Biden lays down the law on AI

In a sweeping executive order, US President Joseph R. Biden Jr. on Monday set up a comprehensive series of standards, safety and privacy protections, and oversight measures for the development and use of artificial intelligence (AI).

Among more than two dozen initiatives, Biden’s “Safe, Secure, and Trustworthy Artificial Intelligence” order was a long time coming, according to many observers who’ve been watching the AI space — especially with the rise of generative AI (genAI) in the past year.

To read this article in full, please click here

Read more

Octo Tempest cybercriminal group is “a growing concern”—Microsoft

Categories: News

Categories: Ransomware

Tags: ALPHV

Tags: Octo Tempest

Tags: RaaS

Tags: LOTL

Tags: social engineering

Tags: SIM swapping

A group of cybercriminals known for advanced social engineering attacks has joined one of the biggest ransomware groups as an affiliate.

(Read more…)

The post Octo Tempest cybercriminal group is “a growing concern”—Microsoft appeared first on Malwarebytes Labs.

Read more

Update now! Apple patches a raft of vulnerabilities

Categories: Exploits and vulnerabilities

Categories: News

Tags: iLeakage

Tags: side-channel

Tags: Safari

Tags: CVE-2023-40413

Tags: CVE-2023-40416

Tags: CVE-2023-40423

Tags: CVE-2023-42487

Tags: CVE-2023-42841

Tags: CVE-2023-41982

Tags: CVE-2023-41997

Tags: CVE-2023-41988

Tags: CVE-2023-40447

Tags: CVE-2023-42852

Tags: CVE-2023-32434

Tags: CVE-2023-41989

Tags: CVE-2023-38403

Tags: CVE-2023-42856

Tags: CVE-2023-40404

Tags: CVE-2023-41977

Tags: Vim

Apple has released security updates for its phones, iPads, Macs, watches and TVs.

(Read more…)

The post Update now! Apple patches a raft of vulnerabilities appeared first on Malwarebytes Labs.

Read more

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

Credit to Author: Cedric Pernet| Date: Fri, 27 Oct 2023 00:00:00 +0000

This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.

Read more