI. Scammers and social engineers — the people in hacking operations who pretend to be someone else, or who write convincing phishing emails — have been using LLMs to seem more convincing since at least 2024. But using AI to directly hack targets is only just starting to actually take off, said Will Pearce, the CEO of DreadNode, one of a handful of new security companies that specialize in hacking using LLMs. The reason, he said, is simple: The technology has finally started to catch up to expectations. 'The technology and the models are all really good at this point,' he said. Less than two years ago, automated AI hacking tools would need significant tinkering to do their job properly, but they are now far more adept, Pearce told NBC News. Another startup built to hack using AI, Xbow, made history in June by becoming the first AI to climb to the top of the HackerOne U.S. leaderboard, a live scoreboard of hackers around the world that since 2016 has kept tabs on the hackers identifying the most important vulnerabilities and giving them bragging rights. Last week, HackerOne added a new category for groups automating AI hacking tools to distinguish them from individual human researchers. Xbow still leads that. Hackers and cybersecurity professionals have not settled whether AI will ultimately help attackers or defenders more. But at the moment, defense appears to be winning. Alexei Bulazel, the senior cyber director at the White House National Security Council, said at a panel at the Def Con hacker conference in Las Vegas last week that the trend will hold, at least as long as the U.S. holds most of the world's most advanced tech companies. 'I very strongly believe that AI will be more advantageous for defenders than offense,' Bulazel said. He noted that hackers finding extremely disruptive flaws in a major U.S. tech company is rare, and that criminals often break into computers by finding small, overlooked flaws in smaller companies that don't have elite cybersecurity teams. AI is particularly helpful in discovering those bugs before criminals do, he said. 'The types of things that AI is better at — identifying vulnerabilities in a low cost, easy way — really democratizes access to vulnerability information,' Bulazel said. That trend may not hold as the technology evolves, however. One reason is that there is so far no free-to-use automatic hacking tool, or penetration tester, that incorporates AI. Such tools are already widely available online, nominally as programs that test for flaws in practices used by criminal hackers. If one incorporates an advanced LLM and it becomes freely available, it likely will mean open season on smaller companies' programs, Google's Adkins said. 'I think it's also reasonable to assume that at some point someone will release [such a tool],' she said. 'That's the point at which I think it becomes a little dangerous.' Meyers, of CrowdStrike, said that the rise of agentic AI — tools that conduct more complex tasks, like both writing and sending emails or executing code that programs — could prove a major cybersecurity risk. 'Agentic AI is really AI that can take action on your behalf, right? That will become the next insider threat, because, as organizations have these agentic AI deployed, they don't have built-in guardrails to stop somebody from abusing it,' he said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store