Move fast and break things. That should be the mantra of AI everywhere. AI is both good and here to stay, but you need to validate anything that you do with AI. At least at this point in its lifecycle. Imagine, just for one sad moment, you’re in a life-or-death situation. You’re terribly ill and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI Vendor Perplexity Accused of Scraping Websites That Explicitly Blocked AI Scraping Oops. Did they do that? They wouldn’t do that, would they? Cloudflare published research that says it actually saw Perplexity scraping sites while explicitly obscuring its identity in an attempt to circumvent the website’s preferences. To the tune of tens of thousands of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I don’t know whether this is a slow news week or things are getting bad but check out all of these items this week: I could have easily listed twice as many hacks, but I stopped after a dozen. So you tell me – is this just a bad week or are the hackers winning? […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yes, you heard me right. No, not party balloons, spy balloons. As countries want ever more spy data but don’t have ever more budget, this is an option they are testing. Just last week the UK said it had completed trials of an UNCREWED, high altitude set of balloons. The MoD said they were a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Drug Cartels Use IT to Kill FBI Informants According to a newly published report, a Sinaloa cartel/El Chapo insider contacted the FBI in 2018 and told it of all the ways in which the cybercrook hired by the cartel helped it track down those who could give up key details about its operation and eliminate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I can’t say this enough. Supply chains are the weak spot and hackers know it and abuse it. Scattered Spider, the group responsible for attacks on US insurance firms Aflac, Philadelphia and Erie and British retailers like Marks & Spencer and others, uses supply chain attacks as their favorite method. After they use social engineering […]
Continue reading →
[DISPLAY_ACURAX_ICONS]