As its Microsoft nightmare nears an end, OpenAI’s ‘full stack’ dream comes into view

As its Microsoft nightmare nears an end, OpenAI’s ‘full stack’ dream comes into view Summary OpenAI has signed a memorandum of understanding to resolve its contractual fight with Microsoft and is creating a new corporate structure that will allow it to issue traditional equity. That clears a major fundraising hurdle and paves the way for […]

Read More →

Tesla says xAI stands for “eXploratory AI.” Does it?

Tesla says xAI stands for “eXploratory AI.” Does it? Summary Author style: Punchy — a quick, tidy clarification that cuts through a tiny naming mystery. Tesla’s September 5 proxy statement referred to Elon Musk’s AI company as “eXploratory Artificial Intelligence or ‘xAI’,” which prompted questions because neither Musk nor xAI appear to have ever expanded […]

Read More →

Vyro AI Leak Reveals Poor Cyber Hygiene

Vyro AI Leak Reveals Poor Cyber Hygiene Summary Vyro AI accidentally exposed around 116GB of sensitive user data across three products: ImagineArt, Chatly and Chatbotx. Cybernews researchers found the dataset had been indexed by IoT search engines in February, suggesting it may have been discoverable for months. The exposed information included user prompts, bearer authentication […]

Read More →

‘Gentlemen’ Ransomware Abuses Vulnerable Driver to Kill Security Gear

‘Gentlemen’ Ransomware Abuses Vulnerable Driver to Kill Security Gear Summary The Gentlemen ransomware gang is weaponising a vulnerable, signed kernel driver (ThrottleStop.sys) — renamed in attacks as ThrottleBlood.sys — to disable antivirus and EDR products. Trend Micro analysis shows the group uses a bring-your-own-vulnerable-driver (BYOVD) technique together with AV‑killer binaries (All.exe and customised Allpatch2.exe) and […]

Read More →

Chinese Hackers Allegedly Pose as US Lawmaker

Chinese Hackers Allegedly Pose as US Lawmaker Summary US lawmakers say China-backed threat actors impersonated Representative John Moolenaar in spear-phishing emails aimed at trusted targets involved in high-level US–China trade engagements. The House Select Committee on China published a notice on 8 September describing an ongoing, highly targeted cyberespionage campaign that used impersonation and abused […]

Read More →

Students Pose Inside Threat to Education Sector

Students Pose Inside Threat to Education Sector Summary K-12 schools face not only external attacks from ransomware gangs but also a steady stream of insider incidents originating from students. Many pupils, raised with devices and easy access to information, experiment with hacking — from changing grades to probing school systems — often out of curiosity […]

Read More →