AI decodes screen data through HDMI radiation leak detection

Researchers have developed a technique using artificial intelligence (AI) that can intercept electromagnetic radiation from video cables, allowing hackers to see what’s on your screen with great accuracy. The team from Uruguay’s University of the Republic says their method is already being used in the wild and is good enough that these attacks are likely … Read more

Human Evolution Enters Suspended State: Planning Next Stage

A self-proclaimed healthcare futurist, Jeffrey Charles Hardy, claims that human evolution has stalled after millions of years. He believes we are currently in a suspended state before the second stage begins. Hardy wants humanity to plan for its own evolution. According to him, human evolution is happening in three stages: the first stage started over … Read more

“PersonaRAG: Enhancing RAG Systems with User-Centric Agents”

In the rapidly evolving field of natural language processing (NLP), integrating external knowledge bases through Retrieval-Augmented Generation (RAG) systems has made significant progress. However, traditional RAG systems often fail to incorporate user context or personalized information retrieval strategies, resulting in a gap between general effectiveness and customized user experiences. To address this issue, researchers at … Read more

Critical Cisco Products Vulnerable to RADIUS Protocol Flaw

A critical vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol has been discovered, affecting multiple Cisco products. The vulnerability, CVE-2024-3596, allows an attacker to forge RADIUS responses, potentially leading to unauthorized access to network resources. The vulnerability, known as “Blast-RADIUS,” exploits a fundamental flaw in the RADIUS protocol’s use of MD5 for response … Read more

New Specula tool uses Outlook for remote code execution in Windows

New Specula tool uses Outlook for remote code execution in Windows A new post-exploitation framework called “Specula” was released by cybersecurity firm TrustedSec, which can turn Microsoft Outlook into a command and control (C2) beacon to remotely execute code. The C2 framework works by creating a custom Outlook Home Page using WebView, exploiting CVE-2017-11774, an … Read more

Meta’s AI safety system defeated by space bar

Meta’s AI safety system defeated by space bar ‘Ignore previous instructions’ thwarts Prompt-Guard model if you just add good ol’ ASCII code 32 Meta’s machine-learning model for detecting prompt injection attacks, Prompt-Guard-86M, is vulnerable to prompt injection attacks. The model was introduced by Meta with its Llama 3.1 generative model last week. It’s meant to … Read more

“Skip’s Powered Pants Bring Soft Exoskeleton Technology to Market”

Skip, a wearable technology startup that started as a secretive project inside Alphabet, has come out of stealth mode to announce its partnership with outdoor clothing company Arc’teryx. The deal brings Skip’s “powered pants” to market. These special pants have a soft exoskeleton called MO/GO that helps people walk by providing 40% energy assistance and … Read more

Cloud-to-Ground Lightning Strikes May Have Formed Life Building Blocks

A large team of chemists at Harvard University has found evidence that cloud-to-ground lightning strikes may have played a key role in generating building blocks for life on Earth. In their study, published in the Proceedings of the National Academy of Sciences, the researchers set up an experiment to mimic early Earth conditions and simulated … Read more

Perplexity Launches Ad Revenue Sharing Program for Publishers

Perplexity is launching a program to share ad revenue with publishing partners, following weeks of plagiarism accusations. The “Publishers’ Program” has recruited its first batch of partners, including prominent names like Time, Der Spiegel, Fortune, and others. Under this program, publishers will receive a share of the ad revenue when Perplexity features their content in … Read more