Normal view

There are new articles available, click to refresh the page.
Today — 1 June 2024Main stream

Not 'Quiet Quitting' - Remote Workers Try 'Quiet Vacationing'

1 June 2024 at 14:34
A new article in the Washington Post argues that a phenomenon called "Quiet vacationing" has "joined 'quiet quitting' and 'quiet firing' as the latest (and least poetic) scourge of the modern workplace. "Also known as the hush trip, workcation, hush-cation, or bleisure travel — you get the idea — quiet vacationing refers to workers taking time off, even traveling, without notifying their employers." Taking advantage of work-from-anywhere technology, they are logging in from hotels, beaches and campgrounds, sometimes using virtual backgrounds and VPNs to cover their tracks. Given the difficulty many employers already have trusting remote workers to be productive anywhere outside the office, you can bet they are not keen on the idea of their employees pretending to have their head in the game while their toes are in the sand. But employers also have legitimate legal reasons for keeping tabs on their employees' location when they're on the clock. "Evil HR Lady" Suzanne Lucas, writing in Inc. magazine, recently highlighted the many tax, employment, business-operation and security laws that focus on an employee's location. Workers secretly performing their jobs in other states or countries can trigger compliance headaches for their employers, Lucas notes, giving the hypothetical of an employee seeking workers' compensation after sustaining an injury while on unauthorized travel.... As with declines in birthrates, home purchases and demand for mined diamonds, the quiet-vacationing trend is being attributed primarily, though not exclusively, to millennial workers. But before launching into generational finger-pointing and stereotyping, it's worth taking a look at why they might feel the need to take their PTO on the DL. The U.S. Travel Association in a 2016 report proclaimed millennials to be a generation of "work martyrs," entering the workforce around the time average U.S. vacation usage began declining and mobile technology began enabling round-the-clock attachment to jobs... The work-vacation boundaries most premillennial workers took for granted growing up have gone the way of defined-benefit pensions and good tomatoes. Inadequate paid leave is another driving force. The United States continues to be the only nation among its industrialized economic peers that does not guarantee paid vacation, sick leave or holidays for all workers, leaving such benefits to the discretion of employers. Workers with limited PTO — whether new to the workforce or stuck in lower-paying, low-benefit industries — generally want to keep as much paid leave banked as possible, especially if they may need it for unpredictable emergencies like illness or caretaking. If you can preserve those precious hours by packing your laptop alongside your flip-flops, why wouldn't you? The article also mentions employers who begrudge vacation and employees who fear "becoming a target for future cost-cutting..."

Read more of this story at Slashdot.

Why Labour must adopt radical new tax policies | Colm Murphy and Patrick Diamond

The Brown-era adage ‘Prudence with a purpose’ could be the way to obtain the economic stability that has eluded every UK government since the 2008 financial crisis

Keir Starmer appears destined for Downing Street. Even so, as the election campaign rumbles on, his party will be challenged to articulate a compelling platform that secures not only the keys to Number 10 but also the economic stability that has eluded every UK government since the 2008 financial crisis. That will demand fiscal discipline delivered not only through a prudent approach to public spending but also fundamental reform of our tax system.

In headline policy, Labour is committed to fiscal rules on spending and debt. Rachel Reeves promises to move towards balanced current spending and to secure a falling debt-to-GDP ratio by the fifth year of the forecast. As her speech on Tuesday argues, Labour believes such rules will underpin “stability” and “growth”.

Continue reading...

💾

© Photograph: Murdo MacLeod/the Observer

💾

© Photograph: Murdo MacLeod/the Observer

How to turn leftover fruit into a multi-coloured sweet treat | Waste not

By: Tom Hunt
1 June 2024 at 01:00

This tutti frutti sorbet of anything you fancy will make your fruit bowl go further

We fill our fruit bowl on market day each week, and if any of it ripens too quickly, we simply cut it up and freeze it to give us a good pudding base on hand at all times. It’s best to lay the pieces of fruit flat on trays with space between them, so they don’t freeze into one solid block. Our daughter has a small bowl of frozen fruit for pudding most evenings, but when we’re feeling fancy, we blend it up into today’s soft-serve-like sorbet and top it with grated chocolate, coconut, seeds and/or nut butters. It’s best eaten immediately, or at least within a few hours of making, but it will keep in the freezer for up to six months. If it becomes hard and icy, cut it up, blend again until smooth, and freeze in an ice-cube tray for ease of use.

Discover this recipe and many more from your favourite cooks on the new Guardian Feast app, with smart features to make everyday cooking easier and more fun

Continue reading...

💾

© Photograph: Tom Hunt/The Guardian

💾

© Photograph: Tom Hunt/The Guardian

Yesterday — 31 May 2024Main stream

Journalists “deeply troubled” by OpenAI’s content deals with Vox, The Atlantic

31 May 2024 at 17:56
A man covered in newspaper.

Enlarge (credit: Getty Images)

On Wednesday, Axios broke the news that OpenAI had signed deals with The Atlantic and Vox Media that will allow the ChatGPT maker to license their editorial content to further train its language models. But some of the publications' writers—and the unions that represent them—were surprised by the announcements and aren't happy about it. Already, two unions have released statements expressing "alarm" and "concern."

"The unionized members of The Atlantic Editorial and Business and Technology units are deeply troubled by the opaque agreement The Atlantic has made with OpenAI," reads a statement from the Atlantic union. "And especially by management's complete lack of transparency about what the agreement entails and how it will affect our work."

The Vox Union—which represents The Verge, SB Nation, and Vulture, among other publications—reacted in similar fashion, writing in a statement, "Today, members of the Vox Media Union ... were informed without warning that Vox Media entered into a 'strategic content and product partnership' with OpenAI. As both journalists and workers, we have serious concerns about this partnership, which we believe could adversely impact members of our union, not to mention the well-documented ethical and environmental concerns surrounding the use of generative AI."

Read 9 remaining paragraphs | Comments

At the whim of 'brain one'

By: chavenet
31 May 2024 at 15:33
given the current discussions around ai and its impact on artistry and authorship, creating a film reliant on the technology is a controversial but inevitable move. however, the software that hustwit and dawes have built may just hit the sweet spot where human meets machine; where the algorithm works to respect the material and facilitate an artistic vision. from B–1 and the first generative feature film.

'eno' is the first documentary about the pioneering artist brian eno, and the first generative feature film. the narrative is structured at the whim of 'brain one', the proprietary generative software created by hustwit and digital artist, brendan dawes. using an algorithm trained on footage from eno's extensive archive and hustwit's interviews with eno, it pieces together a film that is unique at each viewing. as the order of scenes perpetually changes and what's included is never certain, the version you see is the only time that iteration will exist. "in some ways, the film is kind of like exploring the insides of his brain... it's different memories and ideas and experiences over the 50-year plus time frame." ENO Teaser: Australian Premiere of Brian Eno Film @ Vivid Sydney Opera House Sundance 2024: Generative AI Changes Brian Eno Documentary With Every View [Forbes] 'Eno' Review: A Compelling Portrait of Music Visionary Brian Eno Is Different Each Time You Watch It [Variety] 17-track Brian Eno compilation to accompany new doc [Uncut]

Fax Machines Permeate Germany's Business Culture. But Parliament is Ditching Them

By: msmash
31 May 2024 at 16:10
An anonymous reader shares a report: The sound of the 1990s still resonates in the German capital. Like techno music, the fax machine remains on trend. According to the latest figures from Germany's digital industry association, four out of five companies in Europe's largest economy continue to use fax machines and a third do so frequently or very frequently. Much as Germany's reputation for efficiency is regularly undermined by slow internet connections and a reliance on paper and rubber stamps, fax machines are at odds with a world embracing artificial intelligence. But progress is on the horizon in the Bundestag -- the lower house of parliament -- where lawmakers have been instructed by the parliamentary budget committee to ditch their trusty fax machines by the end of June, and rely on email instead for official communication. Torsten Herbst, parliamentary whip of the pro-business Free Democrats, points out one fax machine after the other as he walks through the Bundestag. He says the public sector is particularly fond of faxing and that joining parliament was like going back in time.

Read more of this story at Slashdot.

Google’s AI Overview is flawed by design, and a new company blog post hints at why

31 May 2024 at 15:47
A selection of Google mascot characters created by the company.

Enlarge / The Google "G" logo surrounded by whimsical characters, all of which look stunned and surprised. (credit: Google)

On Thursday, Google capped off a rough week of providing inaccurate and sometimes dangerous answers through its experimental AI Overview feature by authoring a follow-up blog post titled, "AI Overviews: About last week." In the post, attributed to Google VP Liz Reid, head of Google Search, the firm formally acknowledged issues with the feature and outlined steps taken to improve a system that appears flawed by design, even if it doesn't realize it is admitting it.

To recap, the AI Overview feature—which the company showed off at Google I/O a few weeks ago—aims to provide search users with summarized answers to questions by using an AI model integrated with Google's web ranking systems. Right now, it's an experimental feature that is not active for everyone, but when a participating user searches for a topic, they might see an AI-generated answer at the top of the results, pulled from highly ranked web content and summarized by an AI model.

While Google claims this approach is "highly effective" and on par with its Featured Snippets in terms of accuracy, the past week has seen numerous examples of the AI system generating bizarre, incorrect, or even potentially harmful responses, as we detailed in a recent feature where Ars reporter Kyle Orland replicated many of the unusual outputs.

Read 11 remaining paragraphs | Comments

Metasploit Weekly Wrap-Up 05/31/2024

31 May 2024 at 14:32

Quis dīrumpet ipsos dīrumpēs

Metasploit Weekly Wrap-Up 05/31/2024

In this release, we feature a double-double: two exploits each targeting two pieces of software. The first pair is from h00die targeting the Jasmine Ransomeware Web Server. The first uses CVE-2024-30851 to retrieve the login for the ransomware server, and the second is a directory traversal vulnerability allowing arbitrary file read. The second pair from Dave Yesland of Rhino Security targets Progress Flowmon with CVE-2024-2389 and it pairs well like wine with the additional and accompanying Privilege Escalation module.

