Enterprise note-taking apps face legal scrutiny as Otter hit with privacy suit
Otter.ai and other call recording, note-taking apps like Read.ai and even Google Gemini have become handy tools for many enterprise users, automatically kicking off in the background and providing full transcripts of calls and key meeting takeaways. But some see the services as intrusive and, according to a complaint filed last week in California on […] more…Anthropic’s Claude models can now shut down harmful conversations
Anthropic has introduced a new feature in its Claude Opus 4 and 4.1 models that allows the generative AI (genAI) tool to end a conversation on its own if a user repeatedly tries to push harmful or illegal content. The new behavior is supposed to only be used when all attempts to redirect a conversation […] more…Spotlight is much better in macOS Tahoe — here’s what’s new
If you use a Mac at work or elsewhere, then you inevitably use Spotlight, Apple’s helpful search tool that has been blessed with a variety of productivity-enhancing improvements in macOS 26 Tahoe. Apple calls this the “biggest Spotlight update ever,” so it’s time to look at what’s new. The big picture is that Spotlight Search has become […] more…Puny humans are no match for AI
We live in a new age of artificial intelligence (AI), which is making everything better. And worse. AI is transforming everyday life by improving diagnostics, personalizing medicine and learning, detecting fraud, automating tasks, optimizing operations, supporting smarter decision-making, reducing costs, enhancing productivity, and enabling innovations like self-driving cars, predictive analytics, and virtual assistants. That’s the […] more…Questionable AI work habits rampant among US firms
A new study from AI security provider CalypsoAI reveals a “growing use and misuse of AI” within US organizations by employees at all levels, including C-suite executives. Of note, it said, “half (50%) of executives say they’d prefer AI managers over a human, although 34% aren’t entirely sure they can tell the difference between an […] more…Nvidia: ‘Graphics 3.0’ will drive physical AI productivity
Nvidia has floated the idea of “Graphics 3.0” with the hope of making AI-generated graphics central to physical productivity, especially in factories and warehouses. The concept revolves around graphics generated by generative AI (genAI) tools as opposed to humans. Nvidia said AI-generated graphics could help in multiple ways, including training robots to do their jobs in […] more…Code Insight Expands to Uncover Risks Across the Software Supply Chain
Audio version of this post, created with NotebookLM Deep Dive Your browser does not support the audio element. When we launched Code Insight, we started by analyzing PowerShell scripts. Since then, we have been continuously expanding its capabilities to cover more file types. Today, we announce that Code Insight can now analyze a broader range […] more…Quantum computers just beat classical ones — Exponentially and unconditionally
A research team has achieved the holy grail of quantum computing: an exponential speedup that’s unconditional. By using clever error correction and IBM’s powerful 127-qubit processors, they tackled a variation of Simon’s problem, showing quantum machines are now breaking free from classical limitations, for real. more…Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
The proposal seeks to ban all use of the technology in the U.S. government, with exceptions for use in research and counterterrorism efforts. The post Bipartisan Bill Aims to Block Chinese AI From Federal Agencies appeared first on SecurityWeek. more…Quantum breakthrough: ‘Magic states’ now easier, faster, and way less noisy
Quantum computing just got a significant boost thanks to researchers at the University of Osaka, who developed a much more efficient way to create “magic states”—a key component for fault-tolerant quantum computers. By pioneering a low-level, or “level-zero,” distillation method, they dramatically reduced the number of qubits and computational resources needed, overcoming one of the […] more…Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits
Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits appeared first on SecurityWeek. more…Fake DeepSeek Sites Used for Credential Phishing, Crypto Theft, Scams
Researchers see dozens of fake DeepSeek websites used for credential phishing, cryptocurrency theft, and scams. The post Fake DeepSeek Sites Used for Credential Phishing, Crypto Theft, Scams appeared first on SecurityWeek. more…Japanese Spam on a Cleaned WordPress Site: The Hidden Sitemap Problem
While investigating a compromised WordPress site, we discovered a malware infection causing Japanese spam links to appear in Google search results. Although the site had been cleaned, Google was still crawling and indexing spammy URLs, which impacted the site’s SEO and credibility. Japanese SEO Spam: A Common Threat Japanese SEO spam is a recurring issue […] more…Understanding and Fixing Authentication Bypass Vulnerabilities: A Case Study on Really Simple SSL
Introduction In the world of WordPress plugins, security vulnerabilities can have far-reaching consequences, especially when they affect widely used tools like Really Simple SSL. A recent vulnerability in versions 9.0.0 to 9.1.1.1 exposed websites to the risk of authentication bypass. However, the vulnerability only affected sites where the Two-Factor Authentication (2FA) feature was enabled. This […] more…Unveiling Hidden Connections: JA4 Client Fingerprinting on VirusTotal
VirusTotal has incorporated a powerful new tool to fight against malware: JA4 client fingerprinting. This feature allows security researchers to track and identify malicious files based on the unique characteristics of their TLS client communications. JA4: A More Robust Successor to JA3 JA4, developed by FoxIO, represents a significant advancement over the older JA3 fingerprinting […] more…Leveraging LLMs for Malware Analysis: Insights and Future Directions
By Gerardo Fernández, Joseliyo Sánchez and Vicente Díaz Malware analysis is (probably) the most expert-demanding and time-consuming activity for any security professional. Unfortunately automation for static analysis has always been challenging for the security industry. The sheer volume and complexity of malicious code necessitate innovative approaches for efficient and effective analysis. At VirusTotal, we’ve been […] more…More information
- Update: Configuration change in data center networking
- WiFi-enabled adult toy comes up short on security
- Bomgar to Acquire BeyondTrust
- News in brief: twins fox bank’s voice security; FCC moves on net neutrality; torrent site closes
- How cybercriminals abuse the travel and hospitality industry
- Perils of the Popular
- Leak Finder helps find memory leaks in JavaScript
- Microsoft Internet Explorer and Edge CVE-2016-3260 Remote Memory Corruption Vulnerability
- Google reveals Windows flaw mere days before Patch Tuesday fix, irking Microsoft
- S3 Ep99: TikTok “attack” – was there a data breach, or not? [Audio + Text]