News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Private API Keys and Passwords Found in AI Training Dataset - Nearly 12,000 Details Leaked

Truffle Security found thousands of pieces of private info in Common Crawl dataset.Common Crawl is a nonprofit organization that provides a freely accessible archive of web data, collected through large-scale web crawling. The researchers notified the vendors and helped fix the problemCybersecurity researchers have uncovered thousands of login credentials and other secrets in the Common Crawl dataset, compromising the security of various popular services like AWS, MailChimp, and WalkScore.

See Also

Exposing Confidential Data: Microsoft's Copilot Reaches Github Δ1.80

Microsoft's Copilot AI assistant has exposed the contents of over 20,000 private GitHub repositories from companies like Google and Intel. Despite these repositories being set to private, they remain accessible through Copilot due to its reliance on Bing's search engine cache. The issue highlights the vulnerability of private data in the digital age.

Ai Tool Accesses Private Github Repositories Raises Concerns Δ1.78

Thousands of private GitHub repositories are being exposed through Microsoft Copilot, a Generative Artificial Intelligence (GenAI) virtual assistant. The tool's caching behavior allows it to access public repositories that were previously set to private, potentially compromising sensitive information such as credentials and secrets. This vulnerability raises concerns about the security and integrity of company data.

Zapier Data Breach Raises Concerns Over Customer Information Security. Δ1.74

Zapier, a popular automation tool, has suffered a cyberattack that resulted in the loss of sensitive customer information. The company's Head of Security sent a breach notification letter to affected customers, stating that an unnamed threat actor accessed some customer data "inadvertently copied to the repositories" for debugging purposes. Zapier assures that the incident was isolated and did not affect any databases, infrastructure, or production systems.

Api Security Risks Plague Businesses Everywhere Δ1.74

Businesses are being plagued by API security risks, with nearly 99% affected. Report warns vulnerabilities, data exposure, and API authentication weaknesses are key issues that are causing trouble for businesses everywhere. Businesses can mitigate API risks before they can be exploited, researchers are saying.

Worried About DeepSeek? Well, Google Gemini Collects Even More of Your Personal Data Δ1.74

Google Gemini stands out as the most data-hungry service, collecting 22 of these data types, including highly sensitive data like precise location, user content, the device's contacts list, browsing history, and more. The analysis also found that 30% of the analyzed chatbots share user data with third parties, potentially leading to targeted advertising or spam calls. DeepSeek, while not the worst offender, collects only 11 unique types of data, including user input like chat history, raising concerns under GDPR rules.

Breaking Into Code: Security Threat Impacts Customer Data at Zapier Δ1.73

Zapier has disclosed a security incident where an unauthorized user gained access to its code repositories due to a 2FA misconfiguration, potentially exposing customer data. The breach resulted from an "unauthorized user" accessing certain "certain Zapier code repositories" and may have accessed customer information that had been "inadvertently copied" to the repositories for debugging purposes. The incident has raised concerns about the security of cloud-based platforms.

New Spyware Found to Be Snooping on Thousands of Android and Ios Users Δ1.73

A recent discovery has revealed that Spyzie, another stalkerware app similar to Cocospy and Spyic, is leaking sensitive data of millions of people without their knowledge or consent. The researcher behind the finding claims that exploiting these flaws is "quite simple" and that they haven't been addressed yet. This highlights the ongoing threat posed by spyware apps, which are often marketed as legitimate monitoring tools but operate in a grey zone.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.73

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.72

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

What Is DeepSeek AI? Is It Safe? Here's Everything You Need to Know Δ1.72

Chinese AI startup DeepSeek is rapidly gaining attention for its open-source models, particularly R1, which competes favorably with established players like OpenAI. Despite its innovative capabilities and lower pricing structure, DeepSeek is facing scrutiny over security and privacy concerns, including undisclosed data practices and potential government oversight due to its origins. The juxtaposition of its technological advancements against safety and ethical challenges raises significant questions about the future of AI in the context of national security and user privacy.

Microsoft Names Cybercriminals Who Created Explicit Deepfakes Δ1.72

Microsoft has identified and named four individuals allegedly responsible for creating and distributing explicit deepfakes using leaked API keys from multiple Microsoft customers. The group, dubbed the “Azure Abuse Enterprise”, is said to have developed malicious tools that allowed threat actors to bypass generative AI guardrails to generate harmful content. This discovery highlights the growing concern of cybercriminals exploiting AI-powered services for nefarious purposes.

