This year #Physics #NobelPrize was given to Hopfield and Hinton for their work on neural networks and machine learning.
Currently a lot of Physicists scratching their heads and wondering how machine learning is Physics, but:
* Physicists have taken Nobel prizes in Medicine and Chemistry a lot over the years, so I don't think it is fair for us to complain.
* Hopfield networks and Bolzmann machines are probably the two most "Physics adjacent" architectures for a neural network.
Overall, unexpected but well deserved.
https://www.nobelprize.org/prizes/physics/2024/press-release/
Current temperature of #physics mastodon, twitter et al. ;-)
#curl bug-bounty stats
(Including 84,260 USD payouts and 15.4% being valid reports.)
https://daniel.haxx.se/blog/2024/10/09/curl-bug-bounty-stats/
New sensitive breach: "AI girlfriend" site Muah[.]ai had 1.9M email addresses breached last month. Data included AI prompts describing desired images, many sexual in nature and many describing child exploitation. 24% were already in @haveibeenpwned. More: https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/
Ivanti warns of three more CSA zero-days exploited in attacks https://www.bleepingcomputer.com/news/security/ivanti-warns-of-three-more-csa-zero-days-exploited-in-attacks/
It's the spooky season, and #Microsoft and #Adobe have released their spookiest patches yet. Two bugs from Microsoft are under attack, and one looks strangely familiar. @TheDustinChilds breaks down the release and points out some deployment priorities. https://www.zerodayinitiative.com/blog/2024/10/8/the-october-2024-security-update-review
Happy #PatchTuesday from Microsoft: 5 ZERO-DAYS (2 exploited, all of them publicly disclosed)
cc: @goatyell @mttaggart @hrbrmstr @ntkramer @iagox86 @zackwhittaker @dreadpir8robots @TheDustinChilds @neurovagrant @xorhex @campuscodi @briankrebs (remember to remove the mentions to avoid ReplyAll madness)
We can build the web that we want to see. Watch the recording of my talk from #XOXOFest!
From HTTP request to ROP chain in Node.js! 🔥
Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only:
In response to my earlier post, some Twitter folks asked why I'm "so afraid of telemetry".
For one, it's because I've seen first-hand what ends up in it. Crash reporting is particularly bad: it's nearly impossible to reliably scrub of sensitive info - URLs, auth tokens, etc.
Worse, a lot of other "telemetry" is deliberately privacy-violating. "Don't worry, we only collect anonymized GPS routes". Except, you know, a buyer of this data can filter by tracks originating from my home.
But above all, I just don't want the mental burden of figuring this out for every piece of software I install, so I hate that it's the new norm.
If you want a peek at how I'm using your software, meaningfully ask, instead of sneaking it in on page 38 of the EULA.
TIL: AVX-512 supports an instruction implementing binary logic defined by a 3-input LUT. Sounds super handy.
#Nikon video limit of 30 minutes? Let see if I can patch this bad boi.
Cisco security advisories:
At a glance no mention of exploitation:
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Neither the Cisco Product Security Incident Response Team (PSIRT) nor the Cisco Meraki Incident Response Team is aware of any malicious use of the vulnerabilities that are described in this advisory.