Author: admin
ZDI-23-093: Cacti poll_for_data Command Injection Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cacti. Authentication is not required to exploit this vulnerability.
Cyberpunk 2077 Brings a Taste of the Future With DLSS
Analyst reports. Academic papers. Ph.D. programs. There are a lot of places you can go to get a glimpse of the future. But the best place might just be El Coyote Cojo, a whiskey-soaked dive bar that doesn’t exist in real life. Fire up Cyberpunk 2077 and you’ll see much more than the watering hole’s …
Cyberpunk 2077 Brings a Taste of the Future With DLSSRead More
Broadcaster ‘Nilson1489’ Shares Livestreaming Techniques and More This Week ‘In the NVIDIA Studio’
Editor’s note: This post is part of our weekly In the NVIDIA Studio series, which celebrates featured artists, offers creative tips and tricks, and demonstrates how NVIDIA Studio technology improves creative workflows. We’re also deep diving on new GeForce RTX 40 Series GPU features, technologies and resources, and how they dramatically accelerate content creation. Broadcasters …
Pwn2Own Automotive: Bringing Researchers and Auto Manufacturers Together
Today at the Automotive World conference in Tokyo, Japan, I presented a talk in the Cyber Security from the Perspectives of Hackers and Automakers track. During this presentation, I announced the ZDI will host a new Pwn2Own contest focused on automotive systems – Pwn2Own Automotive. This contest will be held at next year’s Automotive World …
Pwn2Own Automotive: Bringing Researchers and Auto Manufacturers TogetherRead More
What Are Large Language Models Used For?
AI applications are summarizing articles, writing stories and engaging in long conversations — and large language models are doing the heavy lifting. A large language model, or LLM, is a deep learning algorithm that can recognize, summarize, translate, predict and generate text and other content based on knowledge gained from massive datasets. Large language models …
DLSS 3 Delivers Ultimate Boost in Latest Game Updates on GeForce NOW
GeForce NOW RTX 4080 SuperPODs are rolling out now, bringing RTX 4080-class performance and features to Ultimate members — including support for NVIDIA Ada Lovelace GPU architecture technologies like NVIDIA DLSS 3. This GFN Thursday brings updates to some of GeForce NOW’s hottest games that take advantage of these amazing technologies, all from the cloud. …
DLSS 3 Delivers Ultimate Boost in Latest Game Updates on GeForce NOWRead More
Braced From Space: Startup Keeps Watchful Eye on Gas Pipeline Leaks Across the Globe
As its name suggests, Orbital Sidekick is creating technology that acts as a buddy in outer space, keeping an eye on the globe using satellites to help keep it safe and sustainable. The San Francisco-based startup, a member of the NVIDIA Inception program, enables commercial and government users to optimize sustainable operations and security with …
Braced From Space: Startup Keeps Watchful Eye on Gas Pipeline Leaks Across the GlobeRead More
NVIDIA CEO Ignites AI Conversation in Stockholm
More than 600 entrepreneurs, developers, researchers and executives from across the Nordics flocked Tuesday to Stockholm’s sleek Sergel Hub conference center in a further sign of the strength of the region’s AI ecosystem. The highlight: a far-reaching conversation between NVIDIA founder and CEO Jensen Huang and Swedish industrialist Marcus Wallenberg exploring the intersections of AI, …
Supersizing AI: Sweden Turbocharges Its Innovation Engine
Sweden is outfitting its AI supercomputer for a journey to the cutting edge of machine learning, robotics and healthcare. It couldn’t ask for a better guide than Anders Ynnerman (above). His signature blue suit, black spectacles and gentle voice act as calm camouflage for a pioneering spirit. Early on, he showed a deep interest in …
Supersizing AI: Sweden Turbocharges Its Innovation EngineRead More
Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
Starting in July of 2022, the Windows CSRSS process entered the consciousness of the infosec community as the source of several local privilege escalation vulnerabilities in Microsoft Windows. The first public information appeared on July 12 with the release of the patch for CVE-2022-22047, which was being actively exploited. Shortly thereafter, Microsoft published an article …
Activation Context Cache Poisoning: Exploiting CSRSS for Privilege EscalationRead More
NEWS
-
ZDI-23-093: Cacti poll_for_data Command Injection Remote Code Execution Vulnerability
February 1, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cacti. Authentication is not required to exploit this vulnerability. -
Cyberpunk 2077 Brings a Taste of the Future With DLSS
February 1, 2023Analyst reports. Academic papers. Ph.D. programs. There are a lot of places you can go to get a glimpse of the future. But the best place might just be El Coyote Cojo, a whiskey-soaked dive bar that doesn’t exist in... -
Broadcaster ‘Nilson1489’ Shares Livestreaming Techniques and More This Week ‘In the NVIDIA Studio’
February 1, 2023Editor’s note: This post is part of our weekly In the NVIDIA Studio series, which celebrates featured artists, offers creative tips and tricks, and demonstrates how NVIDIA Studio technology improves creative workflows. We’re also deep diving on new GeForce RTX...