Uncategorized

Why the US government’s overreliance on Microsoft is a big problem

Enlarge (credit: Joan Cros via Getty) When Microsoft revealed in January that foreign government hackers had once again breached its systems, the news prompted another round of recriminations about the security posture of…

New UK law targets “despicable individuals” who create AI sex deepfakes

Enlarge (credit: Getty Images) On Tuesday, the UK government announced a new law targeting the creation of AI-generated sexually explicit deepfake images. Under the legislation, which has not yet been passed, offenders would…

Attackers are pummeling networks around the world with millions of login attempts

Enlarge (credit: Matejmo | Getty Images) Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s indiscriminately assailing networks with login attempts aimed at gaining unauthorized access to VPN, SSH,…

Linus Torvalds reiterates his tabs-versus-spaces stance with a kernel trap

Enlarge / Cans of Tab diet soda on display in 2011. Tab was discontinued in 2020. There has never been a soda named "Spaces" that had a cult following. (credit: Getty Images) Anybody…

Alleged cryptojacking scheme consumed $3.5M of stolen computing to make just $1M

Enlarge (credit: Getty Images) Federal prosecutors indicted a Nebraska man on charges he perpetrated a cryptojacking scheme that defrauded two cloud providers—one based in Seattle and the other in Redmond, Washington—out of $3.5…

Framework’s software and firmware have been a mess, but it’s working on them

Enlarge / The Framework Laptop 13. (credit: Andrew Cunningham) Since Framework showed off its first prototypes in February 2021, we've generally been fans of the company's modular, repairable, upgradeable laptops. Not that the…

Change Healthcare faces another ransomware threat—and it looks credible

Enlarge (credit: iStock / Getty Images Plus) For months, Change Healthcare has faced an immensely messy ransomware debacle that has left hundreds of pharmacies and medical practices across the United States unable to…

“Highly capable” hackers root corporate networks by exploiting firewall 0-day

Enlarge (credit: Getty Images) Highly capable hackers are rooting multiple corporate networks by exploiting a maximum-severity zero-day vulnerability in a firewall product from Palo Alto Networks, researchers said Friday. The vulnerability, which has…

Words are flowing out like endless rain: Recapping a busy week of LLM news

Enlarge / An image of a boy amazed by flying letters. (credit: Getty Images) Some weeks in AI news are eerily quiet, but during others, getting a grip on the week's events feels…

Hackable Intel and Lenovo hardware that went undetected for 5 years won’t ever be fixed

Enlarge (credit: Intel) Hardware sold for years by the likes of Intel and Lenovo contains a remotely exploitable vulnerability that will never be fixed. The cause: a supply chain snafu involving an open…