720-891-1663

SURPRISE: GPT-4 Can Exploit Unpatched Vulnerabilities

Who would have guessed? Researchers at the University of Illinois Urbana-Champaign (UIUC) fed AI agents vague descriptions of more than a dozen unpatched vulnerabilities. The agent they created with GPT-4 exploited 87 percent of those vulnerabilities. Fourteen other agents made with lesser tools like GPT 3.5 and Metasploit failed. The researchers said that GPT-4 was […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending April 19, 2024

Feds Give Another Chip Maker Subsidy to Build in US Last week the feds announced a subsidy to Taiwan Semi to build multiple chip plants (fabs) in Arizona. This week the feds announced, based on last year’s CHIPS Act, a subsidy to Samsung to build multiple plants in Texas. This creates a lot of construction […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Federal Cyber Safety Board Says Microsoft Security Culture is Inadequate

The cyber safety review board is similar to the FAA’s National Transportation Safety Board, except that they are investigating Cybersecurity crashes (breaches) rather than airplane or container ship crashes. The board is new. It was created by Executive Order 14028 in 2021. They only convene when requested to by the Secretary of Homeland Security and, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Update for the Week Ending April 12, 2024

Administration Announces Preliminary Agreement for New High Tech Chip Factories in Arizona As you may remember, during the pandemic the shortage of chips caused widespread product shortages for everything from phones to cars. Congress passed the CHIPS act to subsidize companies who manufactured chips in the U.S. at a higher cost rather than in less […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Defense Contractor Breach and National Security

The Department of Defense has been trying for ten years now to shore up the security of defense contractors but still has not gotten new regulations passed. Here is one example of why they are needed. Desparately. The breach against defense contractor Acuity, Inc. happened last month. The data was being sold for only $3,000 […]

Continue reading → [DISPLAY_ACURAX_ICONS]