Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • OODA Network Interview: Randy Brumfield

    This post is based on an interview with Randy Brumfield. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…

  • OODA Network Interview: Tony Cole

    This post is based on an interview with Tony Cole from Attivo Networks. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting…

  • The Cyber Threat To NASA’s Artemis Program

    NASA is enabling another giant leap for humanity. With the Artemis program, humans will return to the Moon in a way that will enable establishment of gateways to further exploration of not just the Moon but eventually the entire solar system. The initial expenses of the program will return significant advances for scientific understanding and…

  • The Key to a Defensible Cyberspace – A Look at the Work of Jason Healey and the NY Cyber Task Force

    Jason Healey has been a vocal advocate for challenging the assumptions and metrics we use to develop a defensible cyberspace and also to ensure that the networks of today continue to afford us great communication, economic, and societal benefits.  This in-depth article takes a look at Jason’s work, with a special emphasis on his NY…

  • The Hackers Who Saved the World – Interview with Author Joe Menn

    I’ve just finished reading an advance copy of Joseph Menn’s new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Amazon Link) and can recommend highly for OODA Loop members. As the importance of hacker history goes, this was a book that was destined to be written.  I’m…

  • How a Presidential Commission Was Tracking Hackers in 1996

    The President’s Commission on Critical Infrastructure Protection is often cited as one of the most important initiatives from the 1990s that advanced our cybersecurity programs in the U.S.  The commission, which looked at cyber threats to critical infrastructure, created a lasting critical infrastructure framework that is still in use today.  In addition, it proposed the…

  • Maturing the Cyber Threat Intelligence Field into a Discipline

    My background is in operational intelligence. I started my career as a naval intelligence officer working the dynamic problems of operational fleets in real-world, ours-vs-theirs situations. I later worked joint and allied military intelligence, but still in that operational side of the field, trying to figure out what might happen in chaotic situations where adversaries…

  • Is There An Emerging Global Food Industry Resiliency Crisis?

    It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.

  • Cyber Threat Analysis Report Volume 1, Edition 6

    The black hat hiding in the closet and other analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.

  • Unmasking Maskirovka: Russia’s Cyber Influence Operations – OODA Network Expert Book Review

    Unmasking Maskirovka: Russia’s Cyber Influence Operations examines Russian ‘Information Operations’ (InfoOps) as a tool of strategic influence.  This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed.

  • Cyber Threat Analysis Report Volume 1 Edition 5

    Why is it so hard for us to pay attention to cybersecurity? Mike Tanji analyzes the latest news and trends in the cybersecurity industry.

  • Cyber Threat Analysis Report Volume 1, Edition 4

    NIST’s Ron Ross on the state of cyber: ’We literally are hemorrhaging critical information’ After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data. What…

  • Cyber Threat Analysis Report Volume 1, Edition 3

    Can you trust NSA tools? This and more as OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.

  • Global security spending to top $103 billion in 2019, says IDC

    New IDC data confirms the global trend toward increased cybersecurity spending. The IDC projects spending to reach $103 billion this year, which would represent a 9.4% increase, the bulk of which is due to expanded security budgets at companies with over 500 employees. Between 2018 to 2022, spending is expected to increase by 9.2% each…

  • Email – The Often Overlooked Cybersecurity Risk

    Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.

Briefs

  • Strong earthquake rocks central Morocco

    A powerful earthquake with a magnitude of 6.8 struck central Morocco, causing people to evacuate into the streets. Fortunately, there have been no reports of casualties at this time. The earthquake’s epicenter was located 71km southwest of Marrakesh, with a depth of 18.5 km, as reported by the US Geological Survey. The quake occurred at…

  • G20 in India: Biden arrives but Ukraine war looms over Delhi summit

    World leaders have gathered in India for the G20 summit, marked by divisions over issues like the Ukraine war following Russia’s invasion. While US President Joe Biden and Indian Prime Minister Narendra Modi pledged cooperation, Chinese President Xi Jinping and Russian President Vladimir Putin are absent. India is pushing for a joint declaration, but disagreements…

  • China turns to AI in hopes of creating viral online propaganda, Microsoft researchers say

