Author: user
Elon Musk has spent decades building a universe of companies that has served as an incubator for up-and-coming engineers and a proving ground for his inner circle. That universe — an ecosystem of Silicon Valley tech titans, veterans of his companies like Tesla and SpaceX, and a crop of fresh-faced hackers and software engineers — has now collided with the U.S. federal government. The dozens of individuals who work under, or advise, Musk and the Trump-ordered Department of Government Efficiency — individuals who TechCrunch has identified or confirmed independently — reflects more than the billionaire’s proclivity to collect talent. They…
Elon Musk’s AI chatbot Grok 3 has surged past Deepseek, earning the second spot among Apple’s US App Store free apps. This leap comes just 12 hours after the successful launch, thanks to the much-historical account of Grok 3 as “the smartest AI on Earth.” App Store data shows that Grok 3 stands behind Openai’s ChatGpt, which surpasses China’s Deepseek, but still continues to dominate as the world’s top chatbot. Grok 3 fails hexagon ball bounce test Not everything is smooth sailing on the Grok 3. Despite the rapid climbing of downloads, the chatbot struggled with coding tasks and followed…
WASHINGTON (AP) – The Trump administration is giving American schools and universities to eliminate two weeks Diversity Initiative Or risk losing federal funds, raising the stakes of the president’s fight against “attraction,” and winging the confusion as the school rushes to follow.In a memo on Friday, the education department gave an ultimatum to cease the use of “racial preferences” as a factor in admissions, financial aid, employment, or other areas. Schools are given 14 days to complete practices treating students and workers differently for their race.The drastic demand could support education in countless ways. Memos target university admissions offices and…
February 18, 2025Ravi LakshmananVulnerability/Network Security Two security vulnerabilities have been discovered in the Openssh Secure Networking utility suite. conditions. The vulnerabilities detailed by the Qualys Threat Research Unit (TRU) are listed below – CVE-2025-26465-OpenSSH client contains versions 6.8p1-9.9p1 (comprehensive) logic errors that are vulnerable to active MITM attacks when the VerifyHostKeyDNS option is enabled. Client tries to connect to IT (introduced December 2014) CVE-2025-26466- OpenSSH client and server are pre-accepted between versions 9.5p1 and 9.9p1 (comprehensive) causing memory and CPU consumption Vulnerable to DOS attacks (Introduced (Introduced) August 2023) “If an attacker can perform a midterm attack via CVE-2025-26465, the…
The spotlight has become increasingly a key role in battery technology as the world competes to find urgent and sustainable solutions to meet its energy needs. From power vehicles and next-generation home appliances to enabling the potential for renewable energy storage, battery technology is at the heart of the latest technology and the transition to cleaner, energy-efficient future energy grids, and fossils Reduce fuel dependence and adoption of renewable energy sources. The quest for smaller, lighter, safer batteries is driving constant innovation across the field. And the need for efficient, long-lasting, faster, reliable batteries for electric vehicles (EVs) has become…
February 18, 2025Ravi LakshmananCyber Spy/Malware Chinese state-sponsored threat actors known as Mustang Pandas have been observed using new techniques to avoid detection and maintain control over infected systems. This involves injecting the malicious payload of a threat actor into an external process using a legitimate Microsoft Windows utility called the Microsoft Application Virtualization Injector (Mavinject.exe). analysis. “Attacks include deleting multiple files, including legitimate executables and malicious components, and deploying decoy PDFs to deflect victims,” said security researcher Nathaniel Morales. Nick Dye pointed out. “In addition, Earth Preta can use Setup Factory, an installer builder for Windows software to drop and…
Browsers are at the forefront of cyber threats, and attacks like browser man-like are becoming more common. The San Francisco-based cybersecurity startup is now focused on protecting web applications, and Mirortab has secured new funds to take part in this fight. Today, Mirrortab announced it has raised $8.5 million in seed funds. The round was led by Valley Capital Partners with backs from GV, Ludlow Ventures, Altman Capital Fund, Nextgen Venture Partners and Alumni Ventures. Mirrortab uses fresh capital to expand its capabilities, enhance integration and commercialize products. A new approach to web security Mirrortab is stepping into a crowded…
A pioneer in real-world assets (RWA) space, Cryptoautos is showing significant progress in buying up $20 million worth of vehicles in Dubai and filling physical assets with digital assets. The acquisition highlights Cryptoautos’ commitment to redefine vehicle ownership and investment through blockchain technology. Bring RWA to the forefront Real-world assets (RWAs) have become one of the most promising stories in blockchain, allowing users to seamlessly tokenize, trade and invest physical assets. Cryptoautos is a concrete and scalable business model that unlocks new liquidity and accessibility for digital asset owners by purchasing a fleet of high value vehicles. “Acquiring real-world assets…
Just hours after the successful launch of its latest AI model, the Grok 3, Elon Musk’s AI startup Xai is stepping into AI gaming with plans to launch an AI-powered game development studio. Musk confirmed the news in a quick response on X (formerly Twitter) after user Dima Zeniuk posted about the rumored studio. Mask responded with a simple “yes.” “Elon Musk’s Xai is planning to launch an AI game studio,” Zeniuk posted. Musk replied “Yes.” Yes https://t.co/txlpmvjjjp – Elon Musk (@elonmusk) February 17, 2025 The idea is nothing new. In November, Musk suggested frustration with the gaming industry’s state…
Intel by intruders uses AI to contextualize NVD descriptions, helping security teams assess risks faster. Intruders, the leader in attack surface management, have begun AI-generated explanations within Intel, a free vulnerability intelligence platform. This new feature is to enhance the ability of cybersecurity professionals to quickly understand and assess vulnerabilities and address common pain points. With thousands of vulnerabilities exposed each year, security teams rely on NVD as an important resource to investigate CVEs. However, NVD explanations often lack clarity and context, making it difficult to determine the potential impact at a glance. Intel’s AI Summary transforms NVD descriptions into…