Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Microsoftâ(TM)s Project Ire is an autonomous AI that reverse engineers malw (nerds.xyz)

BrianFagioli writes: Microsoft has revealed something genuinely exciting in the cybersecurity world. Itâ(TM)s called Project Ire, and it might be one of the most ambitious attempts yet to automate malware classification. This isnâ(TM)t just a system that scans files or compares against known threats. It actually reverse engineers unknown software entirely on its own, analyzing it from the ground up without knowing where it came from or what itâ(TM)s supposed to do.

To be clear, this is very exciting. As someone who writes about security and tech regularly, Iâ(TM)ve seen my fair share of âoeAI-poweredâ tools, but this one feels different. Project Ire doesnâ(TM)t need hand-holding. It picks apart software like a real analyst would, using decompilers, control flow analysis, memory sandboxes, and more.

This thing came out of a collaboration between Microsoft Research, Defender Research, and Discovery & Quantum. Basically, all the big brains at Microsoft put their heads together and built a system that doesnâ(TM)t just guess. Actually, it investigates. And it does so using some of the same underlying tech behind GraphRAG and Microsoft Discovery, including a toolkit of reverse engineering utilities that it calls like a seasoned analyst.

Microsoft tested Project Ire against public datasets full of Windows drivers. Some were malicious, others totally clean. The system ended up with a precision of 0.98 and a recall of 0.83, which are both impressive numbers. That means it flagged malware with near-perfect accuracy and didnâ(TM)t miss much. Even better, it produced the first ever conviction case at Microsoft authored entirely by a machine. No human in the loop. That malware sample is now blocked by Microsoft Defender.

Unlike traditional security systems, which rely heavily on signatures and rule-based filters, Project Ire goes in blind. It reconstructs software internals using tools like angr and Ghidra, then reasons through behavior to decide if a file is safe or not. Itâ(TM)s not just making guesses. Itâ(TM)s building a case, complete with an evidence chain that reviewers can look over.

One of the standout examples Microsoft shared was a rootkit called Trojan:Win64/Rootkit.EH!MTB. Project Ire picked up on behavior like hijacking Explorer.exe, injecting hooks, and reaching out to command and control servers. Another sample, HackTool:Win64/KillAV!MTB, was designed to kill antivirus software. The system correctly identified that too, including functions aimed at terminating specific security processes. These are the kinds of files that often sneak past basic scanners.

Now, Ire isnâ(TM)t perfect. It once misread a function as anti-debugging behavior, but what stood out was how it flagged the finding as questionable and used a built-in validator to double check itself. Thatâ(TM)s not something most AI tools do today. It shows that this system isnâ(TM)t blindly confident. It understands uncertainty and knows when to ask for a second opinion.

In tougher real-world testing, Ire took on nearly 4,000 hard-to-classify files that had been set aside for expert review. These werenâ(TM)t cherry-picked samples. They were unknowns. The system worked entirely on its own and still nailed about 9 out of 10 of the malware cases it flagged. Even though it caught only a quarter of all the bad files in this high-difficulty round, it barely triggered false alarms. Thatâ(TM)s a good tradeoff in real-world defense, where one wrong call can burn trust.

Microsoft says Project Ire will now be integrated into the Defender ecosystem under the name Binary Analyzer. The long-term plan is to scale it up and speed it up, making it possible to classify unknown files instantly⦠maybe even before they hit disk. That kind of capability could be a game-changer, especially as threats become faster, smarter, and harder to pin down.

To me, the most exciting part is that this isnâ(TM)t theoretical. Project Ire is already helping real analysts inside Microsoft. Itâ(TM)s working alongside humans, not replacing them, and offering detailed, explainable reports that can stand up to scrutiny. Thatâ(TM)s the kind of AI we need more of, folks, not hype, not smoke and mirrors, but something that actually helps solve hard problems.

Submission + - Linux kernel could soon expose every line AI helps write (nerds.xyz)

BrianFagioli writes: As AI continues to reshape how software gets written, even the Linux kernel isnâ(TM)t immune to its influence. Sasha Levin, a respected developer and engineer at Nvidia, has proposed a patch series aimed at formally integrating AI coding assistants into the Linux kernel workflow.