New module content (4)

Jasmin Ransomware Web Server Unauthenticated Directory Traversal

Authors: chebuya and h00die
Type: Auxiliary
Pull request: #19103 contributed by h00die
Path: gather/jasmin_ransomware_dir_traversal
AttackerKB reference: CVE-2024-30851

Description: This adds an unauthenticated directory traversal and a SQLi exploit against the Jasmin ransomware web panel.

Jasmin Ransomware Web Server Unauthenticated SQL Injection

Authors: chebuya and h00die
Type: Auxiliary
Pull request: #19103 contributed by h00die
Path: gather/jasmin_ransomware_sqli

Description: This adds an unauthenticated directory traversal and a SQLi exploit against the Jasmin ransomware web panel.

Flowmon Unauthenticated Command Injection

Author: Dave Yesland with Rhino Security Labs
Type: Exploit
Pull request: #19150 contributed by DaveYesland
Path: linux/http/progress_flowmon_unauth_cmd_injection
AttackerKB reference: CVE-2024-2389

Description: Unauthenticated Command Injection Module for Progress Flowmon CVE-2024-2389.

Progress Flowmon Local sudo privilege escalation

Author: Dave Yesland with Rhino Security Labs
Type: Exploit
Pull request: #19151 contributed by DaveYesland
Path: linux/local/progress_flowmon_sudo_privesc_2024

Description: Privilege escalation module for Progress Flowmon unpatched feature.

Enhancements and features (3)

Bugs fixed (0)

None

Documentation

You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.

Get it

As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:

If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
commercial edition Metasploit Pro

Federal agency warns critical Linux vulnerability being actively exploited

31 May 2024 at 13:38
Federal agency warns critical Linux vulnerability being actively exploited

Enlarge (credit: Getty Images)

The US Cybersecurity and Infrastructure Security Agency has added a critical security bug in Linux to its list of vulnerabilities known to be actively exploited in the wild.

The vulnerability, tracked as CVE-2024-1086 and carrying a severity rating of 7.8 out of a possible 10, allows people who have already gained a foothold inside an affected system to escalate their system privileges. It’s the result of a use-after-free error, a class of vulnerability that occurs in software written in the C and C++ languages when a process continues to access a memory location after it has been freed or deallocated. Use-after-free vulnerabilities can result in remote code or privilege escalation.

The vulnerability, which affects Linux kernel versions 5.14 through 6.6, resides in the NF_tables, a kernel component enabling the Netfilter, which in turn facilitates a variety of network operations, including packet filtering, network address [and port] translation (NA[P]T), packet logging, userspace packet queueing, and other packet mangling. It was patched in January, but as the CISA advisory indicates, some production systems have yet to install it. At the time this Ars post went live, there were no known details about the active exploitation.

Read 4 remaining paragraphs | Comments

Cocktail of the week: Temper’s lychilli margarita – recipe | The good mixer

31 May 2024 at 11:00

The floral sweetness and chilli kick is ideal to sip when the sun (finally) comes out

Our customers’ fascination with spicy margaritas (hello, the picante!) was the inspiration for this, though we’ve made it a bit more accessible by adding the floral sweetness of lychee. Outside our range of classic margaritas, this has become our most popular drink and is a particular favourite out on the terraces when the sun finally shines.

Niko Bisha, group bar manager, Temper, London

Continue reading...

💾

© Photograph: Rob Lawson/The Guardian. Drinks stylist: Seb Davis.

💾

© Photograph: Rob Lawson/The Guardian. Drinks stylist: Seb Davis.

Before yesterdayMain stream

Tech giants form AI group to counter Nvidia with new interconnect standard

30 May 2024 at 16:42
Abstract image of data center with flowchart.

Enlarge (credit: Getty Images)

On Thursday, several major tech companies, including Google, Intel, Microsoft, Meta, AMD, Hewlett-Packard Enterprise, Cisco, and Broadcom, announced the formation of the Ultra Accelerator Link (UALink) Promoter Group to develop a new interconnect standard for AI accelerator chips in data centers. The group aims to create an alternative to Nvidia's proprietary NVLink interconnect technology, which links together multiple servers that power today's AI applications like ChatGPT.

The beating heart of AI these days lies in GPUs, which can perform massive numbers of matrix multiplications—necessary for running neural network architecture—in parallel. But one GPU often isn't enough for complex AI systems. NVLink can connect multiple AI accelerator chips within a server or across multiple servers. These interconnects enable faster data transfer and communication between the accelerators, allowing them to work together more efficiently on complex tasks like training large AI models.

This linkage is a key part of any modern AI data center system, and whoever controls the link standard can effectively dictate which hardware the tech companies will use. Along those lines, the UALink group seeks to establish an open standard that allows multiple companies to contribute and develop AI hardware advancements instead of being locked into Nvidia's proprietary ecosystem. This approach is similar to other open standards, such as Compute Express Link (CXL)—created by Intel in 2019—which provides high-speed, high-capacity connections between CPUs and devices or memory in data centers.

Read 5 remaining paragraphs | Comments

Law enforcement operation takes aim at an often-overlooked cybercrime linchpin

30 May 2024 at 15:41
Law enforcement operation takes aim at an often-overlooked cybercrime linchpin

Enlarge (credit: Getty Images)

An international cast of law enforcement agencies has struck a blow at a cybercrime linchpin that’s as obscure as it is instrumental in the mass-infection of devices: so-called droppers, the sneaky software that’s used to install ransomware, spyware, and all manner of other malware.

Europol said Wednesday it made four arrests, took down 100 servers, and seized 2,000 domain names that were facilitating six of the best-known droppers. Officials also added eight fugitives linked to the enterprises to Europe’s Most Wanted list. The droppers named by Europol are IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee, and Trickbot.

Droppers provide two specialized functions. First, they use encryption, code-obfuscation, and similar techniques to cloak malicious code inside a packer or other form of container. These containers are then put into email attachments, malicious websites, or alongside legitimate software available through malicious web ads. Second, the malware droppers serve as specialized botnets that facilitate the installation of additional malware.

Read 9 remaining paragraphs | Comments

Framework Boosts Its 13-inch Laptop With New CPUs, Lower Prices, and Better Screens

By: msmash
30 May 2024 at 16:45
Framework, a company known for its modular laptops, has announced a fourth round of iterative updates and upgrade options for its Framework Laptop 13. The upgrades include motherboards and pre-built laptops featuring new Intel Meteor Lake Core Ultra processors with Intel Arc dedicated GPUs, lower prices for AMD Ryzen 7000 and 13th-gen Intel editions, and a new display with a higher resolution and refresh rate. The Core Ultra boards come with three CPU options, with prices starting at $899 for a pre-built or DIY model. Upgrading from an older Intel Framework board requires an upgrade to DDR5 RAM, and Framework charges $40 for every 8GB of DDR5-5600, which is above market rates. The new 13.5-inch display has a resolution of 2880x1920, a 120 Hz refresh rate, and costs $130 more than the standard display.

Read more of this story at Slashdot.

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span

30 May 2024 at 10:00
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span

Enlarge (credit: Getty Images)

One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

“The routers now just sit there with a steady red light on the front,” one user wrote, referring to the ActionTec T3200 router models Windstream provided to both them and a next door neighbor. “They won't even respond to a RESET.”

In the messages—which appeared over a few days beginning on October 25—many Windstream users blamed the ISP for the mass bricking. They said it was the result of the company pushing updates that poisoned the devices. Windstream’s Kinetic broadband service has about 1.6 million subscribers in 18 states, including Iowa, Alabama, Arkansas, Georgia, and Kentucky. For many customers, Kinetic provides an essential link to the outside world.

Read 17 remaining paragraphs | Comments

‘Operation Endgame’ Hits Malware Delivery Platforms

30 May 2024 at 11:19

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed “the largest ever operation against botnets,” the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware “droppers” or “loaders” like IcedID, Smokeloader and Trickbot.

A frame from one of three animated videos released today in connection with Operation Endgame.

Operation Endgame targets the cybercrime ecosystem supporting droppers/loaders, slang terms used to describe tiny, custom-made programs designed to surreptitiously install malware onto a target system. Droppers are typically used in the initial stages of a breach, and they allow cybercriminals to bypass security measures and deploy additional harmful programs, including viruses, ransomware, or spyware.

Droppers like IcedID are most often deployed through email attachments, hacked websites, or bundled with legitimate software. For example, cybercriminals have long used paid ads on Google to trick people into installing malware disguised as popular free software, such as Microsoft Teams, Adobe Reader and Discord. In those cases, the dropper is the hidden component bundled with the legitimate software that quietly loads malware onto the user’s system.

Droppers remain such a critical, human-intensive component of nearly all major cybercrime enterprises that the most popular have turned into full-fledged cybercrime services of their own. By targeting the individuals who develop and maintain dropper services and their supporting infrastructure, authorities are hoping to disrupt multiple cybercriminal operations simultaneously.

According to a statement from the European police agency Europol, between May 27 and May 29, 2024 authorities arrested four suspects (one in Armenia and three in Ukraine), and disrupted or took down more than 100 Internet servers in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom, United States and Ukraine. Authorities say they also seized more than 2,000 domain names that supported dropper infrastructure online.

In addition, Europol released information on eight fugitives suspected of involvement in dropper services and who are wanted by Germany; their names and photos were added to Europol’s “Most Wanted” list on 30 May 2024.