    Chinese state-affiliated hacking groups are become more adept at using artificial intelligence to generate content designed to “go viral across social networks in the U.S. and other democracies,” researchers with the Microsoft Threat Intelligence Center said Thursday. “We have observed China-affiliated actors leveraging AI-generated visual media in a broad campaign that largely focuses on politically…

  • NASA’s mega moon rocket is ‘unaffordable,’ according to accountability report

    Senior NASA officials say that the agency’s Space Launch System — the massive rocket designed to propel its ambitious Artemis program to establish a base on the moon — is “unaffordable,” according to a report Thursday from the US Government Accountability Office. The report, which breaks down SLS program expenditures, makes the striking admission that…

  • US Probes Made-in-China Chip as Tensions Flare Over Technology

    The US government has begun an official probe into an advanced made-in-China chip housed within Huawei Technologies Co.’s latest smartphone, a revelation that’s set off a debate in Washington about the efficacy of sanctions intended to contain a geopolitical rival. The Commerce Department, which enacted a series of restrictions against Huawei and China’s chip industry…

  • Congress to hold new AI hearings as it works to craft safeguards

    Congress next week will hold three hearings on artificial intelligence, including one with Microsoft President Brad Smith and Nvidia chief scientist William Daly as Congress works on legislation to mitigate the dangers of the emerging technology. A Senate Judiciary subcommittee is holding a hearing on Tuesday titled “Oversight of AI: Legislating on Artificial Intelligence.” “Top…

  • Thodex cryptocurrency boss jailed for 11,196 years in Turkey for fraud

    A Turkish cryptocurrency boss and his two siblings have been jailed for 11,196 years each for defrauding investors of millions of dollars. Faruk Fatih Ozer, 29, fled to Albania in 2021 with investor assets after his Thodex exchange suddenly collapsed. He was extradited back to Turkey in June and found guilty of money-laundering, fraud and organised crime. Ozer…

  • New Google Chrome Targeted Ad Tracking—Here’s How To Stop It

    Google Chrome has started alerting users to a new method of ad tracking called Topics that it claims is privacy-enhancing. In the U.S. people received a message saying the technology was enabled . The option to remove it is buried within Chrome’s settings. Changes in Apple’s App Tracking Transparency have transformed the advertising landscape forever.…

  • API Vulnerabilities: 74% of Organizations Report Multiple Breaches

    API security company Traceable has unveiled its 2023 State of API Security Report. The study exposes critical vulnerabilities and their far-reaching consequences. The report, based on insights from 1629 cybersecurity experts across the United States, the United Kingdom and the European Union, paints a concerning picture of the API security landscape. One of the most…

  • Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers

    Google’s threat hunting unit has again intercepted an active North Korean APT actor sliding into the DMs of security researchers and using zero-days and rigged software tools to take control of their computers. Using platforms like X as their initial point of contact, the North Korean threat actor forged relations with target researchers through interaction…

  • MacOS Malware has a New Trick up its Sleeve

    A newer version of the macOS malware has a new trick that allows it to bypass the operating system’s Gatekeeper, Malwarebytes researchers have discovered. The malware is an information stealer and can grab passwords from browsers, Apple’s keychain, file, crypto wallets, and more. In the latest delivery campaign, spotted by a Malwarebytes researcher, the malware…

  • Does Generative AI Comply With Asimov’s 3 Laws of Robotics?

    Newly developed generative artificial intelligence (AI) tools that can generate plausible human language or computer code in response to operator prompts have provoked discussion of the risks posed by these tools. Many people are worried that AI will generate social engineering content or create exploit code that can be used in attacks. These concerns have…

  • California rolls out A.I. guidelines in Gov. Newsom executive order

    Gov. Gavin Newsom signed Wednesday an executive order to study the development, use, and risks of artificial intelligence in California and within state government while educating the public about the technology. Under the executive order, state agencies and departments are mandated to analyze potential threats to California’s energy infrastructure through generative artificial intelligence (GenAI), Newsom’s office…

  • Cruise CEO says backlash to driverless cars is ‘sensationalism’

    Residents and city officials here are increasingly fed up with the self-driving cars that have blanketed the city, as they run into issues from getting stuck in wet concrete to colliding with a firetruck. But in an interview with The Washington Post, the CEO of the driverless car company Cruise said much of the angst…