The proposal includes two major changes. First, it introduces configuration stubs for popular AI development tools like Claude, GitHub Copilot, Cursor, Codeium, Continue, Windsurf, and Aider. These are symlinked to a centralized documentation file to ensure consistency.

Second, and more notably, it lays out official guidelines for how AI-generated contributions should be handled. According to the proposed documentation, AI assistants must identify themselves in commit messages using a Co-developed-by: tag, but they cannot use Signed-off-by:, which legally certifies the commit under the Developer Certificate of Origin. That responsibility remains solely with the human developer.

One example shared in the patch shows a simple fix to a typo in the kernelâ(TM)s OPP documentation. Claude, an AI assistant, corrects âoedontâ to âoedonâ(TM)tâ and commits the patch with the proper attribution:

Co-developed-by: Claude claude-opus-4-20250514
Levinâ(TM)s patch also creates a new section under Documentation/AI/ where the expectations and limitations of using AI in kernel development are laid out. This includes reminders to follow kernel coding standards, respect the development process, and understand licensing requirements. There are things AI often struggles with.

While some developers may see this as a helpful step toward transparency, others might argue that codifying AI usage in one of the most human-driven open-source projects sends the wrong message. Should kernel development really be assisted by tools that donâ(TM)t fully grasp the consequences of their code?

Levinâ(TM)s proposal doesnâ(TM)t change the development process overnight. For now, itâ(TM)s just a request for comments (RFC). But it does raise a bigger question: how much AI is too much when it comes to open-source code that runs on billions of devices?

Let us know what you think. Should Linux welcome AI assistants into the fold, or keep the kernel strictly human-made?

Submission + - Motorola Solutions introduces AI nutrition labels (nerds.xyz)

BrianFagioli writes: Motorola Solutions is trying something new with its AI-powered security tools. The company is introducing what it calls âoeAI nutrition labels,â designed to help users understand how artificial intelligence is being used inside its products. Itâ(TM)s a bit like the labels on food boxes, but instead of calories and sugar, youâ(TM)re getting insight into algorithms, data handling, and human oversight.

Each label will outline the type of AI being used, what it does, who owns the data, and whether there are any human checks in place. Motorola says itâ(TM)s doing this to improve transparency and build trust with customers who rely on its technology for public safety and enterprise security.

Submission + - Brave browser blocks Microsoft Recall to protect user privacy (nerds.xyz)

BrianFagioli writes: Brave just made it even clearer that it puts privacy first, and I’m here for it. Starting with version 1.81 on Windows, the browser will now block Microsoft Recall from logging your activity. That means no sneaky screenshots of your browsing sessions will end up in Recall’s controversial database.

Microsoft’s Recall feature has faced heavy criticism since it was first introduced in 2024. The tool automatically captured full-screen images every few seconds and stored them locally in plaintext. It didn’t take long for privacy experts to sound the alarm. With such a setup, any malware or person with access to your machine could sift through your digital life with ease.

Submission + - Managers say supervising Gen Z feels like babysitting according to new survey (nerds.xyz)

BrianFagioli writes: This might not come as surprise if you are currently in the workforce, but supervising Gen Z workers often feels more like babysitting than managing. Thatâ(TM)s according to a new report from ResumeTemplates.com. Based on survey responses from 1,000 U.S. managers, it paints a scary picture of frustration, hand-holding, and mismatched expectations in todayâ(TM)s multigenerational workplace.

The numbers are hard to ignore. Sixty-eight percent of surveyed managers said overseeing Gen Z employees feels more like parenting than actual leadership. More than half, 54 percent, went further and likened it to babysitting. Many managers say they spend their time walking younger workers through basic tasks, checking in multiple times a day, and explaining what older employees would already know how to do.

A full 61 percent of managers reported that their Gen Z staff require frequent guidance to complete their work. Over half say these workers often struggle with following simple instructions. One out of every three managers said they find themselves checking in four or more times a day with their youngest employees.

Submission + - Apple launches retail expansion in Saudi Arabia, but at what cost? (nerds.xyz)

BrianFagioli writes: Apple has officially brought its retail operation to the Kingdom of Saudi Arabia, launching the Apple Store online and the Apple Store app with full Arabic language support. This marks the companyâ(TM)s first direct retail presence in the country, and it comes with the usual Apple polish: personalized shopping, AppleCare+, Arabic engraving, and promises of flagship physical stores starting in 2026.

