Tag: #Artificial Intelligence

Rethinking Scaling Laws in AI Development

As developers and researchers push the boundaries of LLM performance, questions about efficiency loom large. Until recently, the focus has been on increasing the...

Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML...

Cybersecurity researchers have disclosed two security flaws in Google's Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate...

Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes

Google has revealed that bad actors are leveraging techniques like landing page cloaking to conduct scams by impersonating legitimate sites. "Cloaking is specifically designed to...

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database...

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep...

Anthropic’s New Claude Models Bridge the Gap Between AI Power and...

Anthropic has recently unveiled major updates to its Claude AI model family. The announcement introduced an enhanced version of Claude 3.5 Sonnet and debuted...

Replacing the iPhone remains a stretch, but AI will get us...

Replacing the iPhone might seem a strange goal for Apple; it’s been the most successful product the company has ever made, and one of...

Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns

Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot+ PCs, stating it's taking the time to improve the experience. The...

Apple Opens PCC Source Code for Researchers to Identify Bugs in...

Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy...

Is Your Identity Security AI-Proof?

Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AI-based attacks are...

Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models

Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of...

Most popular