Uncategorized

City of Columbus sues man after he discloses severity of ransomware attack

Enlarge (credit: Getty Images) A judge in Ohio has issued a temporary restraining order against a security researcher who presented evidence that a recent ransomware attack on the city of Columbus scooped up…

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Enlarge (credit: Getty Images) Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance vendors (CSVs) represents a worldwide danger because they inevitably find their way…

New AI model can hallucinate a game of 1993’s Doom in real time

Enlarge (credit: Aurich Lawson | Getty Images) On Tuesday, researchers from Google and Tel Aviv University unveiled GameNGen, a new AI model that can interactively simulate the classic 1993 first-person shooter game Doom…

A long, weird FOSS circle ends as Microsoft donates Mono to Wine project

Enlarge / Does Mono fit between the Chilean cab sav and Argentinian malbec, or is it more of an orange, maybe? (credit: Getty Images) Microsoft has donated the Mono Project, an open-source framework…

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mirai, a family of malware that wrangles infected Internet of Things devices into large…

Debate over “open source AI” term brings new push to formalize definition

Enlarge / A man peers over a glass partition, seeking transparency. (credit: Image Source via Getty Images) The Open Source Initiative (OSI) recently unveiled its latest draft definition for "open source AI," aiming…

Hackers infect ISPs with malware that steals customers’ credentials

Enlarge (credit: Getty Images) Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day vulnerability that allowed them to infect at least four US-based ISPs with malware…

“Exploitative” IT firm has been delaying 2,000 recruits’ onboarding for years

Enlarge (credit: Getty) Indian IT firm Infosys has been accused of being “exploitative” after allegedly sending job offers to thousands of engineering graduates but still not onboarding any of them after as long…

Hobbyists discover how to insert custom fonts into AI-generated images

Enlarge / An AI-generated example of the Cyberpunk 2077 LoRA, rendered with Flux dev. Last week, a hobbyist experimenting with the new Flux AI image synthesis model discovered that it's unexpectedly good at…

Android malware steals payment card data using previously unseen technique

Enlarge (credit: d3sign) Newly discovered Android malware steals payment card data using an infected device’s NFC reader and relays it to attackers, a novel technique that effectively clones the card so it can…