A “wanted” poster including the names and photos of eight suspects wanted by Germany and now on Europol’s “Most Wanted” list.

“It has been discovered through the investigations so far that one of the main suspects has earned at least EUR 69 million in cryptocurrency by renting out criminal infrastructure sites to deploy ransomware,” Europol wrote. “The suspect’s transactions are constantly being monitored and legal permission to seize these assets upon future actions has already been obtained.”

There have been numerous such coordinated malware takedown efforts in the past, and yet often the substantial amount of coordination required between law enforcement agencies and cybersecurity firms involved is not sustained after the initial disruption and/or arrests.

But a new website erected to detail today’s action — operation-endgame.com — makes the case that this time is different, and that more takedowns and arrests are coming. “Operation Endgame does not end today,” the site promises. “New actions will be announced on this website.”

A message on operation-endgame.com promises more law enforcement and disruption actions.

Perhaps in recognition that many of today’s top cybercriminals reside in countries that are effectively beyond the reach of international law enforcement, actions like Operation Endgame seem increasingly focused on mind games — i.e., trolling the hackers.

Writing in this month’s issue of Wired, Matt Burgess makes the case that Western law enforcement officials have turned to psychological measures as an added way to slow down Russian hackers and cut to the heart of the sweeping cybercrime ecosystem.

“These nascent psyops include efforts to erode the limited trust the criminals have in each other, driving subtle wedges between fragile hacker egos, and sending offenders personalized messages showing they’re being watched,” Burgess wrote.

When authorities in the U.S. and U.K. announced in February 2024 that they’d infiltrated and seized the infrastructure used by the infamous LockBit ransomware gang, they borrowed the existing design of LockBit’s victim shaming website to link instead to press releases about the takedown, and included a countdown timer that was eventually replaced with the personal details of LockBit’s alleged leader.

The feds used the existing design on LockBit’s victim shaming website to feature press releases and free decryption tools.

The Operation Endgame website also includes a countdown timer, which serves to tease the release of several animated videos that mimic the same sort of flashy, short advertisements that established cybercriminals often produce to promote their services online. At least two of the videos include a substantial amount of text written in Russian.

The coordinated takedown comes on the heels of another law enforcement action this week against what the director of the FBI called “likely the world’s largest botnet ever.” On Wednesday U.S. Department of Justice (DOJ) announced the arrest of YunHe Wang, the alleged operator of the ten-year-old online anonymity service 911 S5. The government also seized 911 S5’s domains and online infrastructure, which allegedly turned computers running various “free VPN” products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime.

Benjamina Ebuehi’s recipe for passion fruit and ginger tart | The sweet spot

30 May 2024 at 08:00

The smooth filling hits all the zingy high notes and is a gorgeous contrast to the crunchy base

If you like key lime pie, you’ll like this. It hits the same notes, but is even more fragrant and fruity, thanks to all the passion fruit, lime and the crunchy ginger biscuit base. Condensed milk is one of the best things that comes in a tin and I welcome any opportunity to use it. Incorporating it into the filling helps this tart bake much faster than a traditional custard, and brings a delightfully creamy, silky texture.

Discover this recipe and many more from your favourite cooks in the new Guardian Feast app, with smart features to make everyday cooking easier and more fun

Continue reading...

💾

© Photograph: The Guardian. Food styling: Benjamina Ebuehi. Prop styling: Anna Wilkins. Food styling assistant: Lara Cook.

💾

© Photograph: The Guardian. Food styling: Benjamina Ebuehi. Prop styling: Anna Wilkins. Food styling assistant: Lara Cook.

Eurozone unemployment falls to record low; UK businesses push for closer relations with EU – business live

30 May 2024 at 06:27

BCC calls for improved relations with the EU to cut the costs for business, while sticky inflation worries markets

Those IT problems at TSB appear to be solved!

A TSB spokesperson tells us:

“We’re aware some customers had issues logging into our app and online banking this morning. This issue is now resolved and we’re sorry for any inconvenience it caused.”

Continue reading...

💾

© Photograph: Terry Mathews/Alamy

💾

© Photograph: Terry Mathews/Alamy

EU keen to deepen ties with a Labour PM but will not offer radical concessions

30 May 2024 at 01:00

UK relationship ‘isn’t taking up as much of our mental space as it was a few years ago’, says EU diplomat

Since 2016, Britain’s Conservatives have compared the European Union to Nazi Germany, the Soviet Union, described a senior EU official’s remarks as “bizarre and stupid” and threatened to break international law with a unilateral rewrite of the Brexit deal. So an incoming Labour government does not have to do much to strike a different tone.

But while the EU is ready to deepen ties with a future Labour government – widely assumed to take office after 4 July – it will not offer radical concessions to Keir Starmer. EU sources, already welcoming warmer relations under Rishi Sunak, are looking cautiously at the changing political weather across the Channel.

Continue reading...

💾

© Photograph: Andy Rain/EPA

💾

© Photograph: Andy Rain/EPA

Used Teslas are getting very cheap, but buying one can be risky

29 May 2024 at 14:48
A white Tesla Model 3 in slightly used condition

Enlarge / Used Tesla Model 3s can be had for less than $20,000 now. (credit: Getty Images)

The launch of a new electric vehicle these days is invariably met with a chorus of "this car is too expensive"—and rightfully so. But for used EVs, it's quite another story, particularly used Teslas, thanks to a glut of former fleet and rental cars that are now ready for their second owner.

"Due to a variety of reasons, Tesla resale values have plummeted, making many Tesla models very affordable now. Plus, for some consumers, an additional $4,000 Federal tax credit on used EVs may apply, sweetening the deal even further. Buying a used Tesla can be a great deal for the savvy shopper, but there are significant things to look out for," says Ed Kim, president and chief analyst at AutoPacific.

Indeed, a quick search on the topic easily reveals some horror stories of ex-rental Teslas, so here are some things to consider if you're in search of a cheap Model 3 or Model Y.

Read 12 remaining paragraphs | Comments

OpenAI board first learned about ChatGPT from Twitter, according to former member

29 May 2024 at 11:54
Helen Toner, former OpenAI board member, speaks onstage during Vox Media's 2023 Code Conference at The Ritz-Carlton, Laguna Niguel on September 27, 2023.

Enlarge / Helen Toner, former OpenAI board member, speaks during Vox Media's 2023 Code Conference at The Ritz-Carlton, Laguna Niguel on September 27, 2023. (credit: Getty Images)

In a recent interview on "The Ted AI Show" podcast, former OpenAI board member Helen Toner said the OpenAI board was unaware of the existence of ChatGPT until they saw it on Twitter. She also revealed details about the company's internal dynamics and the events surrounding CEO Sam Altman's surprise firing and subsequent rehiring last November.

OpenAI released ChatGPT publicly on November 30, 2022, and its massive surprise popularity set OpenAI on a new trajectory, shifting focus from being an AI research lab to a more consumer-facing tech company.

"When ChatGPT came out in November 2022, the board was not informed in advance about that. We learned about ChatGPT on Twitter," Toner said on the podcast.

Read 8 remaining paragraphs | Comments

Researchers crack 11-year-old password, recover $3 million in bitcoin

By: WIRED
29 May 2024 at 11:42
Illustration of a wallet

Enlarge (credit: Flavio Coelho/Getty Images)

Two years ago when “Michael,” an owner of cryptocurrency, contacted Joe Grand to help recover access to about $2 million worth of bitcoin he stored in encrypted format on his computer, Grand turned him down.

Michael, who is based in Europe and asked to remain anonymous, stored the cryptocurrency in a password-protected digital wallet. He generated a password using the RoboForm password manager and stored that password in a file encrypted with a tool called TrueCrypt. At some point, that file got corrupted, and Michael lost access to the 20-character password he had generated to secure his 43.6 BTC (worth a total of about 4,000 euros, or $5,300, in 2013). Michael used the RoboForm password manager to generate the password but did not store it in his manager. He worried that someone would hack his computer and obtain the password.

“At [that] time, I was really paranoid with my security,” he laughs.

Read 26 remaining paragraphs | Comments

Families of Uvalde shooting victims sue Activision over Call of Duty’s role

29 May 2024 at 10:55
Is this an aspirational image for mass shooters?

Enlarge / Is this an aspirational image for mass shooters? (credit: Activision)

The families of multiple victims of the 2022 mass shooting at Uvalde's Robb Elementary School are suing Activision in a California civil court, alleging that the company's Call of Duty games act as a "training camp for mass shooters."

The lawsuit (as obtained by Polygon) compares Activision's Call of Duty marketing to the cigarette industry's use of now-barred spokescartoon Joe Camel, putting the gaming company "in the wildly lucrative business of training adolescents to become gunmen." The Call of Duty games "are chewing up alienated teenage boys and spitting out mass shooters," the lawsuit alleges, and in Uvalde, the games "knowingly exposed the Shooter to the weapon, conditioned him to see it as the solution to his problems, and trained him how to use it."

Meta platforms is also a party to the lawsuit for "explicit, aggressive marketing" of firearms to minors via Instagram.

Read 13 remaining paragraphs | Comments

Orange-juice makers consider using other fruits after prices go ‘bananas’

29 May 2024 at 09:48

Global industry ‘in crisis’ as fears about Brazilian harvest help push wholesale prices to record highs

Orange juice makers are considering turning to alternative fruits such as mandarins as wholesale prices have “gone bananas” amid fears of poor harvests in Brazil.

Prices of orange juice reached a new high of $4.95 (£3.88) a lb on commodity markets this week after growers in the main orange producing areas of Brazil said they were expecting the harvest to be 24% down on last year at 232m 40.8kg boxes – worse than the 15% fall previously predicted.

Continue reading...

