Feed aggregator
Act Fast to Grab the Bose SoundLink Flex Portable Bluetooth Speaker While It’s Down to $113
Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses
DeepMind found that current AI frameworks are ad hoc, not systematic, and fail to provide defenders with useful insights.
The post Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses appeared first on SecurityWeek.
“Nudify” deepfakes stored unprotected online
Yesterday, we told you about how millions of pictures from specialized dating apps had been stored online without any kind of password protection.
Now it’s the turn of an AI “nudify” service.
A researcher, famous for finding unprotected cloud storage buckets, has uncovered an unprotected AWS bucket belonging to the nudify service.
The rising popularity of these nudify services apparently has caused a selection of companies without any security awareness to hop on the money train. Millions of people use these services to turn normal pictures into nude images, and it only takes a few minutes.
South Korean AI company GenNomis by AI-NOMIS or somebody acting at their behalf stored 93,485 images and json files with a total size of 47.8 GB in a non-password-protected nor encrypted, but publicly exposed database.
Looking at the service, GenNomis is an AI-powered image generation platform that allows users to transform text descriptions into images, create AI personas, turn images to videos, face-swap images, remove backgrounds, etc., and all that without restrictions. It also provides a marketplace, where users can buy and sell these images as “artwork.”
The researcher saw numerous pornographic images, including what appeared to be disturbing AI-generated portrayals of very young people. Even though the GenNomis guidelines prohibit explicit images of children and any other illegal activities, the researcher found many of them. That doesn’t mean they were available to buy on the platform, but they were at least created.
Some of the deepfakes are hard to discern from real images, and as such may lead to serious privacy, ethical, and legal risks. Not to mention the humiliation for the owners of those images or parts thereof who didn’t consent. Sadly, there are many examples where young people have taken their own lives over sextortion attempts.
The researcher contacted the company about what he had found. He told The Register:
“They took it down immediately with no reply.”
Keep your children safe from nudify servicesWe’ve seen many cases where social media and other platforms have used the content of their users to train their AI. Some people have a tendency to shrug it off because they don’t see the dangers, but let us explain the possible problems.
In this case, it’s at the extreme end of what the content could be used for.
- Deepfakes: Users of this generative AI could have used the nudify service on publicly available pictures to create explicit deepfakes without consent. AI generated content, like deepfakes, can be used to spread misinformation, damage your reputation or privacy, or defraud people you know.
- Metadata: Users often forget that the images they upload to social media also contain metadata, such as where the photo was taken. This information could potentially be sold to third parties or used in ways the photographer didn’t intend.
- Intellectual property. Never upload anything you didn’t create or own. Artists and photographers may feel their work is being exploited without proper compensation or attribution.
- Bias: AI models trained on biased datasets can perpetuate and amplify societal biases.
- Facial recognition: Although facial recognition is not the hot topic it once used to be, it still exists. And actions or statements done by your images (real or not) may be linked to your persona.
- Memory: Once a picture is online, it is almost impossible to get it completely removed. It may continue to exist in caches, backups, and snapshots.
If you want to continue using social media platforms that is obviously your choice, but consider the above when uploading pictures of you, your loved ones, or even complete strangers.
We don’t just report on threats—we remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.
Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”
Delaware, USA, 2nd April 2025, CyberNewsWire
The post Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” appeared first on The Security Ledger with Paul F. Roberts.
Zelle Is Shutting Down Its App
CapCut Could Get Banned With TikTok This Week. Consider Using These Replacements
Civilization Was Built on Madness
Article URL: https://woodfromeden.substack.com/p/civilization-was-built-on-madness
Comments URL: https://news.ycombinator.com/item?id=43556456
Points: 1
# Comments: 0
Nintendo Switch 2 – release June 5th, 2025
Article URL: https://www.nintendo.com/successor/en-us/index.html
Comments URL: https://news.ycombinator.com/item?id=43556455
Points: 1
# Comments: 0
Tesla suffers worst quarter since 2022 as deliveries tumble
Article URL: https://www.ft.com/content/0ebcec51-2a5a-4820-99e8-1e500370fd68
Comments URL: https://news.ycombinator.com/item?id=43556443
Points: 1
# Comments: 0
About Time (Abstract)
How do you " understand/feel " the time? In context of years, decades. Are there any differences between "feeling" the time now and idk in 1990s? I would love to hear your points..
Comments URL: https://news.ycombinator.com/item?id=43556433
Points: 1
# Comments: 0
Things No One Tells You About Raising from LPs
Article URL: https://taghash.io/blog/10-things-no-one-tells-you-about-raising-from-lps/
Comments URL: https://news.ycombinator.com/item?id=43556415
Points: 1
# Comments: 0
North Korea’s IT Operatives Are Exploiting Remote Work Globally
The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations.
The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared first on SecurityWeek.
Nintendo Switch 2 Is Coming June 5: Games And More Announced
The Crossroads Between AI and Art: Finding the Sweet Spot
Article URL: https://spin.atomicobject.com/ai-artistic-expression-sweet-spot/
Comments URL: https://news.ycombinator.com/item?id=43556398
Points: 1
# Comments: 0
Using fake deadlines without driving your engineers crazy
Article URL: https://newsletter.manager.dev/p/using-fake-deadlines-without-driving
Comments URL: https://news.ycombinator.com/item?id=43556370
Points: 2
# Comments: 0
Dijkstra: On the foolishness of "natural language programming" (2010)
Article URL: https://www.cs.utexas.edu/~EWD/transcriptions/EWD06xx/EWD667.html
Comments URL: https://news.ycombinator.com/item?id=43556360
Points: 2
# Comments: 0
Show HN: Probirka – Python library for writing simple asynchronous healthchecks
A few years ago, we worked on a rather problematic project. There were issues both in the code and in the cluster running the product. During troubleshooting, we developed a small library for running health checks, which helped us a lot and is still in use today. It seems like it could be useful to others as well, so not long ago, we published it on GitHub under the name Probirka. It’s worth noting that I really like this library in the end, despite the fact that it’s not perfect and part of the documentation was generated with the help of an AI assistant.
Comments URL: https://news.ycombinator.com/item?id=43556358
Points: 2
# Comments: 0
What I would do if I was 18 now
Article URL: https://levels.io/eighteen/
Comments URL: https://news.ycombinator.com/item?id=43556355
Points: 2
# Comments: 0
Sports supplement creatine makes no difference to muscle gains, trial finds
Starlink sets up subsidiary in Faroe Islands
Article URL: https://dimma.fo/grein/starlink-vil-veita-internet-i-foroyum-stovnadu-foroyskt-smapartafelag
Comments URL: https://news.ycombinator.com/item?id=43556344
Points: 2
# Comments: 2