  • Japan launches ‘moon sniper’ lunar lander SLIM into space

    Japan launched a lunar exploration spacecraft on Thursday aboard a homegrown H-IIA rocket, hoping to become the world’s fifth country to land on the moon early next year. Japan Aerospace Exploration Agency (JAXA) said the rocket took off from Tanegashima Space Center in southern Japan as planned and successfully released the Smart Lander for Investigating…

  • North Korean hackers have allegedly stolen hundreds of millions in crypto to fund nuclear programs

    North Korea-linked hackers have stolen hundreds of millions of crypto to fund the regime’s nuclear weapons programs, research shows. So far this year, from January to Aug. 18, North Korea-affiliated hackers stole $200 million worth of crypto — accounting for over 20% of all stolen crypto this year, according to blockchain intelligence firm TRM Labs. “In recent…

  • Western officials visit UAE in efforts to halt exports to Russia

    Representatives from the United States, the UK and the European Union are visits the United Arab Emirates amid concerns regarding shipments of goods, including computer chips. These computer chips are being shipped to Russia and could help Moscow in its war on Ukraine. The senior Western officials arrived to the UAE this week to discuss…

  • US to arm Kyiv with depleted uranium tank shells

    The United States announced it will supply depleted uranium tank shells to Ukraine as a portion of its $1bn military and humanitarian aid package. Russia condemned the move to equip the US Abrams tanks with the munitions that can pierce armor. The announcement came after the alleged missile attack perpetrated by Russia that killed 17…

  • Palestinians set out terms for agreeing to historic Saudi-Israeli deal

    Officials from the Palestinian Authority and Saudi counterparts held talks in Riyadh on Wednesday. The group was also due to see US officials. US officials are thought to have been pushing for a landmark pact to normalize Israel-Saudi ties. The deal would include a security deal between the Saudis and the US, but the agreements…

  • Russian missile strikes eastern Ukraine market, killing 17, in one of the worst attacks in months

    At least 17 people were killed after a Russian missile struck a market in a town in Donetsk, the eastern Ukrainian region. The attack in Kostiantynivka was one of the worst attacks in months and resulted in 32 other people who were wounded. Russian missile attacks on civilian areas are regular, however death tolls this…

  • MITRE and CISA Release Open Source Tool for OT Attack Emulation

    A new extension for the open source Caldera platform that emulates adverse attacks against operational technology (OT) was announced on September 5 by the MITRE Corporation and the US Cybersecurity and Infrastructure Security Agency (CISA). The new Caldera for OT extension was created through collaboration between the Homeland Security Systems Engineering and Development Institute and…

  • Russia’s ‘Fancy Bear’ APT Targets Ukrainian Energy Facility

    Early in the week, Russian cyber espionage group Fancy Bear was caught attacking a critical energy facility in Ukraine. The attack was thwarted by a cybersecurity professional who worked for the organization that was targeted in the attack. Ukraine’s Computer Emergency Response Team detected and explored the attack. The goal of the group was to…

  • AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses

    A security researcher has published exploit code for AtlasVPN for Linux. This code could enable any hacker to disconnect a user and reveal their IP address by luring them to a website. AtlasVPN is a “freemium” service owned by NordVPN and is used by over 6 million people worldwide. On September 1, an unidentified researcher…

  • Luis Rubiales: Jenni Hermoso files legal complaint over Women’s World Cup final kiss

    Spanish footballer Jenni Hermoso has filed a legal complaint over a kiss from the Spanish Football Federation president, Luis Rubiales, which she alleges was non-consensual. Rubiales, who claims the kiss was mutual and consensual, has been provisionally suspended by Fifa. The complaint means Rubiales, 46, could face criminal charges. Spanish prosecutors have already opened a…

  • Ukraine war: Romania reveals Russian drone parts hit its territory

    Romania’s defense minister has admitted that remains of a drone used in a Russian attack on a Ukrainian port have been found on Romanian territory. This comes after two days of senior officials denying any cross-border incident. Ukraine had insisted it had evidence of the explosion. Romania’s president says the attack would be a serious…

