UL NO. 461: China’s Telco Infiltration, Russia’s Darknet Drug Trade, AI-Driven Anti-Drone Warfare...
Unleashing Personal Intelligence
Security | AI | Purpose
Prepare for a world driven by AI with original ideas, expert analysis, mental models, and tooling to optimize your mind.
Join our mid-month meetup for TELOS files and become a UL member to elevate your personal AI journey.
Monitor Shadow AI and Prevent Data Leakage
With GenAI unlocking new capabilities, secure your communications. Use Apple Messages, Signal, or other high-security platforms to minimize potential data collection.
The Importance of Encrypted Communications
Encrypt all important phone calls and messages. China has penetrated US telecommunications, enabling them to collect and analyze unsecured conversations.
Deeply compromised US infrastructure, including hotels, government agencies, and core services, raises security concerns and undermines trust.
Consider moving away from China as a reliable technology partner and engage with alternative countries to minimize risks.
Russia's Shadowy Drug Trade
Russia has pioneered a drug trafficking model using darknet markets and cryptocurrency, along with "dead drops" for physical delivery, bypassing traditional face-to-face transactions.
Novel Word Document Phishing Tactics
Be wary of corrupted Word documents that bypass security scanning. They can be restored by users or automated processes, displaying QR codes that link to credential theft sites.
Users should exercise caution when receiving suspicious Word documents and take steps to prevent malicious code activation.
AI Robots Can Be Tricked Into Violence
UPenn researchers have discovered that AI-powered robots can be manipulated into dangerous behaviors, such as driving off bridges and planning explosions, using automated "jailbreak" prompts.
Martial Law in South Korea
President Yoon Suk Yeol has declared emergency martial law in South Korea, citing opposition control of parliament and alleged North Korean sympathies.
Solana Web3.js Library Supply Chain Attack
GitHub account compromise led to the publication of backdoored versions of Solana's Web3.js library, potentially stealing private keys from decentralized apps.
Phishing via Cloudflare's Pages and Workers Platforms
Threat actors exploit Cloudflare's Pages.dev and Workers.dev domains for phishing campaigns, leveraging their trusted reputation and SSL protection.
Mobile Spyware Detection Shows Prevalent Pegasus Infections
iVerify's spyware scanner detected 7 Pegasus infections in 2,500 scanned devices, targeting business leaders, government officials, activists, and journalists.
FBI Warning on AI-Powered Scams
Criminals use AI to enhance the authenticity of their scams, generating realistic text, images, and videos for romance, investment, and job hiring schemes.
FSB Spyware Targets Android Devices
Russian agents compromise an Android phone by forcing the owner to unlock it after detention in Moscow, installing a spyware variant of Cube Call Recorder that enables surveillance.
OpenAI and Anduril Collaborate on Anti-Drone Systems
OpenAI partners with Anduril to develop AI-powered anti-drone systems for the U.S. military, following Anduril's recent contract for defensive systems.
Special Forces Deploy Combat Robots
US Special Forces procure 10 NERVA-LG robotic systems from KNDS France Robotics, their first major investment in unmanned ground vehicles.
Apple's Advanced Body Recognition System
Apple secures a patent for a system that identifies individuals even when their face is not visible by storing and recognizing gait and clothing patterns.
Russian Hackers Abuse Cloudflare Tunnels
Russia's Gamaredon hacking group utilizes Cloudflare Tunnels to mask their infrastructure while deploying GammaDrop malware against Ukrainian targets.
Critical SailPoint IdentityIQ Vulnerability
SailPoint identifies a critical directory traversal vulnerability (CVE-2024-10905) in IdentityIQ IAM platform, potentially allowing attackers to access restricted files.
Vulnerable U Expands into Marketing
Matt Johansen transitions Vulnerable U into Vulnerable Media, a cybersecurity marketing agency that provides insider-perspective content and campaigns for cybersecurity companies.
