БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 2

Jun 27, 2024

Could AI Ever Become Conscious? Here’s the Truth About Thinking, Feeling Machines

Posted by in categories: cybercrime/malcode, robotics/AI

Star Trek: The Next Generation looks at sentience as consciousness, self-awareness, and intelligence—and that was actually pretty spot on. Sentience is the innate human ability to experience feelings and sensations without association or interpretation. “We’re talking about more than just code; we’re talking about the ability of a machine to think and to feel, along with having morality and spirituality,” Ishaani Priyadarshini, a Cybersecurity Ph.D. candidate from the University of Delaware, tells Popular Mechanics.

💡AI is very clever and able to mimic sentience, but never actually become sentient itself.

Continue reading “Could AI Ever Become Conscious? Here’s the Truth About Thinking, Feeling Machines” »

Jun 26, 2024

Neuralink’s first human patient Noland Arbaugh says his brain chip can be hacked: ‘It is what it is’

Posted by in categories: biotech/medical, cybercrime/malcode, neuroscience

Hacking my brain implant wouldn’t do much, he asserted, adding, “You might be able to see like some of the brain signals. You might be able to see some of the data that Neuralink’s collecting.”

Get ready to catch the final stages of the World Cup only on Crickit. Anytime, Anywhere. Explore now!

Norland Arbaugh did not specify the data that is being collected by Neuralink chip which is almost the size of a coin and contains thousands of electrodes that monitor and stimulate brain activity, as per the company. This information is digitally transmitted to researchers.

Jun 22, 2024

CDK hackers demand millions to end cyberattack crippling auto dealers: Bloomberg

Posted by in categories: cybercrime/malcode, transportation

A group that says they hacked software company CDK Global is demanding tens of millions of dollars in ransom, Bloomberg reported.

CDK, which provides software to car dealerships in North America, intends to pay the ransom but discussions are subject to change, according to Bloomberg’s report which cited a person familiar with the situation.

The source said the group behind the hack is believed to be based in eastern Europe, Bloomberg reported.

Jun 18, 2024

Decagon raises $35 million from Accel and A16z to build AI customer support agents. Here’s an exclusive look at the pitch deck it used

Posted by in categories: cybercrime/malcode, robotics/AI

Decagon cofounders Jesse Zhang and Ashwin Sreenivas have more in common than just their company. Each studied computer science, married young, and even founded a company before Decagon. “We started hacking on some stuff together,” said Zhang, the startup’s CEO. “And that went well, so we just kept working together.”

Founded in July 2023, Decagon uses generative AI to automate customer support for enterprise customers. The company has emerged from stealth and raised $35 million in funding for its seed and Series A rounds. Accel led the company’s $30 million Series A, with participation from Andreessen Horowitz, A*, and Elad Gil. A16z led the company’s $5 million seed round. Decagon also counts Box CEO Aaron Levie and Airtable CEO Howie Liu as angel investors.

Jun 17, 2024

Sycophancy to subterfuge: Investigating reward tampering in language models

Posted by in categories: cybercrime/malcode, robotics/AI

New Anthropic research: Investigating Reward Tampering.

Could AI models learn to hack their own reward system?

In a new paper, we show they can, by generalization from training in simpler settings.

Continue reading “Sycophancy to subterfuge: Investigating reward tampering in language models” »

Jun 12, 2024

America is the undisputed world leader in quantum computing even though China spends 8x more on the technology–but an own goal could soon erode U.S. dominance

Posted by in categories: business, cybercrime/malcode, economics, finance, government, information science, quantum physics, robotics/AI

When it comes to quantum computing, that chilling effect on research and development would enormously jeopardize U.S. national security. Our projects received ample funding from defense and intelligence agencies for good reason. Quantum computing may soon become the https://www.cyberdefensemagazine.com/quantum-security-is-nat...at%20allow, codebreaking%20attacks%20against%20traditional%20encryption" rel="noopener" class="">gold standard technology for codebreaking and defending large computer networks against cyberattacks.

Adopting the proposed march-in framework would also have major implications for our future economic stability. While still a nascent technology today, quantum computing’s ability to rapidly process huge volumes of data is set to revolutionize business in the coming decades. It may be the only way to capture the complexity needed for future AI and machine learning in, say, self-driving vehicles. It may enable companies to hone their supply chains and other logistical operations, such as manufacturing, with unprecedented precision. It may also transform finance by allowing portfolio managers to create new, superior investment algorithms and strategies.

Given the technology’s immense potential, it’s no mystery why China committed what is believed to be more than https://www.mckinsey.com/featured-insights/sustainable-inclu…n-quantum” rel=“noopener” class=””>$15 billion in 2022 to develop its quantum computing capacity–more than double the budget for quantum computing of EU countries and eight times what the U.S. government plans to spend.

Jun 9, 2024

LightSpy Spyware’s macOS Variant Found with Advanced Surveillance Capabilities

Posted by in categories: cybercrime/malcode, robotics/AI, surveillance

Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a previously undocumented macOS variant of the implant.

The findings come from both Huntress Labs and ThreatFabric, which separately analyzed the artifacts associated with the cross-platform malware framework that likely possesses capabilities to infect Android, iOS, Windows, macOS, Linux, and routers from NETGEAR, Linksys, and ASUS.

“The Threat actor group used two publicly available exploits (CVE-2018–4233, CVE-2018–4404) to deliver implants for macOS,” ThreatFabric said in a report published last week. “Part of the CVE-2018–4404 exploit is likely borrowed from the Metasploit framework. macOS version 10 was targeted using those exploits.”

Jun 9, 2024

Thousands of companies using Ray framework exposed to cyberattacks, researchers say

Posted by in categories: cybercrime/malcode, robotics/AI

Researchers are warning that hackers are actively exploiting a disputed vulnerability in a popular open-source AI framework known as Ray.

This tool is commonly used to develop and deploy large-scale Python applications, particularly for tasks like machine learning, scientific computing and data processing.

According to Ray’s developer, Anyscale, the framework is used by major tech companies such as Uber, Amazon and OpenAI.

Jun 9, 2024

GPT-4 autonomously hacks zero-day security flaws with 53% success rate

Posted by in categories: cybercrime/malcode, robotics/AI

Researchers were able to successfully hack into more than half their test websites using autonomous teams of GPT-4 bots, co-ordinating their efforts and spawning new bots at will. And this was using previously-unknown, real-world ‘zero day’ exploits.

Jun 7, 2024

Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide

Posted by in categories: business, cybercrime/malcode

ALERT: RansomHub, a rebranded Knight ransomware, targets healthcare and major entities.

Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.

Page 2 of 20712345678Last