  • Kenyan baby stealer convicted after BBC expose

    A Kenyan hospital employee who was caught by the BBC selling a baby on the black market has been convicted of child trafficking. Fred Leparan, who worked at Nairobi’s Mama Lucy Kibaki hospital, was filmed accepting $2,500 (£2,000) to sell a baby boy under the hospital’s care. He was arrested in 2020 following a BBC…

  • Ukraine war: 17 killed during attack on market in ‘peaceful city’

    Code security firm Truffle Security warns that thousands of the domains in the Alexa top 1 million websites list are leaking secrets, including credentials. According to the company, which provides an open source secret-scanning engine, 4,500 of the analyzed websites exposed their .git directory. An analysis of the exposed credentials has revealed that AWS and…

  • Thousands of Popular Websites Leaking Secrets

    Code security firm Truffle Security has issued a warning that many websites in the Alexa top 1 million list have exposed their .git directories, potentially allowing attackers access to an entire source code, including configuration files, commit history, and access credentials. An analysis of the exposed credentials revealed that Amazon Web Services and GitHub keys…

  • Investors Betting Big on Upwind for CNAPP Tech

    Upwind, an Israeli startup, has secured $50 million in funding to accelerate the development of its Cloud-Native Application Protection Platform (CNAPP). The company has now raised $80 million in total over the course of 10 months. Upwind is building a software platform that offers runtime-powered threat detection, vulnerability management, and multi-cloud security posture management across…

  • Cash-Strapped IronNet Faces Bankruptcy Options

    IronNet, a cybersecurity firm founded by former NSA director General Keith Alexander, is facing financial difficulties, with the company warning that it has run out of money and will have to furlough most of its workforce and significantly reduce operations. IronNet, which launched in 2018 with $78 million in funding, raised more than $400 million…

  • Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Errors

    Microsoft has issued a detailed explanation of how Chinese hackers infiltrated US government emails, attributing the incident to a stolen crash dump from a hacked engineer’s corporate account. The crash dump, which dated back to April 2021, contained a Microsoft account (MSA) consumer key, which was used to forge tokens to break into OWA and…

  • China Bans iPhone Use for Government Officials at Work

    China ordered officials at central government agencies not to use Apple’s iPhones and other foreign-branded devices for work or bring them into the office, people familiar with the matter said. In recent weeks, staff were given instructions by their superiors in workplace chat groups or meetings, the people said. The directive is the latest step…

  • Rockwell Automation acquiring AMR developer Clearpath Robotics

    Rockwell Automation is acquiring Clearpath Robotics, an Ontario, Canada-based developer of autonomous mobile robots (AMRs) for research and development purposes. OTTO Motors, a division of Clearpath, develops AMRs for manufacturing and logistics applications and is also part of the acquisition. Financial details of the pending acquisition were not disclosed. However, the acquisition will be funded by…

  • How Companies Can Cope With the Risks of Generative AI Tools

    Everyone’s experienced the regret of telling a secret they should’ve kept. Once that information is shared, it can’t be taken back. It’s just part of the human experience. Now it’s part of the AI experience, too. Whenever someone shares something with a generative AI tool — whether it’s a transcript they’re trying to turn into…

  • Pentagon Plans Vast AI Fleet to Counter China Threat

    The Pentagon is considering the development of a vast network of AI-powered technology, drones and autonomous systems within the next two years to counter threats from China and other adversaries. Kathleen Hicks, the deputy secretary of defense, will provide new details in a speech later Wednesday about the department’s plans to spend hundreds of millions of…

  • Coinbase launches crypto lending platform for US institutions

    Cryptocurrency exchange Coinbase has rolled out a crypto lending service for institutional investors in the United States, reportedly aiming to capitalize on massive failures in the crypto lending market. Coinbase has launched an institutional-grade crypto lending platform to U.S. investors, offered as part of its existing offering Coinbase Prime, a spokesperson for Coinbase confirmed to…

  • Should the US implement a ‘robot tax?’

