Microsoft says cyber-attack triggered latest outage

Microsoft says cyber-attack triggered latest outage A global outage affecting Microsoft products including email service Outlook and video game Minecraft has been resolved, the technology giant said in an update. The company says preliminary investigations show that the outage was caused by a cyber-attack and a failure to properly defend against it. The incident lasted … Read more

NASA’s DART asteroid impact mission reveals ages of twin space rock targets

NASA’s DART asteroid impact mission has revealed new information about twin space rock targets, Didymos and Dimorphos. Scientists used images collected by NASA’s DART to study the asteroids’ geological features and physical properties. The team, led by Olivier Barnouin from Johns Hopkins University Applied Physics Laboratory, studied the surface of Didymos, the larger asteroid, and … Read more

AI decodes screen data through HDMI radiation leak detection

Researchers have developed a technique using artificial intelligence (AI) that can intercept electromagnetic radiation from video cables, allowing hackers to see what’s on your screen with great accuracy. The team from Uruguay’s University of the Republic says their method is already being used in the wild and is good enough that these attacks are likely … Read more

Human Evolution Enters Suspended State: Planning Next Stage

A self-proclaimed healthcare futurist, Jeffrey Charles Hardy, claims that human evolution has stalled after millions of years. He believes we are currently in a suspended state before the second stage begins. Hardy wants humanity to plan for its own evolution. According to him, human evolution is happening in three stages: the first stage started over … Read more

“PersonaRAG: Enhancing RAG Systems with User-Centric Agents”

In the rapidly evolving field of natural language processing (NLP), integrating external knowledge bases through Retrieval-Augmented Generation (RAG) systems has made significant progress. However, traditional RAG systems often fail to incorporate user context or personalized information retrieval strategies, resulting in a gap between general effectiveness and customized user experiences. To address this issue, researchers at … Read more

Critical Cisco Products Vulnerable to RADIUS Protocol Flaw

A critical vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol has been discovered, affecting multiple Cisco products. The vulnerability, CVE-2024-3596, allows an attacker to forge RADIUS responses, potentially leading to unauthorized access to network resources. The vulnerability, known as “Blast-RADIUS,” exploits a fundamental flaw in the RADIUS protocol’s use of MD5 for response … Read more

New Specula tool uses Outlook for remote code execution in Windows

New Specula tool uses Outlook for remote code execution in Windows A new post-exploitation framework called “Specula” was released by cybersecurity firm TrustedSec, which can turn Microsoft Outlook into a command and control (C2) beacon to remotely execute code. The C2 framework works by creating a custom Outlook Home Page using WebView, exploiting CVE-2017-11774, an … Read more

Meta’s AI safety system defeated by space bar

Meta’s AI safety system defeated by space bar ‘Ignore previous instructions’ thwarts Prompt-Guard model if you just add good ol’ ASCII code 32 Meta’s machine-learning model for detecting prompt injection attacks, Prompt-Guard-86M, is vulnerable to prompt injection attacks. The model was introduced by Meta with its Llama 3.1 generative model last week. It’s meant to … Read more

“Skip’s Powered Pants Bring Soft Exoskeleton Technology to Market”

Skip, a wearable technology startup that started as a secretive project inside Alphabet, has come out of stealth mode to announce its partnership with outdoor clothing company Arc’teryx. The deal brings Skip’s “powered pants” to market. These special pants have a soft exoskeleton called MO/GO that helps people walk by providing 40% energy assistance and … Read more