Maybe I should prove that I am not against AI and that I do use AI for my daily job. In this post I will describe how I extracted MITRE ATT&CK techniques from an incident report automatically , by using Gemini (MITRE ATT&CK is a powerful framework for reasoning about attacks and I use this framework intensively in my Cybersecurity course). First a bit of context. Yesterday I posted this note on the team of the course: A recent technical report by Google is a concrete example of many of the concepts discussed in some of the recent lectures. New attack campaigns are discovered by highly skilled organizations, there is an infection chain leading to the final malware, the infection chain may be composed of multiple obfuscated scripts downloaded and executed from different locations, vulnerabilities that may or may not be publicly known at the time of their exploitation allow escalating privilege, IoC and YARA rules are released for the benefit of the rest of the world ....
The impact of so-called "AI" in coding, programming, cybersecurity is deep and will be more and more so. Many kinds of activities will become much faster or are already so. Predicting the implications of these facts on the job market is hard, though, as predicting the future always is. When I was a student I used to buy the BYTE magazine every now and then. In September 1990 I bought this issue, that I still have in my library: The Internet had been "invented" several years earlier ( TCP September 1981, DNS November 1983). I took my degree in December 1989 and at the time we did have the ability to download files from very far away and obscure locations, with ftp . A couple of lectures about computer networks were part of one of the courses I took in 1988. Yet, in 1990, none (none) of the " 63 of the World's Most Influential People in Personal Computing " included the Internet in their " predictions of the future ". One of the few truly ...