Daily Drop (529): CN: ASML, Putin's Chaos, MULTI#STORM, DoJ: CN Fentanyl, Wagner Deal, Breach Forums, Africa Sat Testing, JP Starlink, CN APT EU, Wagner: Africa, Anonymous Sudan
06-25-23
Sunday, Jun 25, 2023 // (IG): BB // Financial Enabler PODCAST // Coffee for Bob
ASML caught in a Dutch oven with China export restrictions
Analyst Comments: The forthcoming export control regulations by the Dutch government represent an expansion of efforts to restrict Chinese access to advanced technology and semiconductor manufacturing tools. ASML, as a prominent chipmaking gear manufacturer, is likely to be affected by the restrictions. The move aligns with broader global concerns about technology transfer and national security risks associated with critical industries. The impact on ASML's financial outlook is expected to be limited, given the company's focus on serving customers primarily focused on mature production nodes.
FROM THE MEDIA: The Dutch government is expected to publish export control regulations next week, which will likely restrict the sale of high-tech equipment, including deep ultraviolet (DUV) lithography machines manufactured by ASML. The move comes as the Netherlands joined the US in curbing Chinese access to advanced technology and semiconductor manufacturing tools. While the restrictions are not expected to explicitly mention China or ASML, they are anticipated to impact the export of equipment used in the production processes for 5nm and 3nm chips. ASML has confirmed that the regulations are not new and that the details remain confidential pending final guidance from Dutch authorities. The company believes the restrictions will not significantly affect its financial outlook for 2023 or its longer-term scenarios.
READ THE STORY: The Register
Putin’s Gangster Reign of Chaos Finally Catches Up to Him
Analyst Comments: The political instability and internal power struggles in Russia pose potential risks to Putin's reign. The speculated rebellion within the military and a series of unusual incidents across the country indicate a significant degree of unrest. Yet, given Russia's history of complex political maneuvering, it's hard to predict whether these events will lead to significant changes in the leadership. Moreover, the effectiveness of any resistance movement against Putin within the military remains to be seen.
FROM THE MEDIA: Amidst the political tumult in Russia, questions are rising about the future of President Vladimir Putin and warlord Yevgeny Prigozhin's reign after 23 years in power. Prigozhin recently announced that he was stepping down, bringing an apparent end to his coup attempt, although such announcements are viewed skeptically. Disturbances throughout Russia have sparked rumors of an organized resistance movement against Putin within the military. This turmoil, combined with rising discontent, is fueling speculations about a power shift in the Kremlin, even as Moscow witnesses emergency orders and increased military presence on the streets.
READ THE STORY: The Daily Beast
China’s foreign minister meets Russian Official in Beijing after the rebellion
Analyst Comments: The rebellion in Russia has clearly amplified China's geopolitical concerns, given its strong alliance with Russia. Stability in Russia is vital for China, both for border security and as part of its broader geopolitical strategy against US influence. Thus, this development could prompt China to reassess its approach to Russia and its interactions with Europe. The situation also underscores the delicate balance that China must maintain in its foreign relations. Despite the strategic necessity of supporting Russia, it must do so without further straining its already tense relationships with European countries. On a broader level, the unfolding situation in Russia could cause China to reassess its long-term ambitions, such as potential unification with Taiwan, given the complexities revealed by the Russian insurrection.
FROM THE MEDIA: China's foreign minister, Qin Gang, recently met with Russian deputy foreign minister, Andrei Rudenko, amid rising concerns about the political stability of Russia, a strategic ally of China. The meeting came in the wake of an insurrection led by Russian warlord Yevgeny Prigozhin. China's state media reported that the ministers exchanged views on Sino-Russian relations and international and regional issues but did not mention the rebellion. A destabilized Russia could potentially impact China's border security and weaken its efforts against perceived US hegemony.
READ THE STORY: FT
MULTI#STORM Campaign Targets India and U.S. with Remote Access Trojans
Analyst Comments: This phishing campaign poses a considerable threat to users in India and the U.S. It uses sophisticated methods, including JavaScript files and Python-based executables, to infiltrate systems and deliver harmful RATs. The use of trusted platforms like OneDrive for hosting the malicious files further adds to the complexity and effectiveness of the attack. Users need to be educated on the dangers of clicking on suspicious links and executing unknown files.
