lemmydev2

joined 2 years ago
 

NCSC boss says China's whole-of-state cyber machine has become Britain's peer competitor in cyberspace State-sponsored cyberattacks from Chinese intelligence and military agencies display "an eye-watering level of sophistication," UK National Cyber Security Centre CEO Richard Horne is expected to say in a less-than-cheery opening speech to kick off its annual conference.…

 

Meta says that it has a new internal tool that is converting mouse movements and button clicks into data that can train its AI models.

 

What's been pitched as the most dangerous AI model in the world allegedly has a giant security hole.

 

Comments

 

Comments

 

Angelo Martino pleaded guilty to helping BlackCat ransomware group while acting as a ransomware negotiator. Another U.S. cybersecurity expert, Angelo Martino, admitted helping the BlackCat ransomware group while working as a ransomware negotiator. Angelo Martino (41) admitted helping the BlackCat ransomware group while working for a U.S. incident response firm. “A Florida man, formerly employed […]

 

Lawmakers decry CISA cuts: 'We are shooting ourselves in the foot' If a cyberattack leads to a death, that's murder. A former FBI cyber division chief urged the US Justice Department to consider felony homicide charges against ransomware actors when attacks on hospitals lead to patient deaths.…

 

A lesson in how not to respond to vulnerability reports UPDATED  Vibe-coding platform Lovable is pooh-poohing a researcher’s finding that anyone could open a free account on the service and read other users' sensitive info, including credentials, chat history, and source code. However, the company’s story keeps changing: First it attributed the publicly exposed info to "intentional behavior" and "unclear documentation," then threw bug-bounty service HackerOne under the bus.…

 

Comments

 

Wall Street Journal: A look at transnational scam syndicates in Cambodia, running hundreds of online scam operations and call centers and infiltrating Cambodia's ruling class  —  Crime syndicates in Cambodia corrupt officials, enslave workers and fleece victims worldwide  —  PHNOM PENH, Cambodia …

 

Most teams rely on logs to understand what's happening on a Linux system. Think of a log like a digital paper trail; every action leaves a trace somewhere. The assumption is that if something goes wrong, you can go back and piece the story together using these records.

 

The DDoS attack against Mastodon's flagship server comes less than a week after Bluesky was targeted with junk web traffic.

[–] lemmydev2@infosec.pub 0 points 2 months ago

Some context: https://www.404media.co/ars-technica-pulls-article-with-ai-fabricated-quotes-about-ai-generated-article/

Ars Technica Pulls Article With AI Fabricated Quotes About AI Generated Article

view more: next ›