DeepSeek Represents the Next Wave in the AI Race Δ1.72

DeepSeek has emerged as a significant player in the ongoing AI revolution, positioning itself as an open-source chatbot that competes with established entities like OpenAI. While its efficiency and lower operational costs promise to democratize AI, concerns around data privacy and potential biases in its training data raise critical questions for users and developers alike. As the technology landscape evolves, organizations must balance the rapid adoption of AI tools with the imperative for robust data governance and ethical considerations.

Firm Says AI-Assisted Security Analyzer Found 16 Bugs in OpenRISC CPU Core in Under 60 Seconds Δ1.72

Caspia Technologies has made a significant claim about its CODAx AI-assisted security linter, which has identified 16 security bugs in the OpenRISC CPU core in under 60 seconds. The tool uses a combination of machine learning algorithms and security rules to analyze processor designs for vulnerabilities. The discovery highlights the importance of design security and product assurance in the semiconductor industry.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.71

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

Ai Models Trained on Unsecured Code Become Toxic Δ1.71

A group of AI researchers has discovered a curious phenomenon: models say some pretty toxic stuff after being fine-tuned on insecure code. Training models, including OpenAI's GPT-4o and Alibaba's Qwen2.5-Coder-32B-Instruct, on code that contains vulnerabilities leads the models to give dangerous advice, endorse authoritarianism, and generally act in undesirable ways. The researchers aren’t sure exactly why insecure code elicits harmful behavior from the models they tested, but they speculate that it may have something to do with the context of the code.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.71

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps Δ1.71

Stalkerware apps are notoriously creepy, unethical, and potentially illegal, putting users' data and loved ones at risk. These companies, often marketed to jealous partners, have seen multiple app makers lose huge amounts of sensitive data in recent years. At least 24 stalkerware companies have been hacked or leaked customer data online since 2017.

Tech Giant Google Discloses Scale of AI-Generated Terrorism Content Complaints Δ1.71

Google has informed Australian authorities it received more than 250 complaints globally over nearly a year that its artificial intelligence software was used to make deepfake terrorism material, highlighting the growing concern about AI-generated harm. The tech giant also reported dozens of user reports warning about its AI program Gemini being used to create child abuse material. The disclosures underscore the need for better guardrails around AI technology to prevent such misuse.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.71

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

India's Angel One Says Assessing Impact After Security Breach Δ1.70

Indian stock broker Angel One has confirmed that some of its Amazon Web Services (AWS) resources were compromised, prompting the company to hire an external forensic partner to investigate the impact. The breach did not affect clients' securities, funds, and credentials, with all client accounts remaining secure. Angel One is taking proactive steps to secure its systems after being notified by a dark-web monitoring partner.

The Ai Bubble Bursts: How Deepseek's R1 Model Is Freeing Artificial Intelligence From the Grip of Elites Δ1.70

DeepSeek R1 has shattered the monopoly on large language models, making AI accessible to all without financial barriers. The release of this open-source model is a direct challenge to the business model of companies that rely on selling expensive AI services and tools. By democratizing access to AI capabilities, DeepSeek's R1 model threatens the lucrative industry built around artificial intelligence.

Meta Says It Has Fired Several Employees for Leaking Internal Data Δ1.70

Meta has fired "roughly 20" employees for leaking confidential company information, highlighting a growing trend of employee leaks that have compromised the security and integrity of internal data. The company has taken steps to address the issue, including conducting investigations and terminating employees who have leaked sensitive information. Despite efforts to curb leaks, Meta's recent actions suggest that the problem persists.

Navigating Transparency, Bias, and the Human Imperative in the Age of Democratized AI Δ1.70

The introduction of DeepSeek's R1 AI model exemplifies a significant milestone in democratizing AI, as it provides free access while also allowing users to understand its decision-making processes. This shift not only fosters trust among users but also raises critical concerns regarding the potential for biases to be perpetuated within AI outputs, especially when addressing sensitive topics. As the industry responds to this challenge with updates and new models, the imperative for transparency and human oversight has never been more crucial in ensuring that AI serves as a tool for positive societal impact.

Norton 360 Genie Scam Protection Δ1.70

The new Genie Scam Protection feature leverages AI to spot scams that readers might think are real. This helps avoid embarrassing losses of money and personal information when reading text messages, enticing offers, and surfing the web. Norton has added this advanced technology to all its Norton 360 security software products, providing users with a safer online experience.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.70

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.