FROM THE MEDIA: A newly discovered phishing campaign, codenamed MULTI#STORM, is targeting users in India and the U.S., using JavaScript files to deliver remote access trojans (RATs) to compromised systems. The victims receive an email with an embedded link that leads to a password-protected ZIP file hosted on Microsoft OneDrive. When opened, the ZIP file reveals an obfuscated JavaScript file that activates the infection. This leads to the delivery of multiple unique RAT malware instances, including Warzone RAT and Quasar RAT. Securonix researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov suggest remaining extra vigilant when handling phishing emails, especially those stressing a sense of urgency.
READ THE STORY: THN
Beijing Slams US Indictments of Chinese Firms Over Fentanyl
Analyst Comments: Beijing has criticized the United States after the U.S. Justice Department charged four Chinese companies and eight individuals with trafficking chemicals used in manufacturing fentanyl, a powerful synthetic opioid linked to many overdose deaths. The Chinese foreign ministry termed the arrests "arbitrary detention" and called for the release of the detained Chinese citizens. The U.S. action marks the first time Washington has charged Chinese firms for trafficking fentanyl precursor chemicals directly to the U.S. instead of Mexico, where most of the fentanyl found in America is thought to originate. This situation could further strain the already tense relationship between the U.S. and China.
FROM THE MEDIA: Beijing has criticized the United States after the U.S. Justice Department charged four Chinese companies and eight individuals with trafficking chemicals used in manufacturing fentanyl, a powerful synthetic opioid linked to many overdose deaths. The Chinese foreign ministry termed the arrests "arbitrary detention" and called for the release of the detained Chinese citizens. The U.S. action marks the first time Washington has charged Chinese firms for trafficking fentanyl precursor chemicals directly to the U.S. instead of Mexico, where most of the fentanyl found in America is thought to originate. This situation could further strain the already tense relationship between the U.S. and China.
READ THE STORY: VOA
U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
Analyst Comments: These vulnerabilities, particularly the zero-day exploits in Apple's software, represent significant threats to both personal and enterprise data security. The espionage campaign, Operation Triangulation, appears to have a high level of sophistication, given its ability to execute a payload without any user interaction. The mention of potential future use of permissions such as access to the device's microphone, camera, and address book points to the long-term strategic nature of the threat. Organizations should take immediate steps to patch these vulnerabilities and review their security protocols to prevent exploitation.
FROM THE MEDIA: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, due to evidence of active exploitation. The flaws include three recently patched Apple vulnerabilities (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two VMware vulnerabilities (CVE-2023-20867 and CVE-2023-20887), and a Zyxel device vulnerability (CVE-2023-27992). The Apple vulnerabilities have reportedly been exploited as zero-days to deploy spyware in a cyber espionage campaign named Operation Triangulation, which started in 2019. The Federal Civilian Executive Branch (FCEB) is urged to apply vendor-provided patches to secure their networks against these threats.
READ THE STORY: THN
Wagner Chief Takes Deal That Drops Charges, Sends Him to Belarus
Analyst Comments: This development represents an unexpected turn in the unfolding situation in Russia, highlighting the significant influence wielded by non-state actors such as the Wagner Group. The Kremlin's decision to negotiate and effectively provide amnesty to Prigozhin and his forces might be seen as a pragmatic move to de-escalate the crisis. However, it might also set a precedent and encourage other non-state actors to pursue aggressive actions, knowing they might be able to negotiate their way out of repercussions.
FROM THE MEDIA: Yevgeny Prigozhin, the leader of the mercenary group Wagner Group, has been allowed to move to Belarus as part of a deal negotiated by Belarusian President Alexander Lukashenko with the approval of Russian President Vladimir Putin. As part of this deal, charges against Prigozhin for mounting an armed rebellion will be dropped and his fighters will not be prosecuted. The rebellious forces halted their advance within 200 kilometers of Moscow, with Prigozhin declaring his intent to avoid bloodshed and return to their bases in Ukraine.
READ THE STORY: VOA
The Future of US-China Relations After Biden’s Statements Against the Chinese President
Analyst Comments: The relationship between the U.S. and China is characterized by competition, conflict, and cooperation. Both countries have significant stakes in each other's economies and in the global economic system, necessitating a degree of collaboration. Their shared interests in areas like climate change, nuclear non-proliferation, and global health can form the basis for cooperative efforts. Yet, the points of contention between them are serious and could potentially escalate into conflict. The issues of Taiwan, human rights, trade disputes, and cybersecurity are major hurdles that need careful navigation. Moreover, their rivalry in the technological sphere, particularly around AI and 5G, is a new dimension of the competition.
