AI News Feed
Synthetic imagery sets new bar in AI training efficiency
Data is the new soil, and in this fertile new ground, MIT researchers are planting more than just pixels. By using synthetic images to train machine learning models, a team of scientists recently surpassed results obtained from traditional “real-image” training …
Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies
Russia-linked cyberespionage group APT29 has been observed leveraging the CVE-2023-38831 vulnerability in WinRAR in recent attacks.
The Ukrainian National Security and Defense Council (NDSC) reported that APT29 (aka SVR group, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes) has been …
Microsoft recruits former OpenAI CEO Sam Altman and Co-Founder Greg Brockman
AI experts don’t stay jobless for long, as evidenced by Microsoft’s quick recruitment of former OpenAI CEO Sam Altman and Co-Founder Greg Brockman.
Altman, who was recently ousted by OpenAI’s board for reasons that have had no shortage of speculation, …
Microsoft recruits former OpenAI CEO Sam Altman and Co-Founder Greg Brockman
AI experts don’t stay jobless for long, as evidenced by Microsoft’s quick recruitment of former OpenAI CEO Sam Altman and Co-Founder Greg Brockman.
Altman, who was recently ousted by OpenAI’s board for reasons that have had no shortage of speculation, …
Google Announces Gradual Elimination of Third-Party Cookies
Is Meta Llama Truly Open Source?
The software industry is increasingly embracing open-source technologies. An impressive 80% of businesses have increased their use of open-source software, according to the 2023 State of Open Source Report.
As a major player in the tech industry, Meta's software …
Is Meta Llama Truly Open Source?
The software industry is increasingly embracing open-source technologies. An impressive 80% of businesses have increased their use of open-source software, according to the 2023 State of Open Source Report.
As a major player in the tech industry, Meta's software …
Why Defenders Should Embrace a Hacker Mindset
LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique
LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique
Fed Instructs Telcos to Protect Consumers from SIM Swapping
Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking
DarkCasino joins the list of APT groups exploiting WinRAR zero-day
The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831.
Researchers at cybersecurity firm NSFOCUS analyzed DarkCasino attack pattern exploiting the WinRAR zero-day vulnerability tracked as CVE-2023-38831. The economically motivated APT group used specially crafted archives …
US teenager pleads guilty to his role in credential stuffing attack on a betting site
US teenager Joseph Garrison pleads guilty to carrying out a credential stuffing attack on a betting website.
US teenager Joseph Garrison (19) has pleaded guilty to his involvement in a credential stuffing campaign that targeted user accounts at a fantasy …
Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years
20 Best ChatGPT Prompts for Start-Ups
In the ever-evolving landscape of startups, leveraging cutting-edge tools like ChatGPT can be a game-changer. Startups, known for their agility and innovation, are always in search of methods to enhance efficiency, creativity, and competitiveness. ChatGPT, with its sophisticated capabilities, stands …
Security Affairs newsletter Round 446 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box.
Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Israeli |
8Base ransomware operators use a new variant of the Phobos ransomware
8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks.
Cisco Talos researchers observed 8Base ransomware operators using a variant of the Phobos ransomware in recent attacks.
Phobos variants are usually distributed …
8Base ransomware operators use a new variant of the Phobos ransomware
8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks.
Cisco Talos researchers observed 8Base ransomware operators using a variant of the Phobos ransomware in recent attacks.
Phobos variants are usually distributed …