Tag Archives: syndication

Cybersecurity experts say the west has failed to learn lessons from Ukraine

Enlarge / Viktor Zhora from Ukraine’s information protection service, says cyber has become a major component of hybrid warfare. Dragonflypd.com/Black Hat reader comments 21 with Viktor Zhora, the public face of Ukraine’s success against Russian cyberattacks, received a hero’s welcome earlier this month on stage at Black Hat, the world’s biggest cybersecurity gathering, in Las… Read More »

Crypto botnet on X is powered by ChatGPT

sakchai vongsasiripat/Getty Image reader comments 28 with ChatGPT may well revolutionize web search, streamline office chores, and remake education, but the smooth-talking chatbot has also found work as a social media crypto huckster. Researchers at Indiana University Bloomington discovered a botnet powered by ChatGPT operating on X—the social network formerly known as Twitter—in May of… Read More »

Our health care system may soon receive a much-needed cybersecurity boost

reader comments 19 with The Advanced Research Projects Agency for Health (Arpa-H), a research support agency within the United States Department of Health and Human Services, said today that it is launching an initiative to find and help fund the development of cybersecurity technologies that can specifically improve defenses for digital infrastructure in US health… Read More »

Ongoing scam tricks kids playing Roblox and Fortnite

reader comments 12 with Thousands of websites belonging to US government agencies, leading universities, and professional organizations have been hijacked over the last half decade and used to push scammy offers and promotions, new research has found. Many of these scams are aimed at children and attempt to trick them into downloading apps, malware, or… Read More »

An Apple malware-flagging tool is “trivially” easy to bypass

reader comments 10 with One of your Mac’s built-in malware detection tools may not be working quite as well as you think. At the Defcon hacker conference in Las Vegas, longtime Mac security researcher Patrick Wardle presented findings on Saturday about vulnerabilities in Apple’s macOS Background Task Management mechanism, which could be exploited to bypass… Read More »

Using AI to find antibodies is fast and produces unimagined molecules

Enlarge / Researchers use CyBio FeliX workstations to extract and purify DNA samples for testing reader comments 45 with At an old biscuit factory in South London, giant mixers and industrial ovens have been replaced by robotic arms, incubators, and DNA sequencing machines. James Field and his company LabGenius aren’t making sweet treats; they’re cooking… Read More »

Google, record labels working on deal covering musical “deepfakes”

reader comments 42 with Google and Universal Music are in talks to license artists’ melodies and voices for songs generated by artificial intelligence as the music business tries to monetize one of its biggest threats. The discussions, confirmed by four people familiar with the matter, aim to strike a partnership for an industry that is… Read More »

It’s a hot 0-day summer for Apple, Google, and Microsoft security fixes

reader comments 10 with The summer patch cycle shows no signs of slowing down, with tech giants Apple, Google, and Microsoft releasing multiple updates to fix flaws being used in real-life attacks. July also saw serious bugs squashed by enterprise software firms SAP, Citrix, and Oracle. Here’s everything you need to know about the major… Read More »

Major AI companies form group to research, keep control of AI

Enlarge / The four companies say they launched the Frontier Model Forum to ensure “the safe and responsible development of frontier AI models.” Financial Times reader comments 16 with Four of the world’s most advanced artificial intelligence companies have formed a group to research increasingly powerful AI and establish best practices for controlling it, as… Read More »

Researchers find deliberate backdoor in police radio encryption algorithm

reader comments 62 with For more than 25 years, a technology used for critical data and voice radio communications around the world has been shrouded in secrecy to prevent anyone from closely scrutinizing its security properties for vulnerabilities. But now it’s finally getting a public airing thanks to a small group of researchers in the… Read More »