FROM THE MEDIA: The U.S. President's labeling of Chinese President Xi Jinping as a dictator is seen as a reflection of increasing tensions between the two nations. Tensions have been escalating due to factors such as differing values, numerous disagreements, and diplomatic frictions. Significant matters of contention include issues of democracy and human rights, intellectual property theft, economic competition, cybersecurity, and international territorial disputes, particularly in the South China Sea and Taiwan. China's assertiveness in international politics, increased cooperation with Russia, and its rapid technological advancements have all raised alarms in Washington. On the other hand, Beijing is discontented with U.S. interference in what it perceives as its internal affairs and the imposition of sanctions on Chinese entities.
READ THE STORY: Modern Diplomacy
BreachForums seized by FBI three months after the arrest of alleged admin
Analyst Comments: The seizure of the BreachForums domain signifies a significant development in the fight against cybercrime, especially regarding platforms that facilitate the trading of stolen data and hacking tools. It underlines the ongoing efforts of law enforcement agencies to disrupt criminal activities online. The collaboration between different international agencies demonstrates the need for a global approach to tackle cybercrime effectively. The case also highlights the challenges faced by law enforcement, given the extended time between Fitzpatrick's arrest and the domain seizure. It remains to be seen whether this action will lead to a significant reduction in related cybercrime or if other platforms will emerge to fill the void left by BreachForums, similar to how BreachForums surged in popularity following the seizure of RaidForums.
FROM THE MEDIA: The English-language cybercrime marketplace, BreachForums, had its domain seized more than three months after the alleged administrator, Conor Brian Fitzpatrick, was arrested in the U.S. The forum, which reportedly had over 340,000 members, was used by criminals to trade stolen information and hacking tools. Fitzpatrick, accused of running BreachForums under the handle "pompompurin", was charged with conspiracy to commit access device fraud. He allegedly victimized millions of U.S. citizens and several U.S. companies. Following Fitzpatrick's arrest, another administrator, "Baphomet", claimed ownership of the forum before deciding to shut it down. The Department of Justice credited the FBI for causing BreachForums to go offline. The reason for the domain's seizure on Thursday remains unclear.
READ THE STORY: The Record
China's Ambassador: Egypt Poised to Become First Fully Capable African Country for Satellite Testing
Analyst Comments: This accomplishment not only bolsters Egypt's scientific and technological capabilities but also underscores China's growing influence and cooperative efforts in the region. The satellite's focus on promoting economic and agricultural development aligns with broader continental objectives. If successful, the technology could lead to substantial advancements in sectors reliant on accurate and up-to-date environmental data.
FROM THE MEDIA: Chinese Ambassador in Cairo, Liao Liqiang, announced that upon completion of Misr-Sat 2, Egypt will be the first African nation capable of assembling and testing satellites. The development represents a significant stride in Egypt's efforts to advance its space industry. The ambassador commended the collaboration with Egypt, highlighting the forthcoming launch of the satellite from China in early October. The satellite, costing $74 million, aims to stimulate economic and agricultural development across Africa. Its mission includes imaging the Egyptian terrain for environmental preservation and conducting remote sensing.
READ THE STORY: Egypt Independent
Japan's military considers adopting Musk's Starlink satellite service, Yomiuri newspaper reports
Analyst Comments: Japan's interest in Starlink is a significant development, showcasing how countries are increasingly viewing low-Earth orbit satellite constellations as crucial for securing robust and resilient communication networks. It also indicates a possible trend toward diversification and reinforcement of national defense communication systems. The adoption of Starlink could boost SpaceX's standing as a significant provider of strategic communication services to governments globally.
FROM THE MEDIA: Japan's military is currently testing Elon Musk's Starlink satellite internet service and considering adopting the technology in the next fiscal year, as reported by the Yomiuri newspaper. The Ministry of Defense already utilizes communication satellites in geostationary orbit, but the adoption of SpaceX's Starlink would add a constellation of satellites in low Earth orbit. The Starlink system has been under trial since March, deployed in roughly ten locations for testing and training. This move is part of a broader trend among nations to enhance resilience against potential jamming of communications or satellite attacks during conflict.