But while Apple is highlighting customization and convenience, critics are pointing to something else. The optics of cozying up to a regime accused of human rights abuses, digital repression, and lingering questions about its connection to the 9/11 terror attacks.

Submission + - Google launches OSS Rebuild to catch open source malware and verify sketchy pack (nerds.xyz)

BrianFagioli writes: Open source software runs pretty much everything these days, but with that popularity comes risk. Hackers have figured out they can slip malicious code into popular packages and infect thousands of systems in one shot. Now Google is stepping in with a new initiative called OSS Rebuild, and it could be a game changer for developers and security teams alike.

Matthew Suozzo from Googleâ(TM)s Open Source Security Team introduced OSS Rebuild as a way to âoestrengthen trust in open source package ecosystems by reproducing upstream artifacts.â That means rebuilding packages like those on PyPI, npm, and Crates.io, and making sure they match the original source code. If they donâ(TM)t, it could be a sign that somethingâ(TM)s wrong.

âoeOSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,â Suozzo said. Thatâ(TM)s a key point. The tool works behind the scenes, without putting extra work on the people who publish and maintain open source packages. It automatically generates build definitions, creates provenance metadata following the SLSA Build Level 3 standard, and flags anything suspicious.

This kind of system might have caught incidents like the backdoor in xz-utils or the shady code injection in solana/webjs. OSS Rebuild looks for several types of supply chain threats, including stealthy backdoors, build environment compromises, and packages that include code not found in the public source repository. It even monitors for suspicious behavior during the build process, something thatâ(TM)s almost impossible to catch with manual review.

Submission + - How to destroy America: Let it fall in love with AI, then pull the plug (nerds.xyz) 1

BrianFagioli writes: If someone wanted to destroy America, they might not need missiles or boots on the ground. Just let us build our world around AI. Let us become fully dependent on machine learning and automation. Let us give up our skills and instincts in exchange for convenience. Then wait. When the moment is right, pull the plug.

Submission + - Arch Linux isnâ(TM)t immune: Malware found hiding in AUR packages (nerds.xyz)

BrianFagioli writes: Arch Linux just reminded us all of an uncomfortable truth: Linux isnâ(TM)t bulletproof when it comes to malware.

Earlier this week, three malicious AUR packages slipped into the ecosystem. The names might look familiar: firefox-patch-bin, librewolf-fix-bin, and zen-browser-patched-bin. Each one was quietly laced with a script that fetched a Remote Access Trojan (RAT) from a GitHub repository.

The packages were uploaded by the same user and lingered on the AUR for roughly two days. Arch acted quickly once the issue came to light. As of today, the bad packages have been fully removed from the AUR. But if you installed any of them, the damage might already be done.

Submission + - Intel kills Clear Linux OS as support ends without warning (nerds.xyz)

BrianFagioli writes: Intel has quietly pulled the plug on Clear Linux OS, officially ending support for the once-promising Linux distribution that it had backed for nearly a decade. Effective immediately, the company says it will no longer provide any updates, security patches, or maintenance for the operating system. In a final blow, the Clear Linux OS GitHub repository is now archived in read-only mode.

The move was announced with little fanfare, and for users still relying on Clear Linux OS, thereâ(TM)s no sugarcoating it⦠you need to move on. Intel is urging everyone to migrate to an actively maintained Linux distribution as soon as possible to avoid running unpatched software.

Submission + - ESWIN Computing and Canonical launch powerful low cost RISC-V SBC running Ubuntu (nerds.xyz)

BrianFagioli writes: Canonical and ESWIN Computing have teamed up to launch the EBC77 Series SBC, a developer-friendly RISC-V board that ships with Ubuntu 24.04 LTS out of the box.

Itâ(TM)s powered by a quad-core 64-bit RISC-V CPU (1.8GHz), 20TOPS NPU, LPDDR5 at 6400Mbps, and supports PCIe Gen3, USB 3.2, HDMI, Wi-Fi, and more. Canonical is clearly doubling down on RISC-V, and this board looks like a solid platform for embedded devs, educators, and Linux tinkerers.

Slashdot Top Deals

"It's my cookie file and if I come up with something that's lame and I like it, it goes in." -- karl (Karl Lehenbauer)

Working...