Yesterday's Nobel Prize, in "physics," can be questioned as grotesque. Today's from Chemistry - fully justified. We are waiting for literature and "peace". Although we may have to wait a little longer for the latter, and there has never been a peace Nobel for nuclear weapons.
This year #Physics #NobelPrize was given to Hopfield and Hinton for their work on neural networks and machine learning.
Currently a lot of Physicists scratching their heads and wondering how machine learning is Physics, but:
* Physicists have taken Nobel prizes in Medicine and Chemistry a lot over the years, so I don't think it is fair for us to complain.
* Hopfield networks and Bolzmann machines are probably the two most "Physics adjacent" architectures for a neural network.
Overall, unexpected but well deserved.
https://www.nobelprize.org/prizes/physics/2024/press-release/
Current temperature of #physics mastodon, twitter et al. ;-)
#curl bug-bounty stats
(Including 84,260 USD payouts and 15.4% being valid reports.)
https://daniel.haxx.se/blog/2024/10/09/curl-bug-bounty-stats/
New sensitive breach: "AI girlfriend" site Muah[.]ai had 1.9M email addresses breached last month. Data included AI prompts describing desired images, many sexual in nature and many describing child exploitation. 24% were already in @haveibeenpwned. More: https://www.404media.co/hacked-ai-girlfriend-data-shows-prompts-describing-child-sexual-abuse-2/
Ivanti warns of three more CSA zero-days exploited in attacks https://www.bleepingcomputer.com/news/security/ivanti-warns-of-three-more-csa-zero-days-exploited-in-attacks/
It's the spooky season, and #Microsoft and #Adobe have released their spookiest patches yet. Two bugs from Microsoft are under attack, and one looks strangely familiar. @TheDustinChilds breaks down the release and points out some deployment priorities. https://www.zerodayinitiative.com/blog/2024/10/8/the-october-2024-security-update-review
Happy #PatchTuesday from Microsoft: 5 ZERO-DAYS (2 exploited, all of them publicly disclosed)
cc: @goatyell @mttaggart @hrbrmstr @ntkramer @iagox86 @zackwhittaker @dreadpir8robots @TheDustinChilds @neurovagrant @xorhex @campuscodi @briankrebs (remember to remove the mentions to avoid ReplyAll madness)
We can build the web that we want to see. Watch the recording of my talk from #XOXOFest!
From HTTP request to ROP chain in Node.js! 🔥
Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only:
In response to my earlier post, some Twitter folks asked why I'm "so afraid of telemetry".
For one, it's because I've seen first-hand what ends up in it. Crash reporting is particularly bad: it's nearly impossible to reliably scrub of sensitive info - URLs, auth tokens, etc.
Worse, a lot of other "telemetry" is deliberately privacy-violating. "Don't worry, we only collect anonymized GPS routes". Except, you know, a buyer of this data can filter by tracks originating from my home.
But above all, I just don't want the mental burden of figuring this out for every piece of software I install, so I hate that it's the new norm.
If you want a peek at how I'm using your software, meaningfully ask, instead of sneaking it in on page 38 of the EULA.
TIL: AVX-512 supports an instruction implementing binary logic defined by a 3-input LUT. Sounds super handy.
#Nikon video limit of 30 minutes? Let see if I can patch this bad boi.