Friday, March 3, 2023

The Register: Daily Headlines

Why ChatGPT should be considered malevolent AI..."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 03 March 2023, 1334 UTC.  Content provided by email subscription to "The Register:  Daily Headlines."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGrcrrFHmnqKTqHqPpRbMlFdcxL ("The Register:  Daily Headlines").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

Hi The Register Subscriber | Log in

The Register

{* Daily Headlines *}

3 March 2023

 
A robot hand holding a skull

Why ChatGPT should be considered a malevolent AI – and be destroyed

It not only told everyone I died but tried to fake my obit. Are we ready for this machine-driven future?

 
 

OFF-PREM

Salesforce banks savings by sweating tech infrastructure for an extra year

Revenue rocks, but boosting margins means five year old servers and four year old PCs

3 Comments
x

Trade toil for innovation: IT leaders’ guide to leveling-up your infrastructure

eBook

x

Want the latest intel on AI infrastructure?

Whitepaper

ON-PREM

Datacenters still a boys' club, staffing shortages may change that

Fifth of server warehouse operators polled didn't employ a single female worker

7 Comments

Arm co-founder: Britain's chip strat 'couldn’t be any worse'

Lack of route to domestic semiconductor supply best of British stuffup, says Urquhart

25 Comments

How many premium portable sales = HP CEO's 2022 compensation?

977 EliteBook x360 830 G6 Notebooks makes one Enrique Lores

4 Comments

APNIC elections: Reform activists rejected, org welcomes stronger election protections

Candidates supported by Morocco-backed group fail to win a single seat on Executive Council

1 Comments
x

Secure CI/CD Pipelines

Best Practices for Managing CI/CD Secrets

x

Intro To RTOS: A Deep Dive Into Embedded Systems

Webinar

SECURITY

Crappy insecure software in Biden's crosshairs

Just-revealed US cybersecurity strategy 'has fangs' for catching crafty criminals and crummy coders

3 Comments

CI/CD: Necessary for modern software development, yet it carries a lot of risk

With great speed comes great insecurity

1 Comments

Intruder alert: WH Smith hit by another cyber attack

Less than a year after Funky Pigeon leaked data of greetings cards biz

12 Comments

Forget ChatGPT, the most overhyped security tool is technology itself, Wiz warns

Infosec also needs to widen its talent pool or miss out

11 Comments
x

7 Experts on the Importance of Understanding Your Attack Surface and Relevant Threat Landscape

Mighty Guides eBook:

SOFTWARE

At Citrix, 'perpetual licenses' means 'we'd rather move you to a subscription'

Intros 'universal licenses' that can be deployed anywhere and include extra support sweeteners

Why ChatGPT should be considered a malevolent AI – and be destroyed

It not only told everyone I died but tried to fake my obit. Are we ready for this machine-driven future?

51 Comments

If Tesla Investor Day was about exciting investors then boy did it fail

No new cars, unanswered questions, and FSD goals still looming in distance may be why stock is tanking

16 Comments

Linux Mint 21.2 and Cinnamon 5.8 desktop take shape

Along with better integration for all three editions

9 Comments

Now we're building computers from lab-grown brain cells

Oi! Organoid Intelligence could be more data- and power-efficient than AI

17 Comments

My God, it's full of tabs: Vivaldi's coolest new features shine on phones and cars

Opera founder's outfit continues to push the browser functionality envelope

34 Comments

Microsoft adds features to Windows 11 monthly – managing it is your problem

'Continuous innovation' means it's time to refine your WSUS skills unless you want users doing all sorts of weird stuff

50 Comments

Amid the gloom of widespread layoffs, Fujitsu is hiring and acquiring

Buys GK Software and intends to put 1,600 new people on staff – some of them oldies

6 Comments

China's efforts to influence standards are mostly fake – and flopping

But Carnegie Endowment worries a handful are real, and that the ITU is 'susceptible to manipulation'

11 Comments

OpenAI opens ChatGPT floodgates with dirt-cheap API

'This has to be a loss-leader to lock out competitors'

13 Comments

OFFBEAT

Funnily enough, FDA forbids Elon Musk's Neuralink human experiments

It's still coming soon ... just like it was in 2019, and 2020, and 2021, and 2022

5 Comments

UK space faces cash freeze unless watchdogs step up

'Toxic' environment requires reboot to restore confidence following failed satellite launch

11 Comments

Defense boffins take notes from sci-fi writers on the future of warfare

Neat! Everything's gonna be just like Call of Duty!

