Fresh AI on Security: Digital Fingerprinting Deters Identity Attacks

Add AI to the list of defenses against identity attacks, one of the most common and hardest breach to prevent. More than 40% of all data compromises involved stolen credentials, according to the 2022 Verizon Data Breach Investigations Report. And a whopping 80% of all web application breaches involved credential abuse. “Credentials are the favorite …

Fresh AI on Security: Digital Fingerprinting Deters Identity AttacksRead More

Booked for Brilliance: Sweden’s National Library Turns Page to AI to Parse Centuries of Data

For the past 500 years, the National Library of Sweden has collected virtually every word published in Swedish, from priceless medieval manuscripts to present-day pizza menus. Thanks to a centuries-old law that requires a copy of everything published in Swedish to be submitted to the library — also known as Kungliga biblioteket, or KB — …

Booked for Brilliance: Sweden’s National Library Turns Page to AI to Parse Centuries of DataRead More

What Is AI Computing?

The abacus, sextant, slide rule and computer. Mathematical instruments mark the history of human progress. They’ve enabled trade and helped navigate oceans, and advanced understanding and quality of life. The latest tool propelling science and industry is AI computing. AI Computing Defined AI computing is the math-intensive process of calculating machine learning algorithms, typically using …

What Is AI Computing?Read More

CVE-2022-35690: Unauthenticated RCE in Adobe ColdFusion

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Lucas Miller and Dusan Stevanovic of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in Adobe ColdFusion. This bug was originally reported to the ZDI program by a researcher known as rgod. The vulnerability is due to the …

CVE-2022-35690: Unauthenticated RCE in Adobe ColdFusionRead More

AI’s Leg Up: Startup Accelerates Robotics Simulation for $8 Trillion Food Market

Robots are finally getting a grip. Developers have been striving to close the gap on robotic gripping for the past several years, pursuing applications for multibillion-dollar industries. Securely gripping and transferring fast-moving items on conveyor belts holds vast promise for businesses. Soft Robotics, a Bedford, Mass., startup, is harnessing NVIDIA Isaac Sim to help close …

AI’s Leg Up: Startup Accelerates Robotics Simulation for $8 Trillion Food MarketRead More

The Ultimate Upgrade: GeForce RTX 4080 SuperPOD Rollout Begins Today

The Ultimate upgrade begins today: GeForce NOW RTX 4080 SuperPODs are now rolling out, bringing a new level of high-performance gaming to the cloud. Ultimate members will start to see RTX 4080 performance in their region soon, and experience titles like  Warhammer 40,000: Darktide, Cyberpunk 2077, The Witcher 3: Wild Hunt and more at ultimate …

The Ultimate Upgrade: GeForce RTX 4080 SuperPOD Rollout Begins TodayRead More

ZDI-23-090: Siemens Solid Edge Viewer JT File Parsing Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

ZDI-23-089: Siemens Solid Edge Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.