READ THE STORY: Reuters
Chinese state-backed hackers accidentally infected a European hospital with malware
Analyst Comments: This incident underscores the escalating threat from state-sponsored cyberattacks, particularly from groups like Camaro Dragon that employ increasingly sophisticated and hard-to-detect tactics. The use of self-propagating malware that spreads through removable drives underlines the need for stricter cybersecurity measures and protocols, especially when handling removable media. It's imperative for organizations to discourage the use of unfamiliar drives on corporate devices and consider using alternative solutions such as cloud storage or encrypted file-sharing platforms.
FROM THE MEDIA: Researchers from the cybersecurity firm Check Point have traced a self-propagating malware infection in a European hospital back to the Chinese military-connected hacking group Camaro Dragon, also known as Mustang Panda or LuminousMoth. The malware, known as WispRider, was introduced to the hospital's network via an infected USB drive used by an employee at a conference in Asia. WispRider can bypass antivirus solutions, establish backdoors in systems, and autonomously spread itself to newly connected removable drives. This infection has highlighted the malware's ability to propagate uncontrollably across devices, causing concern as this approach allows the potential infiltration of isolated systems and maintaining access to various entities.
READ THE STORY: The Record
How Small Businesses Can Get a Piece of the $53 Billion CHIPS Pie
Analyst Comments: The CHIPs Act is a proactive step by the U.S. government to address the ongoing chip shortages that have impacted numerous industries and to reduce dependency on foreign suppliers, particularly in Asia. By promoting domestic manufacturing, the Act seeks to safeguard the U.S. economy and national security. Given the emphasis on working with small businesses and the large amount of funding allocated, there's a significant opportunity for small and medium-sized enterprises to grow and thrive within this initiative. However, it will be essential for these businesses to understand the application process and criteria for the program's funding.
FROM THE MEDIA: In response to ongoing chip shortages and reliance on foreign suppliers, the U.S. federal government is stepping up to restore chipmakers through the CHIPs (Creating Helpful Incentives to Produce Semiconductors) Act. This legislation, passed in August last year, provides $52.7 billion in funding for domestic firms to build semiconductor manufacturing facilities and carry out research and development. The Act allocates $39 billion for manufacturing incentives and $13.2 billion for R&D workforce development. As tensions between the U.S. and China rise, the Act also addresses national security concerns. The U.S., once responsible for 37% of the global chip supply in 1990, now only produces 12%, with the majority of production coming from Asian countries. The Act presents a significant opportunity for small businesses to become involved in the chip supply chain as suppliers to larger firms.
READ THE STORY: Inc.
Wagner revolt in Russia dims outlook for its operations in Africa
Analyst Comments: The ongoing situation in Russia with the Wagner force can have significant implications for the nations where the mercenary group is active, including Mali and the CAR. Both nations risk being caught in the crossfire of this internal conflict in Russia, which could have significant impacts on their ongoing struggles with internal armed groups. Furthermore, the situation could alter the balance of power and alliances in these regions, especially given that France and other Western nations have criticized the involvement of Wagner forces. Internationally, the revolt by the Wagner force could have broader impacts on Russia's foreign relations and its use of private military companies to exert influence. It's crucial to monitor how this situation evolves and how Russia and the nations involved with Wagner respond to these developments.
FROM THE MEDIA: A revolt by the Wagner force, a Russian mercenary group, is causing diplomatic concerns for Mali and the Central African Republic (CAR). Both nations have been utilizing Wagner forces to deal with internal conflicts and have sought to foster closer ties with Russia. However, they deny that their military cooperation is with Wagner, arguing that the forces in their countries are Russian trainers, not mercenaries. The insurrection within Russia, spearheaded by Wagner fighters, threatens to destabilize these relationships. The Wagner group, accused of exploiting natural resources in Mali and CAR to fund its operations, has been active since 2014 and has engaged in conflicts in the Middle East, Africa, and more recently, Ukraine.
READ THE STORY: Aljazeera
Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations
Analyst Comments: While the motives and affiliations of Anonymous Sudan remain unclear, there is a strong indication of potential Russian state sponsorship. Their tactics and targets align with Russian cyber warfare strategies. The group appears to capitalize on anti-Muslim sentiments and incidents to justify its attacks, but this may serve as a smokescreen for its true affiliations and objectives. It's concerning that this group is capable of launching successful attacks against high-profile targets, potentially disrupting critical infrastructure and services. The claim of disrupting Israel's Iron Dome missile defense system, if true, represents a significant escalation in their capabilities.