    A big and often unremarked upon aspect of being a reporter is knowing your audience. It’s not always as straightforward as it sounds — particularly when writing about tech. You’re always walking that tightrope between over- and under-explaining. Assuming too much knowledge makes text impenetrable for the non-expert, but getting caught up the finer details…

  • U.S. should use Nvidia’s powerful chips as a ‘chokepoint’ to force adoption of A.I. rules, DeepMind cofounder Mustafa Suleyman says

    One of the leading figures in A.I. wants Washington to force the rest of the world to follow its lead on regulating the new technology—and use Nvidia to do it. Nvidia’s processors are key to training the large language models that power A.I. bots like OpenAI’s ChatGPT and Google’s Bard. That makes the company’s products “an…

  • The new scramble for space requires a fresh set of rules

    In space, no one can hear your pleading about the value of soft power. Just ask Colombia. In 1976, the South American country hosted a meeting attended by Brazil, Ecuador, Uganda, Kenya, Indonesia and both Congos. The gathered nations declared that the stretch of geostationary orbit above them was not part of outer space, but…

  • What OpenAI Really Wants

    The air crackles with an almost Beatlemaniac energy as the star and his entourage tumble into a waiting Mercedes van. They’ve just ducked out of one event and are headed to another, then another, where a frenzied mob awaits. As they careen through the streets of London—the short hop from Holborn to Bloomsbury—it’s as if…

  • Why You Shouldn’t Be Afraid of Artificial Intelligence

    People have shown concern and fear over the representation of Artificial Intelligence (AI) in science-fiction films. Still, the actual state of artificial intelligence differs from the dark visions presented on television. In reality, AI can enrich human lives in an array of aspects. Artificial Intelligence is, at its fundamental level, a field of computer science that…

  • 7 Million Users Possibly Impacted by Freecycle Data Breach

    Freecycle.org is a non-profit organization that allows users to recycle their belongings. The organization identified a cyber incident on August 30 and began prompting users to reset their passwords. Freecycle stated hackers were able to access the usernames, user IDs, email addresses, and passwords of millions of users. The organization has 11 million total users…

  • Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data

    British mesh fencing manufacturer Zaun specializes in high-security products used by prisons, military bases, and utilities. The company disclosed a LockBit ransomware attack that may have impacted UK military and intelligence data. In a recent announcement, Zaun stated that the cyber incident occurred in August. The company was able to thwart the ransomware attack and…

  • Cuba uncovers human trafficking of Cubans to fight for Russia in Ukraine

    Cuba’s foreign ministry announced it discovered a human trafficking ring that coerced Cuban citizens to fight for Russia in Ukraine on Monday. Cuban authorities are now working to dismantle the operation. Cuba’s statement verified that the network was operating in Russia and Cuba, attempting to persuade Cubans living in both countries to join Russian military…

  • Turkey’s Erdogan says Black Sea grain deal can be restored soon

    Turkish President Tayyip Erdogan met with Russia’s Vladimir Putin in Sochi on Monday. Erdogan reported after their meeting that Russia is willing to revive the Black Sea grain deal it quit in July. The original grain deal was brokered by Turkey and the United Nations. Erdogan advised that Ukraine should soften its negotiating stance and…

  • Zimbabwe’s President Mnangagwa sworn in after disputed poll

    Zimbabwe’s President Emmerson Mnangagwa promised to lift millions out of poverty as he was sworn in for a second term on Monday. The main opposition party called the results of the August 23 election a “gigantic fraud.” South African President Cyril Ramaphosa, Congolese President Felix Tshisekedi, and Mozambique leader Philipe Nyusi attended the 80-year-old’s swearing-in…

  • Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising

    Threat actors connected to Vietnamese cybercrime organizations are using social media advertising tools to distribute malware. WithSecure noted that multiple Vietnamese groups overlap in their capabilities, infrastructure, and victimology. This indicates the threat actors likely collaborate to conduct malware attacks on a variety of social platforms, including Facebook. Ducktail and NodeStealer are two activity clusters…

  • Hackers push anti-Iranian government messages to millions via breached app

    Black Reward is an Iranian-focused hacking group intent on countering the Iranian government. Before the one-year anniversary of the death of Mahsa Amini, the group began spreading anti-government messages through an Iranian financial services app. Over 6 million users have the 780 app, which facilitates online transactions for shopping and bill payments. 780 users began…

  • U.S. officials visit Syria’s Deir al Zor in bid to defuse Arab tribal unrest

    U.S. Deputy Assistant Secretary of State for Syria Ethan Goldrich and Major General Joel B Vowell met with representatives from Syrian Arab tribes and the Syrian Democratic Forces (SDF) to de-escalate regional violence. The talks took place in the resource-rich Deir al Zor province of eastern Syria. Recent Arab tribal backlash against YPG authority has…