💾

© Photograph: Paulo Whitaker/REUTERS

💾

© Photograph: Paulo Whitaker/REUTERS

US sanctions operators of “free VPN” that routed crime traffic through user PCs

28 May 2024 at 19:28
US sanctions operators of “free VPN” that routed crime traffic through user PCs

Enlarge (credit: Getty Images)

The US Treasury Department has sanctioned three Chinese nationals for their involvement in a VPN-powered botnet with more than 19 million residential IP addresses they rented out to cybercriminals to obfuscate their illegal activities, including COVID-19 aid scams and bomb threats.

The criminal enterprise, the Treasury Department said Tuesday, was a residential proxy service known as 911 S5. Such services provide a bank of IP addresses belonging to everyday home users for customers to route Internet connections through. When accessing a website or other Internet service, the connection appears to originate with the home user.

In 2022, researchers at the University of Sherbrooke profiled 911[.]re, a service that appears to be an earlier version of 911 S5. At the time, its infrastructure comprised 120,000 residential IP addresses. This pool was created using one of two free VPNs—MaskVPN and DewVPN—marketed to end users. Besides acting as a legitimate VPN, the software also operated as a botnet that covertly turned users’ devices into a proxy server. The complex structure was designed with the intent of making the botnet hard to reverse engineer.

Read 9 remaining paragraphs | Comments

OpenAI training its next major AI model, forms new safety committee

28 May 2024 at 12:05
A man rolling a boulder up a hill.

Enlarge (credit: Getty Images)

On Monday, OpenAI announced the formation of a new "Safety and Security Committee" to oversee risk management for its projects and operations. The announcement comes as the company says it has "recently begun" training its next frontier model, which it expects to bring the company closer to its goal of achieving artificial general intelligence (AGI), though some critics say AGI is farther off than we might think. It also comes as a reaction to two weeks of public setbacks for the company.

Whether the aforementioned new frontier model is intended to be GPT-5 or a step beyond that is currently unknown. In the AI industry, "frontier model" is a term for a new AI system designed to push the boundaries of current capabilities. And "AGI" refers to a hypothetical AI system with human-level abilities to perform novel, general tasks beyond its training data (unlike narrow AI, which is trained for specific tasks).

Meanwhile, the new Safety and Security Committee, led by OpenAI directors Bret Taylor (chair), Adam D'Angelo, Nicole Seligman, and Sam Altman (CEO), will be responsible for making recommendations about AI safety to the full company board of directors. In this case, "safety" partially means the usual "we won't let the AI go rogue and take over the world," but it also includes a broader set of "processes and safeguards" that the company spelled out in a May 21 safety update related to alignment research, protecting children, upholding election integrity, assessing societal impacts, and implementing security measures.

Read 5 remaining paragraphs | Comments

Microsoft WordPad: 1995-2024

28 May 2024 at 10:14
Originally introduced as a feature of Windows 95, the RTF-compatabile word processor Microsoft WordPad will be removed in the version 24H2 release of Windows 11, due later this year. The app will be missed, along with AI agent Cortana and help directory Tips, but will be survived by its older sibling, Microsoft NotePad.

Honey & Co’s recipe for air fryer apple and cinnamon ‘pan’ cake

Baking in an air fryer may require a rethinking of tradition, but the result is comforting, gooey sweetness

When it comes to baking, people usually rely on recipes. Many cakes are made on autopilot in this way, but using an air fryer has taken us back to basics. Today’s recipe, which is somewhere between a pudding and a cake, has been a good exercise in getting to grips with our new gadget, checking in regularly as it cooks to understand how the air fryer works as a tool for baking. The result is delicious!

Discover this recipe and many more from your favourite cooks in the new Guardian Feast app, with smart features to make everyday cooking easier and more fun

Continue reading...

💾

© Photograph: Louise Hagger/The Guardian. Food styling: Emily Kydd. Prop styling: Eden Owen-Jones.

💾

© Photograph: Louise Hagger/The Guardian. Food styling: Emily Kydd. Prop styling: Eden Owen-Jones.

Ignoring Brexit will make election most dishonest in modern times – Heseltine

27 May 2024 at 05:48

Former deputy prime minister says discussion of Europe ‘no-go area’ for Labour and Conservatives

The election campaign will be the “most dishonest in modern times” because both main parties refuse to debate the consequences of Brexit, a former Tory deputy prime minister has said.

Michael Heseltine, who was deputy prime minister from 1995 to 1997 and a senior figure in Margaret Thatcher’s cabinet, said no key problem affecting the country can be “honestly addressed” without considering the impact of leaving the EU.

Continue reading...

💾

© Photograph: Christopher Thomond/The Guardian

💾

© Photograph: Christopher Thomond/The Guardian

LockBit Publishes Data Stolen in London Drugs Attack – Source: www.govinfosecurity.com

lockbit-publishes-data-stolen-in-london-drugs-attack-–-source:-wwwgovinfosecurity.com

Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Governance & Risk Management , Healthcare Canadian Retail Pharmacy Chain Says It’s Reviewing Exposed Data on Gang’s Leak Site Marianne Kolbasuk McGee (HealthInfoSec) • May 24, 2024     Image: London Drugs As promised, LockBit has begun to leak on its dark web site files […]

La entrada LockBit Publishes Data Stolen in London Drugs Attack – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Farewell, Michael Gove: from Brexit to levelling up, you sowed the seeds for this Conservative crisis | John Harris

26 May 2024 at 08:17

The Tory puppet master is leaving behind a febrile party flying ever further towards the fringes of our politics

To instantly understand what this election means for the Conservative party, look no further than the departing Tory politician who has been centrally involved in most of the lurches, victories and meltdowns of the past 14 years. A lot of Michael Gove’s record is bound up with the David Cameron years, and a retrogressive transformation in English education that is still rippling through our schools. But as he exits frontline politics, the most relevant stories are about his support for Brexit, leaning in to brazen populism, and overseeing the non-policy of levelling up. In all those things lie the biggest reasons for the ruling party’s deepening crisis – and, poetically enough, why the Liberal Democrats fancy their chances in Surrey Heath, the constituency Gove is leaving behind.

Like so many of his colleagues, Gove must be acutely aware of the Conservatives’ dire predicament. The election has been called because they no longer have any kind of governing project. Their internal affairs remain febrile and poisonous. And when polling stations and ballot papers come into view, their biggest problem is likely to be revealed with a new clarity: a coalition of support that has long since sprouted cracks and fissures, but now looks like it is turning into rubble.

Continue reading...

💾

© Photograph: Henry Nicholls/AFP/Getty Images

💾

© Photograph: Henry Nicholls/AFP/Getty Images

Once Britain is back in the EU, things can only get better | William Keegan

26 May 2024 at 02:00

Both major parties will try to conduct their campaigns without mentioning Brexit. But we cannot afford not to discuss it

‘Things can only get better” was a Labour party slogan before the 1997 general election. The reason why Rishi Sunak has surprised the nation, and what my old colleague Alan Watkins used to call the “chattering classes”, by calling for a snap election is that Sunak and his chancellor, Jeremy Hunt, have apparently decided that things can only get worse.

With low inflation figures – at last – and the possibility of a cut in interest rates, the two of them have been talking the economy up as though there were no tomorrow.

Continue reading...

💾

© Photograph: Andy Buchanan/AFP/Getty Images

💾

© Photograph: Andy Buchanan/AFP/Getty Images

World’s largest food awards move judging panel from UK to Ireland to avoid Brexit red tape

26 May 2024 at 01:00

Due to new import controls, a judging session for the Great Taste awards is being held outside the UK for the first time in 30 years

The Great Taste awards are a British success story – the world’s largest food awards, celebrating the best products on the planet. But new post-Brexit import controls have forced the organisers to hold a judging panel outside the UK for the first time in the awards’ 30-year history.

On Sunday, judges from the Guild of Fine Foods panel will travel to County Tipperary in Ireland to spend three days tasting products that have become much harder to bring to the UK.

Continue reading...

💾

© Photograph: @woodcocksmokery/instagram

💾

© Photograph: @woodcocksmokery/instagram

Brexit staff shortages scupper plans to reopen Clarence House to the public

Palace officials have struggled to find the workers needed to open the doors at the king’s London home this summer

Even the monarchy is not immune to Brexit. The king’s London home, Clarence House, will be closed to tourists this summer because of staff shortages in the royal household caused by Brexit and the pandemic.

Palace officials had hoped to open this summer, along with another royal retreat, Frogmore House, where Prince Harry and Meghan had their evening wedding reception. But the Royal Collection Trust, the department of the royal household that oversees tourist visits to the palaces, has struggled to find people willing to work in front-of-house, retail, catering and other jobs.

Continue reading...

💾

© Photograph: Bloomberg/Getty Images

💾

© Photograph: Bloomberg/Getty Images

Newly discovered ransomware uses BitLocker to encrypt victim data

24 May 2024 at 18:06
Stock photo of ransom note with letters cut out of newspapers and magazines.

Enlarge (credit: Getty Images)

A previously unknown piece of ransomware, dubbed ShrinkLocker, encrypts victim data using the BitLocker feature built into the Windows operating system.

BitLocker is a full-volume encryptor that debuted in 2007 with the release of Windows Vista. Users employ it to encrypt entire hard drives to prevent people from reading or modifying data in the event they get physical access to the disk. Starting with the rollout of Windows 10, BitLocker by default has used the 128-bit and 256-bit XTS-AES encryption algorithm, giving the feature extra protection from attacks that rely on manipulating cipher text to cause predictable changes in plain text.

Recently, researchers from security firm Kaspersky found a threat actor using BitLocker to encrypt data on systems located in Mexico, Indonesia, and Jordan. The researchers named the new ransomware ShrinkLocker, both for its use of BitLocker and because it shrinks the size of each non-boot partition by 100 MB and splits the newly unallocated space into new primary partitions of the same size.

