New AI-based security takes the malware fight to the attackers. Credit: Thinkstock The traditional approach of fighting malware has always been reactive. A new attack is released, it infects a few companies, and antivirus vendors race to issue an update. Some organizations may get the update before the malware makes its way in, but many will not. Obviously, this isn’t an ideal situation as the good guys are always chasing the bad guys.If you were Marty McFly, you could fire up the old flux capacitor with 1.2 Gigawatts of power, jump ahead in time and bring updates back with you so you’re ready for WannaCry, Qakbot or, my favorite, Zeus. Fortunately, there’s another way to stop attacks before they impact anyone, and that’s to use artificial intelligence (AI) based systems.Cylance has recently begun to showcase the fact that its customers are protected from current threats even with older models. They are calling this “Cylance Predictive Advantage”. While Cylance has branded this approach, all of the AI-based security vendors would operate similarly. Today, AI and machine learning are being used to power more things in our lives than we’re even aware of. Amazon knows what people want to buy, autonomous vehicles can tell the difference between a tree and a person, and video analytics can pick a terrorist out of a crowd — all by leveraging machine learning. The reason we need to rely on an AI instead of people is because of the massive amounts of data that need to be processed and the speed at which machines can analyze data and connect the dots. Combating malware is no different. Staying ahead of the bad guys can no longer be done manually. It requires looking petabytes of known good and bad data. For example, Cylance has analyzed millions of features in over billions of files. This is possible today because the cloud provides almost infinite compute power. Cylance leverages over 40,000 cores in AWS to run its massive and complex model and its algorithm that can shrink the model down to run autonomously on a PC or laptop.One of the lesser-known facts of malware is that it’s usually derived from existing code and tweaked a little to evade most signature-based AV solutions. Each type of malware leaves an identifiable signature so if enough data is collected and analyzed the known good and bad can be discovered. More importantly, AI-based systems can safeguard businesses from future threats by running an almost infinite number of simulations on known malware, enabling it to effectively predict malware before it has been created. To prove this out, Cylance ran its code against WannaCry and found that the version that was used in November of 2015 would have blocked the attack, almost 18 months before the malware was released. This prevents some company from having to be the sacrificial “patient zero” that first reports a problem. Another example: the October 2015 model of Cylance would have stopped the Zcryptor ransomware, seven months before the attack was launched. CylanceThis chart shows how CPA fared against a number of the better-known malware campaigns in recent history. AI-based systems predicted these anywhere from seven to 18 months before they were discovered. It’s time for businesses to take the fight to the attackers and switch to an AI based security model that can protect the organization without requiring a handful of companies to be comprised before the remediation process can begin. More on AI and machine learning in security:How artificial intelligence fits into cybersecurityAI will transform information security, but it won’t happen overnightHow AI is stopping criminal hacking in real timeUsing AI to spot malware patternsAI: The promise and the peril Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe