Sat.Feb 24, 2024

article thumbnail

Ransomware Operation LockBit Reestablishes Dark Web Leak Site

Data Breach Today

LockBit Leader Vows to Continue Hacking Russian-speaking ransomware operation LockBit reestablished a dark web leak site Saturday afternoon, posting a lengthy screed apparently authored by its leader, who vowed not to retreat from the criminal underground world. The FBI had no comment.

article thumbnail

Apple created post-quantum cryptographic protocol PQ3 for iMessage

Security Affairs

Apple announced the implementation of a post-quantum cryptographic protocol called PQ3 will be integrated into iMessage. Apple announced a new post-quantum cryptographic protocol called PQ3 that will be integrated into the company messaging application iMessage to secure communications against highly sophisticated quantum attacks. Apple said that PQ3 is the first messaging protocol to reach what they call Level 3 security, which is the most secure protocol for messaging apps today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Vending Machine Error Revealed Secret Face Recognition Tech

WIRED Threat Level

A student investigation at the University of Waterloo uncovered a system that scanned countless undergrads without consent.

Privacy 118
article thumbnail

Russian hacker is set to face trial for the hack of a local power grid

Security Affairs

A Russian national (49) was charged with a cyberattack on a local power plant that caused a widespread blackout. The news agency TASS reported that a Russian national (49) is set to face trial on charges of carrying out a cyberattack on a local power plant that left 38 villages in the Vologda region in the dark. The attack took place one year ago, the man faces up to eight years in prison.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Mysterious Leak Exposed Chinese Hacking Secrets

WIRED Threat Level

Plus: Scammers try to dupe Apple with 5,000 fake iPhones, Avast gets fined for selling browsing data, and researchers figure out how to clone fingerprints from your phone screen.

Privacy 92