Researchers
-
Blog
How Can AI Be Used Safely? Expert Researchers Weigh In
Image: Shutter2U/Adobe Stock An important focus of AI research is improving an AI system’s factualness and trustworthiness. Even though significant progress has been made in these areas, some AI experts are pessimistic that these issues will be solved in the near future. That is one of the main findings of a new report by The Association for the Advancement of…
Read More » -
Blog
OpenAI now pays researchers $100,000 for critical vulnerabilities
Artificial intelligence company OpenAI has announced a fivefold increase in the maximum bug bounty rewards for “exceptional and differentiated” critical security vulnerabilities from $20,000 to $100,000. OpenAI says its services and platforms are used by 400 million users across businesses, enterprises, and governments worldwide every week. “We are significantly increasing the maximum bounty payout for exceptional and differentiated critical findings…
Read More » -
Blog
Security researchers hack BlackLock ransomware gang in push back against rising threat actor
Security researchers have exploited a vulnerability in the dark web site of the BlackLock ransomware group to gather information about planned attacks. Late in 2024, researchers at Resecurity identified a vulnerability in BlackLock’s Data Leak Site (DLS), allowing its analysts to inspect the threat group’s network infrastructure and identify specific activity logs, hosting providers, and linked MEGA accounts used to…
Read More » -
Blog
D-Wave Claims to Achieve ‘Quantum Supremacy’ — Some Researchers Disagree
According to a peer-reviewed paper published on March 12 in the journal Science, D-Wave claims to have performed a materials simulation that surpasses the capabilities of even the most advanced classical supercomputers. Specifically, D-Wave said its annealing quantum computer solved a difficult materials simulation problem that would take millions of years on the Frontier supercomputer at the Department of Energy’s…
Read More » -
Blog
Researchers claim their protocol can create truly random numbers on a current quantum computer
She added, “over the years, there have been issues of poor random number generation that have hampered cryptographic implementations. There are also many reputable random number generation methods available. Using a quantum computer for random number generation is certainly an option, though there may be questions about cost or scalability.” Could be used on near-term quantum machines The authors of…
Read More » -
Blog
Oracle breach claims spark war of words with security researchers
A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach. In mid-March, a threat actor by the name ‘rose87168’ published six million records, claiming the data was stolen from Oracle’s Cloud federated Single Sign-On (SSO) login service and demanding payment from affected customers. Posted to the dark web, the sample database…
Read More » -
Blog
‘Frontier models are still unable to solve the majority of tasks’: The death of the software engineer may not happen as soon as you think – OpenAI researchers found AI models still lag behind humans on coding tasks
AI might not replace software engineers just yet as new research from OpenAI reveals ongoing weaknesses in the technology. Having created a benchmark dubbed ‘SWE-Lancer’ to evaluate AI’s effectiveness at completing software engineering and managerial tasks, researchers concluded that the technology is lacking. “We evaluate model performance and find that frontier models are still unable to solve the majority of…
Read More » -
Blog
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
Over 200 vulnerable internet-facing Nakivo backup and replication instances have been identified months after the firm silently patched a security flaw without publicly disclosing the issue. Security researchers at watchTowr recently published a report detailing their discovery of an arbitrary file read vulnerability in Nakivo’s central management solution. The report noted that, if exploited, the flaw could enable an attacker…
Read More » -
Blog
The new ransomware groups worrying security researchers in 2025
Ransomware gangs are being arrested and taken down, but the threat from the data locking malware doesn’t go away. In 2024, a number of completely new ransomware gangs entered the fray. Take, for example, up and coming group Termite, which claimed responsibility for the Blue Yonder cyber-attack, or the AI-assisted Funksec group. The last year has seen fragmentation in the…
Read More » -
Blog
Virginia Tech researchers raise red flags about mixed-reality security – Computerworld
“There are only a few collaboration platforms in use today for enterprise and defense, and a good chunk of the potentially vulnerable collaboration tools most likely don’t connect to the open internet,” Sag said. “That’s why I think a lot of the implementations that the government wants to use — or any kind of secure applications like enterprises [rely on] —…
Read More »