Tag: dual
-
New York Times – Artificial Intelligence : OpenAI’s Sora Makes Disinformation Extremely Easy and Extremely Real
Source URL: https://www.nytimes.com/2025/10/03/technology/sora-openai-video-disinformation.html Source: New York Times – Artificial Intelligence Title: OpenAI’s Sora Makes Disinformation Extremely Easy and Extremely Real Feedly Summary: The new A.I. app generated videos of store robberies and home intrusions — even bomb explosions on city streets — that never happened. AI Summary and Description: Yes Summary: The text discusses an…
-
Slashdot: Microsoft Says AI Can Create ‘Zero Day’ Threats In Biology
Source URL: https://science.slashdot.org/story/25/10/02/2335217/microsoft-says-ai-can-create-zero-day-threats-in-biology?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Says AI Can Create ‘Zero Day’ Threats In Biology Feedly Summary: AI Summary and Description: Yes Summary: Microsoft’s team has identified a significant vulnerability in biosecurity systems using AI, highlighting the dual-use capabilities of generative AI in potentially enabling bioweapons development. This discovery emphasizes the urgent need for…
-
Microsoft Security Blog: Microsoft named a Leader in the IDC MarketScape for XDR
Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/02/microsoft-named-a-leader-in-the-idc-marketscape-for-xdr/ Source: Microsoft Security Blog Title: Microsoft named a Leader in the IDC MarketScape for XDR Feedly Summary: Microsoft has been named a Leader in IDC’s inaugural category for Worldwide Extended Detection and Response (XDR) Software for 2025, recognized for its deep integration, intelligent automation, and unified security operations solutions. The post Microsoft…
-
Schneier on Security: Daniel Miessler on the AI Attack/Defense Balance
Source URL: https://www.schneier.com/blog/archives/2025/10/daniel-miessler-on-the-ai-attack-defense-balance.html Source: Schneier on Security Title: Daniel Miessler on the AI Attack/Defense Balance Feedly Summary: His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their mind the best, will be best at finding the vulnerabilities the fastest and taking advantage of them. Or,…
-
The Register: Clop-linked crims shake down Oracle execs with data theft claims
Source URL: https://www.theregister.com/2025/10/02/clop_oracle_extortion/ Source: The Register Title: Clop-linked crims shake down Oracle execs with data theft claims Feedly Summary: Extortion emails name-drop Big Red’s E-Business Suite, though Google and Mandiant yet to find proof of any breach Criminals with potential links to the notorious Clop ransomware mob are bombarding Oracle execs with extortion emails, claiming…
-
AlgorithmWatch: Happy Birthday, Digital Services Act! – Time for a Reality Check
Source URL: https://algorithmwatch.org/en/birthday-dsa-reality-check/ Source: AlgorithmWatch Title: Happy Birthday, Digital Services Act! – Time for a Reality Check Feedly Summary: The EU’s Digital Services Act (DSA) celebrates its third birthday. This landmark digital regulation is meant to give a better understanding of how online services decide what users see, and more powers to challenge the companies. However,…