Brian Krebs' Continued Cybersecurity Journey
Brian Krebs continues his mission of investigating cybercrime from an undisclosed location, despite harassment and threats from hackers, including swatting attempts and fentanyl delivery.
Hydra Dark Web Market Takedown
Russian courts sentence 15 members of the Hydra dark web marketplace, including a life sentence for its creator. Over $5 billion in cryptocurrency transactions were facilitated before its closure.
AI / Tech
ReInvent's AI Innovations
- Amazon SageMaker Lakehouse: Unifies data lakes and warehouses for seamless AI/ML integrations.
- Amazon Q Developer: Builds ML models using natural language instructions.
- Amazon Bedrock Guardrails: Supports multimodal toxicity detection with images.
- Amazon Bedrock Marketplace: Access over 100 foundation models in one place.
- Amazon SageMaker HyperPod: Offers flexible training plans for large models.
- Amazon Nova Models: Delivers frontier intelligence with leading price-performance.
- Amazon Q Business: Adds workflow automation, 50+ integrations.
- Automated Reasoning Checks: Prevents factual errors in LLM hallucinations.
- Amazon Bedrock Model Distillation: Builds cost-efficient, accurate models.
- Amazon Bedrock APIs: Enhances RAG applications with custom connectors.
GPT-Pro Subscription Analysis
Exploration of GPT Pro's capabilities in comparison to Sonnet 3.5 and Claude Projects. Early findings suggest Claude Projects provides a better coding partner experience.
Sam Altman's Shifting AGI Expectations
Altman believes AGI will arrive sooner than anticipated, but its impact will be less transformative than previously thought, prioritizing ASI as a more gradual milestone.
Education Through AI
OpenAI's plans to enable instructors to create custom GPTs that seamlessly integrate into online course content could revolutionize education.
Apple's Policy on Employee Expression
A former Apple employee sues the company for alleged surveillance and restrictions on professional speaking and LinkedIn profile editing.
Apple's culture of secrecy and insular mindset raises concerns about potential innovation limitations and the impact on employees' ability to grow and develop.
AI Agent Pricing Models
Companies explore various pricing models for AI agents, including fixed fees per user, percentage of human cost, outcome-based pricing, and markup on tokens.
Jensen Huang's Global AI Infrastructure Push
Nvidia's CEO promotes the development of national AI systems powered by Nvidia chips, with 10 countries already participating.
Nvidia CEO's Tax Avoidance
Jensen Huang uses financial strategies to minimize $8 billion in estate taxes on his massive fortune.
China's Critical Tech Mineral Ban
China restricts the export of critical materials like gallium and antimony to the US in response to new chip export restrictions.
Meta's Nuclear Power Plans
Meta seeks nuclear power partnerships to fuel its data centers, targeting operations in the early 2030s.
China's SpaceSail Project
China launches more satellites for the Qianfan network, aiming to provide global internet coverage.
Google's DeepMind Weather AI
Google DeepMind's AI model outperforms traditional weather forecasting systems, showing strong performance in wind conditions and tropical cyclone path predictions.
Amazon's Mega AI Supercomputer
Amazon's collaboration with Anthropic involves building the world's largest AI supercomputer with hundreds of thousands of their new Trainium 2 chips.
New Amazon S3 Tables
AWS introduces a new analytics-focused S3 storage type optimized for Apache Iceberg format tabular data, enhancing query performance and transaction speeds.
Google Photos Privacy Demonstration
Google's computer vision capabilities are showcased through a website that reveals what AI can learn from user photos.
Cloudflare's Premium Domain Transfers
Cloudflare allows transfer of premium domains into its platform, providing a consolidated solution for managing domains.
AT&T's Cellular Backup for Fiber
AT&T's free cellular backup feature for fiber customers ensures internet connectivity during fiber outages.
Humans
Health Insurers Remove Executive Information
Major health insurance companies remove executive photos and bios from websites following the murder