16 Comments

NASA finds crashing spacecraft into asteroids is a viable defence strategy

Recoil from DART impact changed Dimorphos's orbit more than expected

34 Comments

Find pushes back birth of Europe's steel hardware to about 3,000 years ago

Iberians were using heavy metal on hard rock way before it was cool

36 Comments
 
 
  
Twitter
Facebook
LinkedIn
  
    

This email was sent to kh6jrm@gmail.com

You can update your preferences or unsubscribe

Situation Publishing Ltd, 315 Montgomery Street, 9th & 10th Floors, San Francisco, CA 94104, USA

The Register and its contents are Copyright © 2023 Situation Publishing. All rights reserved.

Privacy Policy

Thursday, March 2, 2023

The Hacker News Daily Updates

"New cryptojacking campaign leverages misconfigured Redis Database Servers."

Views expressed in this cybersecurity, cybercrime news summary are those of the reporters and correspondents.  Accessed on 02 March 2023, 1337 UTC.  Content provided by  email subscription to "The Hacker News Daily Updates."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGrcrpvjHdsMrFjnLhdpxJQLhhN ("The Hacker News Daily Updates").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

The Hacker News Daily Updates
Newsletter
cover

The Hacker News Webinar: A MythBusting Special -- 9 Myths about File-based Threats

Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!

Download NowSponsored
LATEST NEWSMar 2, 2023

New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers

Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source command-line file transfer service to implement its attack. "Underpinning this campaign was the use of transfer[.]sh," Cado Security said in a report shared with The Hacker News. "It's possible that it's an attempt at evading detections based on other common ...

Read More
TwitterFacebookLinkedIn

2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots

As a primary working interface, the browser plays a significant role in today's corporate environment. The browser is constantly used by employees to access websites, SaaS applications and internal applications, from both managed and unmanaged devices. A new report published by LayerX, a browser security vendor, finds that attackers are exploiting this reality and are targeting it in ...

Read More
TwitterFacebookLinkedIn

Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI

A malicious Python package uploaded to the Python Package Index (PyPI) has been found to contain a fully-featured information stealer and remote access trojan. The package, named colourfool, was identified by Kroll's Cyber Threat Intelligence team, with the company calling the malware Colour-Blind. "The 'Colour-Blind' malware points to the democratization of cybercrime that could lead to ...

Read More
TwitterFacebookLinkedIn

SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics

The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate, expanding on its ability to target devices running the operating system. The oldest version of the updated artifact dates back to July 2022, with the malware incorporating new features designed to evade security software and resist reverse engineering. Cybersecurity company Trend ...

Read More
TwitterFacebookLinkedIn

Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack

Cisco on Wednesday rolled out security updates to address a critical flaw impacting its IP Phone 6800, 7800, 7900, and 8800 Series products. The vulnerability, tracked as CVE-2023-20078, is rated 9.8 out of 10 on the CVSS scoring system and is described as a command injection bug in the web-based management interface arising due to insufficient validation of user-supplied input. ...

Read More
TwitterFacebookLinkedIn

Cybercriminals Targeting Law Firms with GootLoader and FakeUpdates Malware

Six different law firms were targeted in January and February 2023 as part of two disparate threat campaigns distributing GootLoader and FakeUpdates (aka SocGholish) malware strains. GootLoader, active since late 2020, is a first-stage downloader that's capable of delivering a wide range of secondary payloads such as Cobalt Strike and ransomware. It notably employs search engine optimization ...

Read More
TwitterFacebookLinkedIn

BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11

A stealthy Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus has become the first publicly known malware capable of bypassing Secure Boot defenses, making it a potent threat in the cyber landscape. "This bootkit can run even on fully up-to-date Windows 11 systems with UEFI Secure Boot enabled," Slovak cybersecurity company ESET said in a report shared with The Hacker ...

Read More
TwitterFacebookLinkedIn

CISOs Are Stressed Out and It's Putting Companies at Risk

Employee well-being has become a primary focus for many businesses. Even before the pandemic, the C-suite was acutely aware of how employee mental health impacts business outcomes.  But for cybersecurity professionals, stress has always been a part of the job. A new survey revealed that one of the most concerning aspects of employee mental health is how it impacts cybersecurity programs ...

Read More
TwitterFacebookLinkedIn
cover

The Hacker News Webinar: A MythBusting Special -- 9 Myths about File-based Threats

Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!

Download NowSponsored

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...