Move fast and break things is Silicon Valley’s motto. Sam Altman (OpenAI) obliged. When OpenAI released Chat GPT-5 last week they thought they had a winner on their hands. As part of the release, OpenAI got rid of the option for users to pick the model that they wanted to use – GPT-5 knows better […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI Vendor Perplexity Accused of Scraping Websites That Explicitly Blocked AI Scraping Oops. Did they do that? They wouldn’t do that, would they? Cloudflare published research that says it actually saw Perplexity scraping sites while explicitly obscuring its identity in an attempt to circumvent the website’s preferences. To the tune of tens of thousands of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Drug Cartels Use IT to Kill FBI Informants According to a newly published report, a Sinaloa cartel/El Chapo insider contacted the FBI in 2018 and told it of all the ways in which the cybercrook hired by the cartel helped it track down those who could give up key details about its operation and eliminate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the Supreme Court saying that it it not invasive for web sites to collect your government ID to verify your age before letting you see their site, Google is trying a different, very interesting, tactic instead of requiring you to upload your government ID. The problems with web sites collecting your ID […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I can’t say this enough. Supply chains are the weak spot and hackers know it and abuse it. Scattered Spider, the group responsible for attacks on US insurance firms Aflac, Philadelphia and Erie and British retailers like Marks & Spencer and others, uses supply chain attacks as their favorite method. After they use social engineering […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI is Great – But Is It Secure? MCP (Model Context Protocol) servers are the backbone of agentic AI. But researchers say that authentication is optional and nearly all of the nearly 2,000 MCP servers exposed to the Internet today do not require authentication or have access controls. What could possibly go wrong? To test […]
Continue reading →
[DISPLAY_ACURAX_ICONS]