OpenAI Claims DeepSeek Plagiarized Its Plagiarism Machine
Why blocking China's DeepSeek from using US AI may be difficult
DeepSeek may have benefited from a method that allegedly piggybacks off the advances of U.S. rivals called "distillation." The technique, which involves one AI system learning from another AI system, may be difficult to stop. The distillation technique involves having an older, more established and powerful AI model evaluate the quality of the answers coming out of a newer model, effectively transferring the older model's learnings.
Distillation is a common technique used in the AI field--it's "par for the course" in the AI industry.
Guess who left a database wide open, exposing chat logs, API keys, and more? Yup, DeepSeek
Researchers found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data. It was hosted at oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000.
"This database contained a significant volume of chat history, backend data and sensitive information, including log streams, API Secrets, and operational details."
To make matters worse, Wiz said, the exposure allowed for full control of the database and potential privilege escalation within the DeepSeek environment, without any authentication or barrier to external access.
Apple is the biggest winner of DeepSeek’s new AI breakthrough
Apple has been criticized for lagging behind in the “LLM wars."
This breakthrough means Apple can now develop competitive AI models without the multi-billion-dollar investments previously required. By staying out of the early stages of the AI arms race, Apple may have saved billions.
Trump plans to build mass detention camp for deportees at Guantánamo Bay
Trump cribs Musk’s “fork in the road” Twitter memo to slash gov’t workforce
It promises six months' severance pay to anyone who leaves. But it's like everything Trump and Musk does--no preparation, probably not legal, not funded, and it's doubtful the severance will actually be paid.
Man arrested near US Capitol allegedly intended to kill prominent Republicans
Man found with knife and two molotov cocktails planned to kill Mike Johnson and Pete Hegseth. He had two “destructive devices” on him in the form of 50ml bottles containing Absolut brand vodka with torn clothing stuffed into them. He was also carrying a folding knife.
Trump signs sweeping order to further restrict trans care for minors nationwide
It prohibits federal funding from covering such care for minors, restricts research and education grants to medical schools and hospitals, and directs the secretary of Health and Human Services to issue regulations to end such care for minors.
Solana Pump.fun tool DogWifTool compromised to drain wallets
Hackers have compromised the Windows version of the DogWifTools software for promoting meme coins on the Solana blockchain in a supply-chain attack that drained users' wallets.
The developers claim that a malicious threat actor compromised the project's private GitHub repository after reverse engineering the software to extract a GitHub token.
Secrets management
Eliminate hard-coded credentials, keys, and tokens across different clouds and environments. Vault provides centralized secret management and application middleware for key management and data encryption.
Biohacker Bryan Johnson slammed for measuring quality of teen son's erections and comparing them to his own
Meet Adam: The World's First Erection Health Tracker
NordVPN Says Its New Protocol Can Circumvent VPN Blockers
The Protesters' Guide to Smartphone Security
German Seagate customers say their 'new' hard drives were actually used – resold HDDs reportedly used for tens of thousands of hours
Researchers say new attack could take down the European power grid
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
New Apple CPU side-channel attacks steal data from browsers