Tag: supply chain
-
Hacker News: Ultralytics AI model hijacked to infect thousands with cryptominer
Source URL: https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/ Source: Hacker News Title: Ultralytics AI model hijacked to infect thousands with cryptominer Feedly Summary: Comments AI Summary and Description: Yes Summary: The Ultralytics YOLO11 AI model was compromised due to a supply chain attack that led to the deployment of cryptominers when users installed certain versions from PyPI. This incident highlights…
-
The Register: Canada commits $1.4B to sovereign compute infrastructure as it joins the AI arms race
Source URL: https://www.theregister.com/2024/12/05/canada_ai_funding/ Source: The Register Title: Canada commits $1.4B to sovereign compute infrastructure as it joins the AI arms race Feedly Summary: Project includes hundreds of millions of loonies for a national supercomputing facility Canada is one of the latest nations to catch the sovereign AI bug and plans to invest $2 billion CAD…
-
Alerts: ASD’s ACSC, CISA, and US and International Partners Release Guidance on Choosing Secure and Verifiable Technologies
Source URL: https://www.cisa.gov/news-events/alerts/2024/12/05/asds-acsc-cisa-and-us-and-international-partners-release-guidance-choosing-secure-and-verifiable Source: Alerts Title: ASD’s ACSC, CISA, and US and International Partners Release Guidance on Choosing Secure and Verifiable Technologies Feedly Summary: Today, CISA—in partnership with the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), and other international partners—released updates to a Secure by Design Alert, Choosing Secure and Verifiable Technologies. Partners…
-
Anchore: The Evolution of SBOMs in the DevSecOps Lifecycle: Part 2
Source URL: https://anchore.com/blog/the-evolution-of-sboms-in-the-devsecops-lifecycle-part-2/ Source: Anchore Title: The Evolution of SBOMs in the DevSecOps Lifecycle: Part 2 Feedly Summary: Welcome back to the second installment of our two-part series on “The Evolution of SBOMs in the DevSecOps Lifecycle”. In our first post, we explored how Software Bills of Materials (SBOMs) evolve over the first 4 stages…
-
The Register: Russia arrests one of its own – a cybercrime suspect on FBI’s most wanted list
Source URL: https://www.theregister.com/2024/12/02/russia_ransomware_arrest/ Source: The Register Title: Russia arrests one of its own – a cybercrime suspect on FBI’s most wanted list Feedly Summary: The latest in an unusual change of fortune for group once protected by the Kremlin An alleged former affiliate of the LockBit and Babuk ransomware operations, who also just happens to…
-
Wired: The US Just Made It Way Harder for China to Build Its Own AI Chips
Source URL: https://www.wired.com/story/2024-chips-export-controls-china/ Source: Wired Title: The US Just Made It Way Harder for China to Build Its Own AI Chips Feedly Summary: The Biden administration announced a sweeping set of new export controls that will make it harder for Chinese companies like Huawei and ByteDance to develop cutting-edge artificial intelligence. AI Summary and Description:…