  • How to get a handle on shadow AI

    CIOs and CISOs have long grappled with the challenge of shadow IT—technology that is being used within an enterprise but that is not officially sanctioned by the IT or security department. According to Gartner research, 41% of employees acquired, modified, or created technology outside of IT’s visibility in 2022, and that number was expected to…

  • Gala Games CEO sues co-founder alleging $130 million theft, pattern of deception

    Two top executives at Web3 gaming startup Gala Games are now in litigation against each other — a turn of events that has dropped the price of its token by 13%. Web3 gaming startup Gala Games CEO Eric Schiermeyer recently sued the company’s co-founder Wright Thurston, alleging that Thurston stole 8.6 billion GALA tokens in early…

  • Moon base: Bangor scientists design fuel to live in space

    Scientists have developed an energy source which could allow astronauts to live on the Moon for long periods of time. The Nasa-led Artemis Program hopes for an outpost on the Moon by around 2030. Bangor University has designed nuclear fuel cells, the size of poppy seeds, to produce the energy needed to sustain life there.…

  • Exploring the effects of hardware implementation on the exploration space of evolvable robots

    Evolutionary robotics is a sub-field of robotics aimed at developing artificial “organisms” that can improve their capabilities and body configuration in response to their surroundings, just as humans and animals evolve, adapting their skills and appearance over time. A growing number of roboticists have been trying to develop these evolvable robotic systems, leveraging recent artificial…

  • Huawei Teardown Shows Chip Breakthrough in Blow to US Sanctions

    Huawei Technologies Co. and China’s top chipmaker have built an advanced 7-nanometer processor to power its latest smartphone, a sign Beijing is making early progress in a nationwide push to circumvent US efforts to contain its ascent. Huawei’s Mate 60 Pro is powered by a new Kirin 9000s chip that was fabricated in China by…

  • How will artificial intelligence change the value of human skillsets?

    As the hype grows over generative artificial intelligence — emerging technology that can create text, images and code — many businesses are drawn to the potential for automating repetitive tasks and cutting costs as jobs are displaced. Research suggests that the technology will indeed shake up the workplace. One study published in March found that…

  • Michio Kaku: Quantum computing is the next revolution

    Dr. Michio Kaku, the renowned theoretical physicist, walks through the evolutionary journey of quantum computing, from analog to digital to the quantum era. Quantum computers hold immense promise because of their ability to tap into parallel universes, which boosts their computational power exponentially. They could revolutionize agriculture, energy, and medicine, solving complex problems like creating…

  • Japan Looks to Boost Defense Budget by 13% and Add New Missiles

    On Thursday, Japan’s Defense Ministry asked for a 13% budget increase next fiscal year, adding anti missile systems and boosting maintenance for their military. This budget is a record, and it reflects the rising tensions between the U.S. and China. Prime Minister, Fumio Kishida, has eased away from Tokyo’s traditional defense-only stance to take on…

  • Intel Habana Gaudi Beats Nvidia’s H100 in Visual-Language AI Models: Hugging Face

    A new fine-tuning performance benchmark for BridgeTower, a Vision-Language (VL) AI model, has shown that there’s life to the AI acceleration camp other than Nvidia’s green. While Nvidia does dominate the AI acceleration market (through exceptional foresight, a well-thought-out and documented software stack, and pure processing performance), other players are keen to take a piece…

  • 5 ways CISOs can prepare for generative AI’s security challenges and opportunities

    With generative AI tools like ChatGPT proliferating across enterprises, CISOs have to strike a very difficult balance: Performance gains versus unknown risks. Gen AI is delivering greater precision to cybersecurity but also being weaponized into new attack tools such as FraudGPT that advertise their ease of use for the next generation of attackers. Solving the…

  • Meta releases a data set to probe computer vision models for biases

    Continuing on its open source tear, Meta today released a new AI benchmark, FACET, designed to evaluate the “fairness” of AI models that classify and detect things in photos and videos, including people. Made up of 32,000 images containing 50,000 people labeled by human annotators, FACET — a tortured acronym for “FAirness in Computer Vision EvaluaTion”…