-
The AI Debate: Google’s Guidelines, Meta’s GDPR Dispute, Microsoft’s Recall Backlash
Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a responsible manner. The new guidance from the search and advertising giant is an effort to combat problematic content, including sexual content and hate speech, created through such tools. To that end, apps that generate content using AI must ensure…
-
FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims
The U.S. Federal Bureau of Investigation (FBI) has disclosed that it’s in possession of more than 7,000 decryption keys associated with the LockBit ransomware operation to help victims get their data back at no cost. “We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our…
-
Portland truck maker, partners name US battery manufacturing JV, tap CEO
Daimler Truck North America says venture will ensure access to the batteries it needs for electric trucks.
-
Portland home prices edge up in May
The median home price in the Portland metro rose 1.5% from the same time last year, according to the Regional Multiple Listing Service.
-
JaCiva’s Bakery & Chocolatier in Portland will close June 29
The nearly 40-year-old Portland business announced its closure last year.
-
Former Portland metro energy sector exec reveals new CEO post
Anthony Carroll had served as president at Powin, the big battery energy storage system provider.
-
CNN’s Rachel Smolkin named new Oregon Public Broadcasting CEO and president
She currently oversees CNN’s digital news operations in the U.S. and internationally.
-
Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks
The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. “Muhstik is a well-known threat targeting IoT devices and Linux-based servers, notorious for its ability to infect devices and utilize them for cryptocurrency mining and launching Distributed Denial
-
Third-Party Cyber Attacks: The Threat No One Sees Coming – Here’s How to Stop Them
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. In an increasingly interconnected world, supply chain attacks have emerged…
-
Prevent Account Takeover with Better Password Security
Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for his social media accounts and on his personal devices too. Unbeknownst to Tom, one of these sites has had its password database compromised by hackers…