January 19, 2024
January 19, 2024
Reverse engineering expert system by @juanandres_gs free to play with (ChatGPT plus subscription required) at https://t.co/haFXmZWEnw pic.twitter.com/yuL2BMAP3J
— Costin Raiu (@craiu) January 18, 2024
New: Google News is boosting AI-generated garbage articles that rip-off other peoples' work. One company even admitted practice to me. Even wilder: Google says it doesn't focus on whether an article was made by AI or a human for News, opening way for more https://t.co/LAfu2FgtOo pic.twitter.com/fqgV9y9MHS
— Joseph Cox (@josephfcox) January 18, 2024
New blog from Google's TAG (@wxs) outing some elusive COLDRIVER (UNC4057) malware tracked as SPICA:
— Dan Black (@DanWBlack) January 18, 2024
"Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware"https://t.co/efldf9S8ZB
So the overall point here, that E2E services leak a ton of metadata through key updates, is a good one. Same thing goes for Apple: you can more or less enumerate all devices if you reverse the Apple Directory Service APIs. https://t.co/SIfVjkARtb
— Matthew Green (@matthew_d_green) January 18, 2024
1/ A technical writeup on @Meta’s @WhatsApp privacy issue:
— Tal Be'ery (@TalBeerySec) January 17, 2024
WA leaks victim devices’ end-to-end encryption (E2EE) identity information (mobile device + up to 4 linked devices) to any user, by design, even if blocked and not in contacts.https://t.co/ONmcdC3ZqC
We've witnessed attackers using new attack techniques in AWS:
— Christophe Tafani-Dereeper (@christophetd) January 18, 2024
• Creating a large number of ECS clusters for crypto mining
• Using EC2 Instance Connect for lateral movement
• Using AWS Resource Explorer for enumerationhttps://t.co/AQgLB5K0Tp pic.twitter.com/DY7rMv6c4Y
o/
— Phrack Zine (@phrack) January 18, 2024
Port scans are not cyber attacks https://t.co/GouTdHzAOW pic.twitter.com/vL0IrNlbmD
— dade (@0xdade) January 18, 2024
Ridiculous cyber security numbers from JPMorgan just dropped
— Morning Brew ☕️ (@MorningBrew) January 17, 2024
• Spends $15 billion annually on IT defense
• Experiences 45 billion hacker attempts per day
• Carries 62,000 tech specialists to protect system
They're making those hackers work for it
I’m fascinated by the idea of the Dead Internet, in which AI bots create website copies littered with ads that are then recursively crawled by “audience bots” over and over again. There are sectors of the internet devoid of all humanity, except for the person collecting ad rev. https://t.co/xFy2CzzszF
— Telefon Tel Aviv (@telefontelaviv) January 18, 2024
Google News is indexing and promoting websites that immediately rip off others with AI clones of their articles. These websites are absolutely littered with Google ads. Our website, in which real humans do journalism, is not indexed by Google Newshttps://t.co/0mshx4sQgs
— Jason Koebler (@jason_koebler) January 18, 2024
Thread by @jason_koebler on Thread Reader App – Thread Reader App
@jason_koebler: Google News is indexing and promoting websites that immediately rip off others with AI clones of their articles. These websites are absolutely littered with Google ads. Our website, in which real hum...…
cyber crime is out of control pic.twitter.com/vC506gYcaH
— vx-underground (@vxunderground) January 18, 2024
How does @DARPA's AIxCC actually work? We did a deep dive into the 50-page document to understand the competition's format, scoring, and challenges. Read our thoughts here: https://t.co/vLPHmy5k1r
— Trail of Bits (@trailofbits) January 18, 2024
hi, check out this tool for easy Linux kernel building and debugging - easylkb
— hermit (@ackmage) November 21, 2023
worked on it together with @netspooky! 💕
writeup: https://t.co/PcJis51kp9
repo: https://t.co/mChGACX5wG pic.twitter.com/7omGbOu2xj
https://ntietz.com/blog/rsa-deceptively-simple/