Read 10 remaining paragraphs | Comments

Make this the punishment election – damning the Tories for 14 years of cruelty and lies | Jonathan Freedland

24 May 2024 at 11:38

Voters want progress, but there must also be accountability. When you pick up a ballot paper, remember all the waste and incompetence

Elections are a choice about the future, they say. We should look forward, not back, they say. And most of the time, that’s true. But every now and then we should make an exception – and this is one of those times. Because the coming general election must also be about the past. It must be about holding the Conservatives to account for the colossal damage they have done to this country over the past 14 years. It must be a punishment election.

The Tories need to face the consequences of what they have done, starting with the cold fact that they have made people poorer. People are worse off now than they were at the last general election, a feat with little or no precedent. Every day, thousands of Britons pay hundreds or thousands more on their mortgages, thanks to the wrecking ball a smirking Liz Truss aimed at the UK economy.

Continue reading...

💾

© Illustration: Guardian Design; Samir Hussein/WireImage; Peter Nicholls/Getty Images; Roy Rochlin/Getty Images; Leon Neal/Getty Images

💾

© Illustration: Guardian Design; Samir Hussein/WireImage; Peter Nicholls/Getty Images; Roy Rochlin/Getty Images; Leon Neal/Getty Images

A House Falls On The NCAA

24 May 2024 at 11:20
Facing the potential of a ruinous $20B decision against them in the House v. NCAA antitrust lawsuit, the NCAA and the major conferences are coming to a settlement that will see college athletes recieve revenue sharing, as well as former athletes being eligible to recieve damages for payments wrongly withheld.

This is a culmination of over a decade of litigation over the antitrust violations in college athletics, starting with O'Bannon establishing that players' NIL rights had value, followed by the Alston ruling definitively laying out that the NCAA did not have an antitrust exemption, opening the door for the House class action lawsuit - and the way the NCAA's arguments went over like lead balloons at those hearings has pushed them to the settlement table. Further emphasizing the losses in courts of law are the two injunctions the NCAA has had placed on their policies: first, they were enjoined over limiting transfers through the transfer portal, then an attempt to sanction Tennessee over NIL payments resulted in the Tennessee and Virginia AGs suing, resulting in an injunction on the NCAA's NIL rules. In addition, Dartmouth men's basketball players won a major win for labor with the regional NLRB ruling that they are in fact employees, leading them to pursue unionization, which the school is fighting. In addition (and likely to the death of OJ Simpson bringing new scrutiny to the decision) the Heisman Trust has reinstated Reggie Bush as the 2005 Heisman winner, further weakening the NCAA's position. It is in that context that the NCAA is coming to the negotiating table - having lost over and over, they are staring down a loss that would end the organization. And there's still a chance the cart gets upset - while the lion's share of the damages are due to the behavior of the major conferences, it's the non-majors who are being told to pay the majority of the settlement, which they are pushing back on.

ciao

By: Rhaomi
24 May 2024 at 08:00
窓からは柔らかな光が射し込み、
[Soft light streamed through the window]
窓の外では鳥たちが歌う美しい朝に、
[Outside, birds were singing on a beautiful morning]
私に撫でられながら眠るようにそっと逝きました。
[As I petted her, she passed away gently, as if falling asleep]
長い間かぼちゃんを愛して下さったみなさま、本当にありがとうございました。
[To everyone who has loved Kabo-chan for a long time, thank you very much]
かぼちゃんは世界一幸せな犬だったと思います。そして私は世界一幸せな飼い主でした。
[I believe Kabo-chan was the happiest dog in the world, and I was the happiest owner]
Kabosu, the beloved Shiba-Inu behind the globally popular Doge meme, has passed away peacefully at home today at the age of 18.

This sweet girl, abandoned by a shuttered puppy mill, had ended up in a kill shelter before being rescued and nursed back to health by kindergarten teacher Atsuko Sato in 2008. She was named "Kabosu" after the round fruit that her furry head resembled. Photos of a wary Kabo-chan from Sato's blog formed the basis for the popular Doge meme circa 2013, which spread into a whole series of Shiba-centric lore, the mascot of an ironic cryptocurrency, and even got her a lovely statue (and a manhole cover) in her hometime prefecture of Sakura. Sato gamely documented Kabo-chan's charmed life (and her feline friends) on her blog and YouTube channel; a brush with leukemia and liver disease in 2022 (previously) elicited a wave of support and love from around the world, and she soon made a "miraculous" recovery and lived happily and well for another 18 months. For locals, a farewell gathering is planned for Sunday, May 26th, from 1-4pm at dog-friendly hangout spot of Kaori Flowers in Narita, with a larger event planned for the beautiful Sakura Furusato Plaza when the weather cools later in the year. Sato's obit post closes:
かぼちゃんは今もまだにこにこ笑ってシッポを振って [Kabo-chan is still smiling happily and wagging her tail] 私に寄り添ってくれていると思います。きっとこれからもずっと [I believe she is still staying close to me. Surely, from now on and forever.]

Ravneet Gill’s recipe for self-saucing elderflower and lemon pudding | The sweet spot

24 May 2024 at 10:00

Fluffy, moreish, teasingly sharp, crusty brown on top and bubbling at the edges …

Self-saucing puddings are magic, and we should all have a recipe up our sleeve. The transformation from a soggy batter (in which it is hard to see the potential) to a fluffy, moreish pudding is something to behold. I have made many iterations of them in my time – some with dates and ricotta, others with apple and toffee,chocolate fudge and beyond. This one, with elderflower and lemon, is for citrus fans. It is wonderfully sharp, and can be put together at a moment’s notice.

Discover this recipe and many more from your favourite cooks on the new Guardian Feast app, with smart features to make everyday cooking easier and more fun

Continue reading...

💾

© Photograph: The Guardian. Food styling: Benjamina Ebuehi. Prop styling: Anna Wilkins. Food styling assistant: Lara Cook.

💾

© Photograph: The Guardian. Food styling: Benjamina Ebuehi. Prop styling: Anna Wilkins. Food styling assistant: Lara Cook.

Google’s “AI Overview” can give false, misleading, and dangerous answers

24 May 2024 at 07:00
This is fine.

Enlarge / This is fine. (credit: Getty Images)

If you use Google regularly, you may have noticed the company's new AI Overviews providing summarized answers to some of your questions in recent days. If you use social media regularly, you may have come across many examples of those AI Overviews being hilariously or even dangerously wrong.

Factual errors can pop up in existing LLM chatbots as well, of course. But the potential damage that can be caused by AI inaccuracy gets multiplied when those errors appear atop the ultra-valuable web real estate of the Google search results page.

"The examples we've seen are generally very uncommon queries and aren’t representative of most people’s experiences," a Google spokesperson told Ars. "The vast majority of AI Overviews provide high quality information, with links to dig deeper on the web."

Read 18 remaining paragraphs | Comments

Stark Industries Solutions: An Iron Hammer in the Cloud – Source: krebsonsecurity.com

stark-industries-solutions:-an-iron-hammer-in-the-cloud-–-source:-krebsonsecurity.com

Source: krebsonsecurity.com – Author: BrianKrebs The homepage of Stark Industries Solutions. Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into […]

La entrada Stark Industries Solutions: An Iron Hammer in the Cloud – Source: krebsonsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Crooks plant backdoor in software used by courtrooms around the world

23 May 2024 at 18:46
Crooks plant backdoor in software used by courtrooms around the world

Enlarge (credit: JAVS)

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack.

The software, known as the JAVS Viewer 8, is a component of the JAVS Suite 8, an application package courtrooms use to record, play back, and manage audio and video from proceedings. Its maker, Louisville, Kentucky-based Justice AV Solutions, says its products are used in more than 10,000 courtrooms throughout the US and 11 other countries. The company has been in business for 35 years.

JAVS Viewer users at high risk

Researchers from security firm Rapid7 reported that a version of the JAVS Viewer 8 available for download on javs.com contained a backdoor that gave an unknown threat actor persistent access to infected devices. The malicious download, planted inside an executable file that installs the JAVS Viewer version 8.3.7, was available no later than April 1, when a post on X (formerly Twitter) reported it. It’s unclear when the backdoored version was removed from the company’s download page. JAVS representatives didn’t immediately respond to questions sent by email.

Read 10 remaining paragraphs | Comments

Leaked Contract Shows Samsung Forces Repair Shop To Snitch On Customers

By: msmash
23 May 2024 at 20:02
Speaking of Samsung, samleecole shares a report about the contract the South Korean firm requires repair shops to sign: In exchange for selling them repair parts, Samsung requires independent repair shops to give Samsung the name, contact information, phone identifier, and customer complaint details of everyone who gets their phone repaired at these shops, according to a contract obtained by 404 Media. Stunningly, it also requires these nominally independent shops to "immediately disassemble" any phones that customers have brought them that have been previously repaired with aftermarket or third-party parts and to "immediately notify" Samsung that the customer has used third-party parts. "Company shall immediately disassemble all products that are created or assembled out of, comprised of, or that contain any Service Parts not purchased from Samsung," a section of the agreement reads. "And shall immediately notify Samsung in writing of the details and circumstances of any unauthorized use or misappropriation of any Service Part for any purpose other than pursuant to this Agreement. Samsung may terminate this Agreement if these terms are violated."

Read more of this story at Slashdot.

Stark Industries Solutions: An Iron Hammer in the Cloud

23 May 2024 at 19:32

The homepage of Stark Industries Solutions.

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

At least a dozen patriotic Russian hacking groups have been launching DDoS attacks since the start of the war at a variety of targets seen as opposed to Moscow. But by all accounts, few attacks from those gangs have come close to the amount of firepower wielded by a pro-Russia group calling itself “NoName057(16).”

