Tag: uth

  • Simon Willison’s Weblog: r1.py script to run R1 with a min-thinking-tokens parameter

    Source URL: https://simonwillison.net/2025/Jan/22/r1py/ Source: Simon Willison’s Weblog Title: r1.py script to run R1 with a min-thinking-tokens parameter Feedly Summary: r1.py script to run R1 with a min-thinking-tokens parameter Fantastically creative hack by Theia Vogel. The DeepSeek R1 family of models output their chain of thought inside a …</think> block. Theia found that you can intercept…

  • Hacker News: Cryptocurrency Turns to Cash in Russian Banks

    Source URL: https://krebsonsecurity.com/2024/12/how-cryptocurrency-turns-to-cash-in-russian-banks/ Source: Hacker News Title: Cryptocurrency Turns to Cash in Russian Banks Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights the emergence of a Canadian financial firm as a payment processor for Russian cryptocurrency exchanges, implicating it in facilitating cybercrime services targeted at Russian-speaking customers. This raises significant concerns…

  • CSA: How to Combat Social Engineering Attacks

    Source URL: https://abnormalsecurity.com/blog/soc-expert-perspectives-social-engineering-threats Source: CSA Title: How to Combat Social Engineering Attacks Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the increasing threat of social engineering attacks and highlights key insights from cybersecurity experts regarding the vulnerabilities associated with human behavior, advanced attack techniques such as deepfakes, and the necessity for AI-driven…

  • The Register: Ransomware scum make it personal for <i>Reg</i> readers by impersonating tech support

    Source URL: https://www.theregister.com/2025/01/22/ransomware_crews_abuse_microsoft_teams/ Source: The Register Title: Ransomware scum make it personal for <i>Reg</i> readers by impersonating tech support Feedly Summary: That invitation to a Teams call on which IT promises to mop up a spamstorm may not be what it seems Two ransomware campaigns are abusing Microsoft Teams to infect organizations and steal data,…

  • Hacker News: Tensor Product Attention Is All You Need

    Source URL: https://arxiv.org/abs/2501.06425 Source: Hacker News Title: Tensor Product Attention Is All You Need Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a novel attention mechanism called Tensor Product Attention (TPA) designed for scaling language models efficiently. It highlights the mechanism’s ability to reduce memory overhead during inference while improving model…

  • The Register: PowerSchool thieves net decades of Canadian students’ records, hit 40-plus US states

    Source URL: https://www.theregister.com/2025/01/22/powerschool_attack_canada_lawsuit/ Source: The Register Title: PowerSchool thieves net decades of Canadian students’ records, hit 40-plus US states Feedly Summary: Lawsuits pile up after database accessed by miscreants Canada’s largest school board has revealed that student records dating back to 1985 may have been accessed by miscreants who compromised software provider PowerSchool.… AI Summary…

  • Hacker News: Why AI reminds me of cloud computing

    Source URL: https://bitmasonsllc.blogspot.com/2025/01/why-ai-reminds-me-of-cloud-computing.html Source: Hacker News Title: Why AI reminds me of cloud computing Feedly Summary: Comments AI Summary and Description: Yes Summary: The text explores the historical and current significance of AI, particularly focusing on large language models (LLMs), while drawing parallels with the evolution of cloud computing. It emphasizes the unpredictability of technological…

  • The Register: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day

    Source URL: https://www.theregister.com/2025/01/21/fortinet_firewalls_still_vulnerable/ Source: The Register Title: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day Feedly Summary: Seven days after disclosure and little action taken, data shows Fortinet customers need to get with the program and apply the latest updates as nearly 50,000 management interfaces are still vulnerable to the latest zero-day exploit.… AI…

  • Hacker News: Show HN: Graceful token refresh for open source OAuth2 Server Ory Hydra

    Source URL: https://github.com/ory/hydra/releases/tag/v2.3.0 Source: Hacker News Title: Show HN: Graceful token refresh for open source OAuth2 Server Ory Hydra Feedly Summary: Comments AI Summary and Description: Yes Summary: The release of Ory Hydra 2.3.0 introduces significant enhancements to token refresh processes and compliance measures with OpenID Connect standards, marking an important update for security measures…