Yearly Archives: 2022

Artificial General Intelligence Is Not as Imminent as You Might Think

Artificial General Intelligence Is Not as Imminent as You Might Think

To the average person, it must seem as if the field of artificial intelligence is making immense progress. According to the press releases, and some of the more gushing media accounts, OpenAI’s DALL-E 2 can seemingly create spectacular images from any text; another OpenAI system called GPT-3 can talk about just about anything; and a system called Gato that was released in May by DeepMind, a division of Alphabet, seemingly worked well on every task the company could throw at it. One of DeepMind’s high-level executives even went so far as to brag that in the quest for artificial general intelligence (AGI), AI that has the flexibility and resourcefulness of human intelligence, “The Game is Over!” And Elon Musk said recently that he would be surprised if we didn’t have… Source link

Read More »

Destiny 2 Xur location and items, June 3-7

Destiny 2 Xur location and items, June 3-7

The weekly Exotic item merchant, Xur, hangs out in random locations around the world of Destiny. In Destiny 2, he can appear all over the map, as well as inside the Tower. This week, you can find Xur on Nessus, hanging out on the big Tree in the Watcher’s Grave. Image: Bungie via Polygon Xur’s inventory this week consists of the following: Coldheart, Arc trace rifle: 29 Legendary Shards Oathkeeper, Hunter gauntlets: 23 Legendary Shards Ashen Wake, Titan gauntlets: 23 Legendary Shards Astrocyte Verse, Warlock helmet: 23 Legendary Shards Exotic Engram: 97 Legendary Shards (you can now purchase a second with an Exotic Cipher) Exotic Cipher quest: free As of Season of the Risen and The Witch Queen, Xur sells a random roll of both Hawkmoon and Dead Man’s Tale each… Source link

Read More »

How Artificial Intelligence Can Design An Enzyme That Can Eat Entire Plastic Containers – TechDigg

How Artificial Intelligence Can Design An Enzyme That Can Eat Entire Plastic Containers – TechDigg

👋 Welcome to Digg Thanks for creating an account! Your accounts lets you Digg (upvote) stories, save stories to revisit later, and more. 📩 Stay up-to-date Email will be sent to: Select the newsletters you’d like to receive. You can change your subscriptions any time in your user settings. Confirm and continue Source link

Read More »

Eureka! Scientists just linked two time crystals together for the first time

Eureka! Scientists just linked two time crystals together for the first time

A team of researchers in Europe have successfully created a two-state system using time crystals. The correct response to reading that is: eureka! We would have also accepted “wow,” “OMG,” and “hooray,” given the potential implications of this incredible breakthrough. Up front: Time crystals are a recently discovered phase of matter. In their ground state, they oscillate between different configurations without losing or using energy. Greetings humanoids Subscribe now for a weekly recap of our favorite AI stories (Read more about how time crystals work here: Google’s ‘time crystals’ could be the greatest scientific achievement of our lifetimes) A team of physicists led by Lancaster University’s Samuli Autti managed to couple two time… Source link

Read More »

The Russian Mathematician Who Thinks History Never Happened

The Russian Mathematician Who Thinks History Never Happened

Have you ever noticed how much Michelangelo’s David looks like ancient Greek and Roman statues? Have you ever wondered why that is? Perhaps you thought it was because of normal things like “people are sometimes inspired by the past” or “the fact that ancient statues looked nothing like we imagine,” but no! The truth, if you believe a Russian mathematician named Anatoly Fomenko, is much darker. You see, the truth, Fomenko says, is that the ancient world never really happened. “What??” we hear you cry – or possibly, if you’re one of our regular readers, “oh right, another one of those phantom time conspiracies.” But Fomenko’s proposed timeline of the world is… possibly even weirder than… Source link

Read More »

EnemyBot Puts Enterprises in the Crosshairs With Raft of ‘1-Day’ Bugs

EnemyBot Puts Enterprises in the Crosshairs With Raft of ‘1-Day’ Bugs

An Internet of Things (IoT) botnet dubbed “EnemyBot” is expanding its front lines to target security vulnerabilities in enterprise services — potentially leading to it being a much more virulent threat than it has been, researchers say. EnemyBot, which is controlled by a threat actor known as Keksec, is a Linux botnet that emerged on the malware scene in late March. It shares source code with two other well-known botnets, Gafgyt (aka Bashlite) and the mighty Mirai, according to a prior analysis from Fortinet. Like those threats, EnemyBot is used to carry out distributed denial-of-service (DDoS) attacks. Other aspects of the code include smaller elements from Qbot and other malware, and some custom development. While it began life focusing on adding IoT devices and routers to its… Source link

Read More »

OODA Loop – EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

OODA Loop – EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

Cybersecurity researchers have released new warnings about the EnemyBot malware, which reportedly borrows code from botnets such as Mirai, Qbot, and Zbot. The rapidly evolving tool functions as IoT malware and targets content management systems (CMS) web servers and Android devices. Security researchers believe that the bot might be the work of a threat actor group known as Keksec. AT&T Alien Labs released a post regarding the bot, stating that is has targeted popular services such as VMware Workspace, Adobe ColdFusion, WordPress, PHP Scriptcase, and more. AT&T stated that the Keksec group distributes the malware by specifically targeting IoT devices and Linux machines. The EnemyBot is not the only botnet in Keksec’s arsenal, as the group dates back to 2016 and has deployed many… Source link

Read More »

Ankura CTIX FLASH Update – May 31, 2022

Ankura CTIX FLASH Update – May 31, 2022

Ransomware/Malware Activity Enemybot Botnet Observed Exploiting Critical Vulnerabilities to Expand Its Potential Targets “Enemybot,” an internet of things (IoT) botnet, has been observed expanding its potential target scope by exploiting critical vulnerabilities that allow it to spread to new types of devices. AT&T Alien Labs researchers detailed that the malware is now targeting IoT devices, web servers, Android devices, and content management system (CMS) servers via exploiting recently disclosed critical vulnerabilities in various software and systems. Some of the targeted services include VMware Workspace ONE, WordPress, Adobe ColdFusion, and PHP Scriptcase. Enemybot was first discovered in March 2022 by Securonix researchers and is suspected to be distributed by the Keksec threat… Source link

Read More »

EnemyBot malware adds enterprise flaws to its arsenal • The Register

EnemyBot malware adds enterprise flaws to its arsenal • The Register

EnemyBot, a botnet that seems to be amalgam of source code from other high-profile bots, is adding new exploits and targets to its arsenal. To make a bad situation worse, EnemyBot’s base source code can now be found on GitHub, so any miscreant can use the malware for their own attacks. The group behind EnemyBot is Keksec, a collection of experienced developers, also known as Nero and Freakout, that have been around since 2016 and have launched a number of Linux- and Windows-based bots capable of launching distributed denial-of-service (DDoS) attacks and possibly mining cryptocurrency. Securonix first wrote about EnemyBot in March. A report by Fortinet’s FortiGuard Labs researchers in April found that newer… Source link

Read More »

Wicked Good Development: Dev Nexus Reflections and Conversations Part 2 – Security Boulevard

Wicked Good Development: Dev Nexus Reflections and Conversations Part 2 – Security Boulevard

Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry. *** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Kadi Grigg. Read the original post at: https://blog.sonatype.com/wicked-good-development-dev-nexus-part-2 Source link

Read More »