This graphic comes from a recent report from NETSCOUT about DDoS attacks from Russian hacktivist groups.

As detailed by researchers at Radware, NoName has effectively gamified DDoS attacks, recruiting hacktivists via its Telegram channel and offering to pay people who agree to install a piece of software called DDoSia. That program allows NoName to commandeer the host computers and their Internet connections in coordinated DDoS campaigns, and DDoSia users with the most attacks can win cash prizes.

The NoName DDoS group advertising on Telegram. Image: SentinelOne.com.

A report from the security firm Team Cymru found the DDoS attack infrastructure used in NoName campaigns is assigned to two interlinked hosting providers: MIRhosting and Stark Industries. MIRhosting is a hosting provider founded in The Netherlands in 2004. But Stark Industries Solutions Ltd was incorporated on February 10, 2022, just two weeks before the Russian invasion of Ukraine.

PROXY WARS

Security experts say that not long after the war started, Stark began hosting dozens of proxy services and free virtual private networking (VPN) services, which are designed to help users shield their Internet usage and location from prying eyes.

Proxy providers allow users to route their Internet and Web browsing traffic through someone else’s computer. From a website’s perspective, the traffic from a proxy network user appears to originate from the rented IP address, not from the proxy service customer.

These services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence — but they are also massively abused for hiding cybercrime activity because they can make it difficult to trace malicious traffic to its original source.

What’s more, many proxy services do not disclose how they obtain access to the proxies they are renting out, and in many cases the access is obtained through the dissemination of malicious software that turns the infected system into a traffic relay — usually unbeknownst to the legitimate owner of the Internet connection. Other proxy services will allow users to make money by renting out their Internet connection to anyone.

Spur.us is a company that tracks VPNs and proxy services worldwide. Spur finds that Stark Industries (AS44477) currently is home to at least 74 VPN services, and 40 different proxy services. As we’ll see in the final section of this story, just one of those proxy networks has over a million Internet addresses available for rent across the globe.

Raymond Dijkxhoorn operates a hosting firm in The Netherlands called Prolocation. He also co-runs SURBL, an anti-abuse service that flags domains and Internet address ranges that are strongly associated with spam and cybercrime activity, including DDoS.

Dijkxhoorn said last year SURBL heard from multiple people who said they operated VPN services whose web resources were included in SURBL’s block lists.

“We had people doing delistings at SURBL for domain names that were suspended by the registrars,” Dijkhoorn told KrebsOnSecurity. “And at least two of them explained that Stark offered them free VPN services that they were reselling.”

Dijkxhoorn added that Stark Industries also sponsored activist groups from Ukraine.

“How valuable would it be for Russia to know the real IPs from Ukraine’s tech warriors?” he observed.

CLOUDY WITH A CHANCE OF BULLETS

Richard Hummel is threat intelligence lead at NETSCOUT. Hummel said when he considers the worst of all the hosting providers out there today, Stark Industries is consistently near or at the top of that list.

“The reason is we’ve had at least a dozen service providers come to us saying, ‘There’s this network out there inundating us with traffic,'” Hummel said. “And it wasn’t even DDoS attacks. [The systems] on Stark were just scanning these providers so fast it was crashing some of their services.”

Hummel said NoName will typically launch their attacks using a mix of resources rented from major, legitimate cloud services, and those from so-called “bulletproof” hosting providers like Stark. Bulletproof providers are so named when they earn or cultivate a reputation for ignoring any abuse complaints or police reports about activity on their networks.

Combining bulletproof providers with legitimate cloud hosting, Hummel said, likely makes NoName’s DDoS campaigns more resilient because many network operators will hesitate to be too aggressive in blocking Internet addresses associated with the major cloud services.

“What we typically see here is a distribution of cloud hosting providers and bulletproof hosting providers in DDoS attacks,” he said. “They’re using public cloud hosting providers because a lot of times that’s your first layer of network defense, and because [many companies are wary of] over-blocking access to legitimate cloud resources.”

But even if the cloud provider detects abuse coming from the customer, the provider is probably not going to shut the customer down immediately, Hummel said.

“There is usually a grace period, and even if that’s only an hour or two, you can still launch a large number of attacks in that time,” he said. “And then they just keep coming back and opening new cloud accounts.”

MERCENARIES TEAM

Stark Industries is incorporated at a mail drop address in the United Kingdom. UK business records list an Ivan Vladimirovich Neculiti as the company’s secretary. Mr. Neculiti also is named as the CEO and founder of PQ Hosting Plus S.R.L. (aka Perfect Quality Hosting), a Moldovan company formed in 2019 that lists the same UK mail drop address as Stark Industries.

Ivan Neculiti, as pictured on LinkedIn.

Reached via LinkedIn, Mr. Neculiti said PQ Hosting established Stark Industries as a “white label” of its brand so that “resellers could distribute our services using our IP addresses and their clients would not have any affairs with PQ Hosting.”

“PQ Hosting is a company with over 1,000+ of [our] own physical servers in 38 countries and we have over 100,000 clients,” he said. “Though we are not as large as Hetzner, Amazon and OVH, nevertheless we are a fast growing company that provides services to tens of thousands of private customers and legal entities.”

Asked about the constant stream of DDoS attacks whose origins have traced back to Stark Industries over the past two years, Neculiti maintained Stark hasn’t received any official abuse reports about attacks coming from its networks.

“It was probably some kind of clever attack that we did not see, I do not rule out this fact, because we have a very large number of clients and our Internet channels are quite large,” he said. “But, in this situation, unfortunately, no one contacted us to report that there was an attack from our addresses; if someone had contacted us, we would have definitely blocked the network data.”

DomainTools.com finds Ivan V. Neculiti was the owner of war[.]md, a website launched in 2008 that chronicled the history of a 1990 armed conflict in Moldova known as the Transnistria War and the Moldo-Russian war.

An ad for war.md, circa 2009.

Transnistria is a breakaway pro-Russian region that declared itself a state in 1990, although it is not internationally recognized. The copyright on that website credits the “MercenarieS TeaM,” which was at one time a Moldovan IT firm. Mr. Neculiti confirmed personally registering this domain.

DON CHICHO & DFYZ

The data breach tracking service Constella Intelligence reports that an Ivan V. Neculiti registered multiple online accounts under the email address dfyz_bk@bk.ru. Cyber intelligence firm Intel 471 shows this email address is tied to the username “dfyz” on more than a half-dozen Russian language cybercrime forums since 2008. The user dfyz on Searchengines[.]ru in 2008 asked other forum members to review war.md, and said they were part of the MercenarieS TeaM.

Back then, dfyz was selling “bulletproof servers for any purpose,” meaning the hosting company would willfully ignore abuse complaints or police inquiries about the activity of its customers.

DomainTools reports there are at least 33 domain names registered to dfyz_bk@bk.ru. Several of these domains have Ivan Neculiti in their registration records, including tracker-free[.]cn, which was registered to an Ivan Neculiti at dfyz_bk@bk.ru and referenced the MercenarieS TeaM in its original registration records.

Dfyz also used the nickname DonChicho, who likewise sold bulletproof hosting services and access to hacked Internet servers. In 2014, a prominent member of the Russian language cybercrime community Antichat filed a complaint against DonChicho, saying this user scammed them and had used the email address dfyz_bk@bk.ru.

The complaint said DonChicho registered on Antichat from the Transnistria Internet address 84.234.55[.]29. Searching this address in Constella reveals it has been used to register just five accounts online that have been created over the years, including one at ask.ru, where the user registered with the email address neculitzy1@yandex.ru. Constella also returns for that email address a user by the name “Ivan” at memoraleak.com and 000webhost.com.

Constella finds that the password most frequently used by the email address dfyz_bk@bk.ru was “filecast,” and that there are more than 90 email addresses associated with this password. Among them are roughly two dozen addresses with the name “Neculiti” in them, as well as the address support@donservers[.]ru.

Intel 471 says DonChicho posted to several Russian cybercrime forums that support@donservers[.]ru was his address, and that he logged into cybercrime forums almost exclusively from Internet addresses in Tiraspol, the capital of Transnistria. A review of DonChicho’s posts shows this person was banned from several forums in 2014 for scamming other users.

Cached copies of DonChicho’s vanity domain (donchicho[.]ru) show that in 2009 he was a spammer who peddled knockoff prescription drugs via Rx-Promotion, once one of the largest pharmacy spam moneymaking programs for Russian-speaking affiliates.

Mr. Neculiti told KrebsOnSecurity he has never used the nickname DonChicho.

“I may assure you that I have no relation to DonChicho nor to his bulletproof servers,” he said.

Below is a mind map that shows the connections between the accounts mentioned above.

A mind map tracing the history of the user Dfyz. Click to enlarge.

Earlier this year, NoName began massively hitting government and industry websites in Moldova. A new report from Arbor Networks says the attacks began around March 6, when NoName alleged the government of Moldova was “craving for Russophobia.”

“Since early March, more than 50 websites have been targeted, according to posted ‘proof’ by the groups involved in attacking the country,” Arbor’s ASERT Team wrote. “While NoName seemingly initiated the ramp of attacks, a host of other DDoS hacktivists have joined the fray in claiming credit for attacks across more than 15 industries.”

CORRECTIV ACTION

The German independent news outlet Correctiv.org last week published a scathing investigative report on Stark Industries and MIRhosting, which notes that Ivan Neculiti operates his hosting companies with the help of his brother, Yuri.

Image credit: correctiv.org.

The report points out that Stark Industries continues to host a Russian disinformation news outlet called “Recent Reliable News” (RRN) that was sanctioned by the European Union in 2023 for spreading links to propaganda blogs and fake European media and government websites.

