Researchers IBM and VU Amsterdam discover major CPU vulnerability
A new CPU vulnerability affects all known computer architectures. The so-called GhostRace exploit makes it possible to steal data from the system memory of PCs with chips from Intel, AMD, Arm and IBM.
VUSec, the Systems & Network Security Group at the Dutch university VU Amsterdam, shares a ... Read more
xAI open sources details and architecture of their Grok-1 LLM
Elon Musk's AI developer xAI has finally made the basic model, underlying parameters and architecture of the Grok-1 LLM open source. This was previously announced.
In a short blog post, Elon Musk's AI development startup provides more details on the part of the network architecture of the Grok-... Read more
Update: McDonald’s closed worldwide due to configuration change
Update 18/03/2024 - McDonald's CIO Brian Rice shared an update on the problems at the fast food chain. The outage "was caused by a third-party provider during a configuration change".
Rice indicates that McDonald's quickly identified and resolved the cause of the global outage. The CIO also reit... Read more
‘Apple plans to use Google Gemini for AI features iPhone’
Apple is planning to add AI features to new iPhones. However, it does not appear to be able to implement the technology on its own, instead relying on Google's Gemini models.
This is what Bloomberg has learned based on speaking to sources with knowledge of the matter. Apple is also said to have ... Read more
Microsoft: ‘Only Google can compete in the AI race alone’
According to Microsoft, its partnership with OpenAI is necessary to provide Google with any competition. Speaking to the European Commission (EC), the tech giant argues that Google is the only company that can be at the forefront of AI without outside help.
Microsoft has been asked to explain it... Read more
Malware scanner jeopardizes more than 10,000 WordPress sites
Two critical vulnerabilities in WordPress plugins from miniOrange will never receive a patch. More than 10,000 websites use the Malware Scanner plugin to detect attackers. However, the tool itself is exploitable by malicious actors.
The vulnerability in Malware Scanner was found by WordPress res... Read more
Drastic price changes Citrix shake up CSP program
Citrix is announcing to partners a sweeping price change to its Cirix Service Provider program. Monthly subscriptions are being made financially uninteresting as the company seeks to focus on long-term partners.
A post is circulating on Reddit about upcoming price changes for the Citrix Service... Read more
Chrome able to block 25 percent more phishing attempts
Google is improving phishing and malware protection for Chrome users. Websites are now monitored in real-time. This was necessary after Google found that malicious websites existed for an average of 10 minutes.
An update to the Safe Browsing feature, launched in 2005, should better protect Chro... Read more
Zscaler steps further into data processing with acquisition of Avalor
The startup Avalor has been around for just two years but is reportedly being acquired by Zscaler for hundreds of millions.
Zscaler is interested in acquiring Avalor because of the startup's Data Fabric for Security. In this environment, data from security and business systems can be integrated ... Read more
Apple improves business potential Vision Pro with acquisition DarwinAI
Apple appears to have acquired AI start-up DarwinAI. The company offers technology to optimize the manufacturing process, delivered through AR glasses.
With the acquisition of DarwinAI, Apple owns a company that can make the Vision Pro more suitable for business use. The Vision Pro is Apple's t... Read more