FROM THE MEDIA: Anonymous Sudan, an adversary group that has launched numerous high-profile Distributed Denial of Service (DDoS) attacks worldwide, is under scrutiny. Links suggest an affiliation with pro-Russian hacktivist collective Killnet and point to likely state-sponsored Russian actors operating under the guise of Sudanese Islamists. In their attacks, they often react to events targeting Muslims, such as the burning of the Quran by a Danish-Swedish politician. Their targets have included Sweden, the Netherlands, Denmark, Australia, France, Israel, Germany, UAE, the US, and Iran, impacting critical global sectors. Microsoft has recently fallen victim to DDoS attacks by this group, which they are tracking under the name "Storm-1359". Microsoft observed different types of Layer 7 DDoS attacks, including HTTP(S) flood attacks, Cache bypass, and Slowloris.
READ THE STORY: Security Boulevard
A Cyber Force for the military? Senators want to know
Analyst Comments: The move to consider a separate, uniformed Cyber Force underscores the rising prominence of cybersecurity threats and the necessity to deal with them effectively. This proposal seems to address ongoing frustrations related to the allocation and emphasis of cyber resources among different branches of the military. Reluctance from the DoD to support a separate service indicates potential operational and bureaucratic challenges. It's uncertain whether creating a separate branch would improve the overall effectiveness and coordination of cyber defenses or merely add another layer of bureaucracy.
FROM THE MEDIA: The annual defense policy bill in the Senate includes a proposal to mandate a study on the feasibility of creating a separate, uniformed Cyber Force. This move by Sen. Kirsten Gillibrand (D-NY) suggests a potential for the seventh, cyber-specific military branch, despite previous resistance from the Pentagon. The proposed study would be conducted by the National Academy of Public Administration and is intended to be immune to interference or influence from the Department of Defense (DoD). The idea for a separate cyber service has been debated for over a decade and has gained momentum with the growing digital threats from foreign adversaries.
READ THE STORY: The Record
US sanctions Russian citizens for trying to influence elections
Analyst Comments: The sanctions demonstrate the U.S. government's ongoing commitment to counter foreign interference in its democratic processes. It also underlines the increasing geopolitical tension between the U.S. and Russia, particularly in the realm of cyber operations. By publicly attributing these activities to specific individuals and imposing sanctions, the U.S. is taking a clear stance against Russia's perceived covert influence operations.
FROM THE MEDIA: The U.S. Department of the Treasury has imposed sanctions on two Russian intelligence officers, Yegor Popov, and Aleksei Sukhodolov, due to their significant involvement in the Kremlin’s efforts to meddle in both U.S. and global elections. The sanctions follow the individuals' recruitment into the Russian Federal Security Service's (FSB) "co-opted" network, which is designed to execute influence operations against the U.S. and its allies. Popov and Sukhodolov were previously indicted by the Department of Justice, and the new sanctions will result in the freezing of their U.S. assets and the prohibition of any financial transactions involving them.
READ THE STORY: The Record
Lawmakers Slam YouTube for overturning policy banning election misinformation
Analyst Comments: The criticism faced by YouTube highlights the broader debate over the role of social media platforms in moderating content, particularly when it relates to misinformation. While YouTube claims that its revised policy aims to protect freedom of speech, legislators argue it could lead to further dissemination of election misinformation. This underscores the challenges faced by tech companies in balancing free speech with the need to combat misinformation and its potential real-world harm. The decision could potentially impact the trust and credibility of the platform, depending on its implementation and the potential spread of misinformation leading up to future elections.
FROM THE MEDIA: Top legislators have criticized the CEOs of YouTube and its parent company, Alphabet, for loosening YouTube's policy on election misinformation. Recently, YouTube announced it will stop removing videos that spread misinformation about the integrity of the 2020 presidential election and prior elections. Four leading Democrats from the U.S. House of Representatives Energy and Commerce Committee have opposed this decision, arguing that it undermines democracy. YouTube maintains that its earlier policy of barring posts from election deniers had the unintended effect of limiting political speech without significantly reducing the risk of violence or other real-world harm.