“The website was not running on computers in Moscow or St. Petersburg until recently, but in the middle of the EU, in the Netherlands, on the computers of the Neculiti brothers,” Correctiv reporters wrote.

“After a request from this editorial team, a well-known service was installed that hides the actual web host,” the report continues. “Ivan Neculiti announced that he had blocked the associated access and server following internal investigations. “We very much regret that we are only now finding out that one of our customers is a sanctioned portal,” said the company boss. However, RRN is still accessible via its servers.”

Correctiv also points to a January 2023 report from the Ukrainian government, which found servers from Stark Industries Solutions were used as part of a cyber attack on the Ukrainian news agency “Ukrinform”. Correctiv notes the notorious hacker group Sandworm — an advanced persistent threat (APT) group operated by a cyberwarfare unit of Russia’s military intelligence service — was identified by Ukrainian government authorities as responsible for that attack.

PEACE HOSTING?

Public records indicate MIRhosting is based in The Netherlands and is operated by 37-year old Andrey Nesterenko, whose personal website says he is an accomplished concert pianist who began performing publicly at a young age.

DomainTools says mirhosting[.]com is registered to Mr. Nesterenko and to Innovation IT Solutions Corp, which lists addresses in London and in Nesterenko’s stated hometown of Nizhny Novgorod, Russia.

This is interesting because according to the book Inside Cyber Warfare by Jeffrey Carr, Innovation IT Solutions Corp. was responsible for hosting StopGeorgia[.]ru, a hacktivist website for organizing cyberattacks against Georgia that appeared at the same time Russian forces invaded the former Soviet nation in 2008. That conflict was thought to be the first war ever fought in which a notable cyberattack and an actual military engagement happened simultaneously.

Responding to questions from KrebsOnSecurity, Mr. Nesterenko said he couldn’t say whether his network had ever hosted the StopGeorgia website back in 2008 because his company didn’t keep records going back that far. But he said Stark Industries Solutions is indeed one of MIRhsoting’s colocation customers.

“Our relationship is purely provider-customer,” Nesterenko said. “They also utilize multiple providers and data centers globally, so connecting them directly to MIRhosting overlooks their broader network.”

“We take any report of malicious activity seriously and are always open to information that can help us identify and prevent misuse of our infrastructure, whether involving Stark Industries or any other customer,” Nesterenko continued. “In cases where our services are exploited for malicious purposes, we collaborate fully with Dutch cyber police and other relevant authorities to investigate and take appropriate measures. However, we have yet to receive any actionable information beyond the article itself, which has not provided us with sufficient detail to identify or block malicious actors.”

In December 2022, security firm Recorded Future profiled the phishing and credential harvesting infrastructure used for Russia-aligned espionage operations by a group dubbed Blue Charlie (aka TAG-53), which has targeted email accounts of nongovernmental organizations and think tanks, journalists, and government and defense officials.

Recorded Future found that virtually all the Blue Charlie domains existed in just ten different ISPs, with a significant concentration located in two networks, one of which was MIRhosting. Both Microsoft and the UK government assess that Blue Charlie is linked to the Russian threat activity groups variously known as Callisto Group, COLDRIVER, and SEABORGIUM.

Mr. Nesterenko took exception to a story on that report from The Record, which is owned by Recorded Future.

“We’ve discussed its contents with our customer, Stark Industries,” he said. “We understand that they have initiated legal proceedings against the website in question, as they firmly believe that the claims made are inaccurate.”

Recorded Future said they updated their story with comments from Mr. Neculiti, but that they stand by their reporting.

Mr. Nesterenko’s LinkedIn profile says he was previously the foreign region sales manager at Serverius-as, a hosting company in The Netherlands that remains in the same data center as MIRhosting.

In February, the Dutch police took 13 servers offline that were used by the infamous LockBit ransomware group, which had originally bragged on its darknet website that its home base was in The Netherlands. Sources tell KrebsOnSecurity the servers seized by the Dutch police were located in Serverius’ data center in Dronten, which is also shared by MIRhosting.

Serverius-as did not respond to requests for comment. Nesterenko said MIRhosting does use one of Serverius’s data centers for its operations in the Netherlands, alongside two other data centers, but that the recent incident involving the seizure of servers has no connection to MIRhosting.

“We are legally prohibited by Dutch law and police regulations from sharing information with third parties regarding any communications we may have had,” he said.

A February 2024 report from security firm ESET found Serverius-as systems were involved in a series of targeted phishing attacks by Russia-aligned groups against Ukrainian entities throughout 2023. ESET observed that after the spearphishing domains were no longer active, they were converted to promoting rogue Internet pharmacy websites.

PEERING INTO THE VOID

A review of the Internet address ranges recently added to the network operated by Stark Industries Solutions offers some insight into its customer base, usage, and maybe even true origins. Here is a snapshot (PDF) of all Internet address ranges announced by Stark Industries so far in the month of May 2024 (this information was graciously collated by the network observability platform Kentik.com).

Those records indicate that the largest portion of the IP space used by Stark is in The Netherlands, followed by Germany and the United States. Stark says it is connected to roughly 4,600 Internet addresses that currently list their ownership as Comcast Cable Communications.

A review of those address ranges at spur.us shows all of them are connected to an entity called Proxyline, which is a sprawling proxy service based in Russia that currently says it has more than 1.6 million proxies globally that are available for rent.

Proxyline dot net.

Reached for comment, Comcast said the Internet address ranges never did belong to Comcast, so it is likely that Stark has been fudging the real location of its routing announcements in some cases.

Stark reports that it has more than 67,000 Internet addresses at Santa Clara, Calif.-based EGIhosting. Spur says the Stark addresses involving EGIhosting all map to Proxyline as well. EGIhosting did not respond to requests for comment.

EGIhosting manages Internet addresses for the Cyprus-based hosting firm ITHOSTLINE LTD (aka HOSTLINE-LTD), which is represented throughout Stark’s announced Internet ranges. Stark says it has more than 21,000 Internet addresses with HOSTLINE. Spur.us finds Proxyline addresses are especially concentrated in the Stark ranges labeled ITHOSTLINE LTD, HOSTLINE-LTD, and Proline IT.

Stark’s network list includes approximately 21,000 Internet addresses at Hockessin, De. based DediPath, which abruptly ceased operations without warning in August 2023. According to a phishing report released last year by Interisle Consulting, DediPath was the fourth most common source of phishing attacks in the year ending Oct. 2022. Spur.us likewise finds that virtually all of the Stark address ranges marked “DediPath LLC” are tied to Proxyline.

Image: Interisle Consulting.

A large number of the Internet address ranges announced by Stark in May originate in India, and the names that are self-assigned to many of these networks indicate they were previously used to send large volumes of spam for herbal medicinal products, with names like HerbalFarm, AdsChrome, Nutravo, Herbzoot and Herbalve.

The anti-spam organization SpamHaus reports that many of the Indian IP address ranges are associated with known “snowshoe spam,” a form of abuse that involves mass email campaigns spread across several domains and IP addresses to weaken reputation metrics and avoid spam filters.

It’s not clear how much of Stark’s network address space traces its origins to Russia, but big chunks of it recently belonged to some of the oldest entities on the Russian Internet (a.k.a. “Runet”).

For example, many Stark address ranges were most recently assigned to a Russian government entity whose full name is the “Federal State Autonomous Educational Establishment of Additional Professional Education Center of Realization of State Educational Policy and Informational Technologies.”

A review of Internet address ranges adjacent to this entity reveals a long list of Russian government organizations that are part of the Federal Guard Service of the Russian Federation. Wikipedia says the Federal Guard Service is a Russian federal government agency concerned with tasks related to protection of several high-ranking state officials, including the President of Russia, as well as certain federal properties. The agency traces its origins to the USSR’s Ninth Directorate of the KGB, and later the presidential security service.

Stark recently announced the address range 213.159.64.0/20 from April 27 to May 1, and this range was previously assigned to an ancient ISP in St. Petersburg, RU called the Computer Technologies Institute Ltd.

According to a post on the Russian language webmaster forum searchengines[.]ru, the domain for Computer Technologies Institute — ctinet[.]ruis the seventh-oldest domain in the entire history of the Runet.

Curiously, Stark also lists large tracts of Internet addresses (close to 48,000 in total) assigned to a small ISP in Kharkiv, Ukraine called NetAssist. Reached via email, the CEO of NetAssist Max Tulyev confirmed his company provides a number of services to PQ Hosting.

“We colocate their equipment in Warsaw, Madrid, Sofia and Thessaloniki, provide them IP transit and IPv4 addresses,” Tulyev said. “For their size, we receive relatively low number of complains to their networks. I never seen anything about their pro-Russian activity or support of Russian hackers. It is very interesting for me to see proofs of your accusations.”

Spur.us mapped the entire infrastructure of Proxyline, and found more than one million proxies across multiple providers, but by far the biggest concentration was at Stark Industries Solutions. The full list of Proxyline address ranges (.CSV) shows two other ISPs appear repeatedly throughout the list. One is Kharkiv, Ukraine based ITL LLC, also known as Information Technology Laboratories Group, and Integrated Technologies Laboratory.

The second is a related hosting company in Miami, called Green Floid LLC. Green Floid featured in a 2017 scoop by CNN, which profiled the company’s owner and quizzed him about Russian troll farms using proxy networks on Green Floid and its parent firm ITL to mask disinformation efforts tied to the Kremlin’s Internet Research Agency (IRA). At the time, the IRA was using Facebook and other social media networks to spread videos showing police brutality against African Americans in an effort to encourage protests across the United States.

Doug Madory, director of Internet analysis at Kentik, was able to see at a high level the top sources and destinations for traffic traversing Stark’s network.

