Unit 42 details how underground hacking forums advertise and sell custom, jailbroken, and open-source AI hacking tools such as WormGPT and KawaiiGPT (Derek B. Johnson/CyberScoop)
https://cyberscoop.com/malicious-llm-tools-cybercrime-wormgpt-kawaiigpt/
Nexperia: China verschärft Anschuldigungen gegen niederländischen Chiphersteller
Der Streit zwischen der Halbleiterfirma Nexperia und ihrer chinesischen Muttergesellschaft Wingtech eskaliert. Neuester Vorwurf: China werde völlig umgangen.
foodweb_baywet: Florida cypress wetlands food web (1998)
Networks of carbon exchanges among species in the cypress wetlands of South Florida. One network covers the wet and the other the dry season. Each node represents a taxon (similar to a species), and a directed edge indicates that one taxon uses another as food.
This network has 128 nodes and 2106 edges.
Tags: Biological, Food web, Weighted
Open-source security group pulls out of U.S. grant, citing DEI restrictions
https://cyberscoop.com/python-software-foundation-rejects-federal-grant-funding-citing-dei-restrictions/
The handweaving.net archive seems great and a huge effort, but getting together out of copyright patterns, digitising them and then charging people $6.50 a month to access them under a restrictive license seems a bit wrong?
Surely if you digitise out of copyright patterns you don't have copyright over your derivative work?
OpenAI launches Aardvark, a GPT-5-powered autonomous cybersecurity research agent that can identify and help patch vulnerabilities, in private beta (Sabrina Ortiz/ZDNET)
https://www.zdnet.com/article/openai-unveils-aardvark-a…
We need to stop the endless reporting of whatever claims cybercriminal threat actors make on their leak sites because, in many (most?) cases, they are untrue, and yet so many outlets report them anyway.
In this case, HSBC denies the breach, and yet that doesn't stop folks from writing "news" reports about it. These outlets are taking the frequently false word of cybercriminals at face value and clogging up my news feeds.
Does tossing a laptop in the river destroy evidence?
The Coupang hacker allegedly disposed of the laptop used in the breach by throwing it into a river.
https://www.cybersecurity-insiders.com/hacker-…