READ THE STORY: The Record
Microsoft investigating a bug in Windows 11 File Explorer that makes the CPU hangry
Analyst Comments: The bug in File Explorer causing high CPU utilization is an inconvenience for users on affected systems. Microsoft's investigation and commitment to releasing a fix demonstrate its responsiveness to addressing software issues. The reversal of removing settings in File Explorer highlights the importance of user feedback and Microsoft's willingness to adapt based on customer needs. These updates reflect the iterative nature of software development and the ongoing efforts to improve user experience in Windows 11.
FROM THE MEDIA: Microsoft is investigating a bug in File Explorer in Windows 11 that causes high CPU utilization even after closing the "Effective Access" feature in the "Advanced Security Settings" dialog box. The issue affects systems running Windows 11 versions 21H2 or 22H2 with specific updates installed, as well as Windows Server 2022. Users may experience difficulty accessing shared files and folders, and the CPU usage may persist after closing the dialog box. Microsoft is working on a fix that is expected to be available later this month. Additionally, Microsoft reversed its decision to remove certain settings in File Explorer after receiving negative feedback from Windows Insiders.
READ THE STORY: The Register
Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
Analyst Comments: The sentencing of Joseph James O'Connor highlights the serious consequences of engaging in cybercriminal activities. The Twitter breach was a significant event that impacted numerous high-profile accounts and resulted in financial losses. O'Connor's involvement in various cyber crimes demonstrates a pattern of illegal activities and disregard for the privacy and security of individuals and organizations. The legal action taken against him serves as a deterrent and sends a message that cybercriminals will be held accountable for their actions.
FROM THE MEDIA: Joseph James O'Connor, a U.K. citizen, has been sentenced to five years in prison in the U.S. for his involvement in the July 2020 hack of Twitter. O'Connor, also known as PlugwalkJoe, pleaded guilty to the criminal schemes and was arrested in Spain in July 2021. The breach allowed O'Connor and his co-conspirators to gain unauthorized access to backend tools used by Twitter and hijack 130 popular accounts to perpetuate a cryptocurrency scam, resulting in approximately $120,000 in illegal profits. O'Connor was also involved in SIM swapping attacks, cyber stalking, and stealing cryptocurrency. He has been ordered to forfeit $794,000 and will face three years of supervised release after serving his prison term.
READ THE STORY: THN
Items of interest
China’s ChatGPT Opportunists—and Grifters—Are Hard at Work
Analyst Comments: The use of AI in creating diverse content presents an innovative approach to tackle the competitive job market in China. While it's intriguing to see the varied applications of AI, there are key ethical and practical concerns. Using AI to write academic essays might be considered cheating, and the quality of AI-generated content may not always meet standards. On a positive note, the rise of AI-focused jobs and courses demonstrates a growing recognition of AI's potential. However, using AI for predictive tasks like generating lottery numbers is beyond its capability and should be discouraged. The overall trend shows a remarkable fusion of entrepreneurship and AI technology, but it's essential to balance it with ethical practices and realistic expectations.
FROM THE MEDIA: Amid China's competitive job market, recent graduates and entrepreneurs are turning to OpenAI's ChatGPT, a generative artificial intelligence chatbot, as a tool to carve out novel business opportunities and job roles. Some users are leveraging ChatGPT to write essays, create eye-catching product descriptions, and even author entire books. Influencers are teaching others how to use AI, and companies are recruiting for positions specifically tailored to work with ChatGPT. Despite the enthusiasm, there are challenges. AI-generated books and content often lack coherence, and essay brokers still prefer human writers. Some entrepreneurs, while innovatively using AI, have found their ventures less lucrative than anticipated.
READ THE STORY: Wired
China’s Dystopian ChatGPT (Video)
FROM THE MEDIA: China didn't invent ChatGPT, but the chances of its making its own version of the AI bot are pretty good. In this episode of China Unscripted, we discuss what a China Chat GPT would look like, how the Chinese governments hold tech companies back, and what it sounded like when we asked ChatGPT to write a poem about China's abuse of Uyghurs in Xinjiang.
The DARK History of OpenAI & ChatGPT (Video)
FROM THE MEDIA: Musk was one of the co-founders of OpenAI, but he stepped down from its board in 2018, reportedly to avoid any potential conflict of interest with Tesla's AI development for self-driving cars. Later on, he expressed disagreements with OpenAI's direction and actions, including the safety measures for its language model, GPT.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.