“Based on our aggregate NetFlow, we see Iran as the top destination (35.1%) for traffic emanating from Stark (AS44477),” Madory said. “Specifically, the top destination is MTN Irancell, while the top source is Facebook. This data supports the theory that AS44477 houses proxy services as Facebook is blocked in Iran.”

On April 30, the security firm Malwarebytes explored an extensive malware operation that targets corporate Internet users with malicious ads. Among the sites used as lures in that campaign were fake Wall Street Journal and CNN websites that told visitors they were required to install a WSJ or CNN-branded browser extension (malware). Malwarebytes found a domain name central to that operation was hosted at Internet addresses owned by Stark Industries.

Image: threatdown.com

Metasploit Weekly Wrap-Up 05/23/2024

23 May 2024 at 16:30

Infiltrate the Broadcast!

Metasploit Weekly Wrap-Up 05/23/2024

A new module from Chocapikk allows the user to perform remote code execution on vulnerable versions of streaming platform AVideo (12.4 - 14.2). The multi/http/avideo_wwbnindex_unauth_rce module leverages CVE-2024-31819, a vulnerability to PHP Filter Chaining, to gain unauthenticated and unprivileged access, earning it an attacker value of High on AttackerKB.

New module content (8)

Chaos RAT XSS to RCE

Authors: chebuya and h00die
Type: Exploit
Pull request: #19104 contributed by h00die
Path: linux/http/chaos_rat_xss_to_rce
AttackerKB reference: CVE-2024-30850

Description: Adds an exploit for HAOS v5.0.8, which contains a remote command execution vulnerability which
can be triggered through one of three routes: credentials, JWT token from an agent, an agent executable can be provided, or the JWT token can be extracted.

AVideo WWBNIndex Plugin Unauthenticated RCE

Author: Valentin Lobstein
Type: Exploit
Pull request: #19071 contributed by Chocapikk
Path: multi/http/avideo_wwbnindex_unauth_rce
AttackerKB reference: CVE-2024-31819

Description: Adds a module for CVE-2024-31819 which exploits an LFI in AVideo which uses PHP Filter Chaining to turn the LFI into unauthenticated RCE.

NorthStar C2 XSS to Agent RCE

Authors: chebuya and h00die
Type: Exploit
Pull request: #19102 contributed by h00die
Path: windows/http/northstar_c2_xss_to_agent_rce
AttackerKB reference: CVE-2024-28741

Description: Adds an exploit for CVE-2024-28741 which exploits an XSS vulnerability in Northstar C2.

Adi IRC credential gatherer

Authors: Barwar Salim M, Daniel Hallsworth, Jacob Tierney, Kazuyoshi Maruta, and Z. Cliffe Schreuders
Type: Post
Pull request: #19169 contributed by The-Pink-Panther
Path: windows/gather/credentials/adi_irc

Description: This adds a gather module leveraging Packrat targeting Adi IRC client.

CarotDAV credential gatherer

Authors: Barwar Salim M, Daniel Hallsworth, Jacob Tierney, Kazuyoshi Maruta, and Z. Cliffe Schreuders
Type: Post
Pull request: #19173 contributed by The-Pink-Panther
Path: windows/gather/credentials/carotdav_ftp

Description: This adds a gather module leveraging Packrat targeting the CarotDAV FTP client.

Halloy IRC credential gatherer

Authors: Barwar Salim M, Daniel Hallsworth, Jacob Tierney, Kazuyoshi Maruta, and Z. Cliffe Schreuders
Type: Post
Pull request: #19165 contributed by The-Pink-Panther
Path: windows/gather/credentials/halloy_irc

Description: This adds a module leveraging Packrat to gather credentials against the Halloy IRC client.

Quassel IRC credential gatherer

Authors: Barwar Salim M, Daniel Hallsworth, Jacob Tierney, Kazuyoshi Maruta, and Z. Cliffe Schreuders
Type: Post
Pull request: #19166 contributed by The-Pink-Panther
Path: windows/gather/credentials/quassel_irc

Description: This adds a gather module leveraging Packrat targeting Quassel IRC client.

Sylpheed email credential gatherer

Authors: Barwar Salim M, Daniel Hallsworth, Jacob Tierney, Kazuyoshi Maruta, and Z. Cliffe Schreuders
Type: Post
Pull request: #19171 contributed by The-Pink-Panther
Path: windows/gather/credentials/sylpheed

Description: This adds a gather module leveraging Packrat targeting Sylpheed Email client.

Enhancements and features (1)

  • #19189 from adfoster-r7 - Updates Metasploit framework's default Ruby version to 3.1.5; newer Ruby versions are also supported.

Bugs fixed (4)

  • #19002 from adfoster-r7 - Fixed persistent jobs not working when rebooting MSF console.
  • #19170 from sjanusz-r7 - Fixes the smb_lookupsid module hanging with STATUS_PENDING when running against Samba targets.
  • #19186 from dwelch-r7 - Fixes a bug were the show advanced command could show normal options.
  • #19192 from adfoster-r7 - Fix crashing mipsel modules when running Ruby 3.3.0.

Documentation

You can find the latest Metasploit documentation on our docsite at docs.metasploit.com.

Get it

As always, you can update to the latest Metasploit Framework with msfupdate
and you can get more details on the changes since the last blog post from
GitHub:

If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.
To install fresh without using git, you can use the open-source-only Nightly Installers or the
commercial edition Metasploit Pro

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Bing outage shows just how little competition Google search really has

23 May 2024 at 16:01
Google logo on a phone in front of a Bing logo in the background

Enlarge (credit: Getty Images)

Bing, Microsoft's search engine platform, went down in the very early morning today. That meant that searches from Microsoft's Edge browsers that had yet to change their default providers didn't work. It also meant that services relying on Bing's search API—Microsoft's own Copilot, ChatGPT search, Yahoo, Ecosia, and DuckDuckGo—similarly failed.

Services were largely restored by the morning Eastern work hours, but the timing feels apt, concerning, or some combination of the two. Google, the consistently dominating search platform, just last week announced and debuted AI Overviews as a default addition to all searches. If you don't want an AI response but still want to use Google, you can hunt down the new "Web" option in a menu, or you can, per Ernie Smith, tack "&udm=14" onto your search or use Smith's own "Konami code" shortcut page.

If dismay about AI's hallucinations, power draw, or pizza recipes concern you—along with perhaps broader Google issues involving privacy, tracking, news, SEO, or monopoly power—most of your other major options were brought down by a single API outage this morning. Moving past that kind of single point of vulnerability will take some work, both by the industry and by you, the person wondering if there's a real alternative.

Read 11 remaining paragraphs | Comments

Cybercriminals Exploit Cloud Storage For SMS Phishing Scams – Source: www.infosecurity-magazine.com

cybercriminals-exploit-cloud-storage-for-sms-phishing-scams-–-source:-wwwinfosecurity-magazine.com

Source: www.infosecurity-magazine.com – Author: 1 Security researchers have revealed a series of criminal campaigns that exploit cloud storage services such as Amazon S3, Google Cloud Storage, Backblaze B2 and IBM Cloud Object Storage.  These campaigns, driven by unnamed threat actors, aim to redirect users to malicious websites to steal their information using SMS messages. According […]

La entrada Cybercriminals Exploit Cloud Storage For SMS Phishing Scams – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

A root-server at the Internet’s core lost touch with its peers. We still don’t know why.

23 May 2024 at 13:10
A root-server at the Internet’s core lost touch with its peers. We still don’t know why.

Enlarge

For more than four days, a server at the very core of the Internet’s domain name system was out of sync with its 12 root server peers due to an unexplained glitch that could have caused stability and security problems worldwide. This server, maintained by Internet carrier Cogent Communications, is one of the 13 root servers that provision the Internet’s root zone, which sits at the top of the hierarchical distributed database known as the domain name system, or DNS.

Here's a simplified recap of the way the domain name system works and how root servers fit in:

When someone enters wikipedia.org in their browser, the servers handling the request first must translate the human-friendly domain name into an IP address. This is where the domain name system comes in. The first step in the DNS process is the browser queries the local stub resolver in the local operating system. The stub resolver forwards the query to a recursive resolver, which may be provided by the user's ISP or a service such as 1.1.1.1 or 8.8.8.8 from Cloudflare and Google, respectively.

Read 15 remaining paragraphs | Comments

EmTech Digital 2024: A thoughtful look at AI’s pros and cons with minimal hype

23 May 2024 at 12:38
Nathan Benaich of Air Street capital delivers the opening presentation on the state of AI at EmTech Digital 2024 on May 22, 2024.

Enlarge / Nathan Benaich of Air Street Capital delivers the opening presentation on the state of AI at EmTech Digital 2024 on May 22, 2024. (credit: Benj Edwards)

CAMBRIDGE, Massachusetts—On Wednesday, AI enthusiasts and experts gathered to hear a series of presentations about the state of AI at EmTech Digital 2024 on the Massachusetts Institute of Technology's campus. The event was hosted by the publication MIT Technology Review. The overall consensus is that generative AI is still in its very early stages—with policy, regulations, and social norms still being established—and its growth is likely to continue into the future.

I was there to check the event out. MIT is the birthplace of many tech innovations—including the first action-oriented computer video game—among others, so it felt fitting to hear talks about the latest tech craze in the same building that hosts MIT's Media Lab on its sprawling and lush campus.

EmTech's speakers included AI researchers, policy experts, critics, and company spokespeople. A corporate feel pervaded the event due to strategic sponsorships, but it was handled in a low-key way that matches the level-headed tech coverage coming out of MIT Technology Review. After each presentation, MIT Technology Review staff—such as Editor-in-Chief Mat Honan and Senior Reporter Melissa Heikkilä—did a brief sit-down interview with the speaker, pushing back on some points and emphasizing others. Then the speaker took a few audience questions if time allowed.

Read 10 remaining paragraphs | Comments

❌
❌