Uncategorized

OpenAI board shake-up: Microsoft out, Apple backs away amid AI partnership scrutiny

Enlarge (credit: Benj Edwards / OpenAI / Microsoft) Microsoft has withdrawn from its non-voting observer role on OpenAI's board, while Apple has opted not to take a similar position, reports Axios and Financial…

In bid to loosen Nvidia’s grip on AI, AMD to buy Finnish startup for $665M

Enlarge (credit: Akos Stiller/Bloomberg via Getty Images) AMD is to buy Finnish artificial intelligence startup Silo AI for $665 million in one of the largest such takeovers in Europe as the US chipmaker…

Threat actors exploited Windows 0-day for more than a year before Microsoft fixed it

Enlarge (credit: Getty Images) Threat actors carried out zero-day attacks that targeted Windows users with malware for more than a year before Microsoft fixed the vulnerability that made them possible, researchers said Tuesday.…

New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere

Enlarge (credit: Getty Images) One of the most widely used network protocols is vulnerable to a newly discovered attack that can allow adversaries to gain control over a range of environments, including industrial…

The president ordered a board to probe a massive Russian cyberattack. It never did.

Enlarge (credit: Avishek Das/SOPA Images/LightRocket via Getty Images) This story was originally published by ProPublica. Investigating how the world’s largest software provider handles the security of its own ubiquitous products. After Russian intelligence…

384,000 sites pull code from sketchy code library recently bought by Chinese firm

Enlarge (credit: Getty Images) More than 384,000 websites are linking to a site that was caught last week performing a supply-chain attack that redirected visitors to malicious sites, researchers said. For years, the…

“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux

Enlarge Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that can be exploited to give attackers complete control of Linux and Unix servers with no authentication required. The vulnerability,…

3 million iOS and macOS apps were exposed to potent supply-chain attacks

Enlarge (credit: Aurich Lawson) Vulnerabilities that went undetected for a decade left thousands of macOS and iOS apps susceptible to supply-chain attacks. Hackers could have added malicious code compromising the security of millions…

Inside a violent gang’s ruthless crypto-stealing home invasion spree

Enlarge (credit: Malte Mueller / Getty) Cryptocurrency has always made a ripe target for theft—and not just hacking, but the old-fashioned, up-close-and-personal kind, too. Given that it can be irreversibly transferred in seconds…

Researchers craft smiling robot face from living human skin cells

Enlarge / A movable robotic face covered with living human skin cells. (credit: Takeuchi et al.) In a new study, researchers from the University of Tokyo, Harvard University, and the International Research Center…