Posts Tagged ‘MF’

Chat GPT

December 18, 2022

https://chat.openai.com/

Google delays its plans to shelve free G Suite accounts… by a month

April 9, 2022

https://thenextweb.com/news/psa-google-free-g-suite-discontinuation-analysis

Knoxville Ransomware Attack

June 22, 2020

Knoxville Ransomware Attack Leads to IT Network Shutdown

QT:{{”
“In 2019, a total of 113 state or municipal entities were impacted by ransomware. Knoxville is the 51st city to be hit in 2020, Callow said.

Last year, two Florida cities – Lake City and Riviera Beach – were both hit by ransomware attacks and decided to pay off the hackers…. ”

‘ “These smaller government agencies often chug along old legacy infrastructure, and that old legacy infrastructure is easy for bad actors to exploit.” ‘
“}}

https://threatpost.com/knoxville-ransomware-attack-leads-to-it-network-shutdown/156537/

Genomic epidemiology of hCoV-19

March 28, 2020

https://www.gisaid.org/epiflu-applications/next-hcov-19-app/

https://nextstrain.org/

Keep those Zoom URLs secure

March 27, 2020

USC, school districts getting ‘Zoom-bombed’ with racist taunts, porn as they transition to online meetings

https://www.latimes.com/california/story/2020-03-25/zoombombing-usc-classes-interrupted-racist-remarks

SF startup begins offering home test for COVID-19 – SFGate

March 21, 2020

https://www.sfgate.com/living-in-sf/article/SF-startup-begins-offering-home-test-for-COVID-19-15146893.php

CO emissions

February 16, 2020

NYC doesn’t look that great either
https://www.windy.com/-Show—add-more-layers/overlays?cosc,17.289,99.356,3

GAN

September 14, 2019

Style-based GANs – Generating and Tuning Realistic Artificial Faces
https://www.lyrn.ai/2018/12/26/a-style-based-generator-architecture-for-generative-adversarial-networks/

SKS Keyserver Network Under Attack

July 5, 2019

a good example of a hypothetical attack that now becomes real

https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f QT:{{”
“The number one use of OpenPGP today is to verify downloaded packages for Linux-based operating systems, usually using a software tool called GnuPG. If someone were to poison a vendor’s public certificate and upload it to the keyserver network, the next time a system administrator refreshed their keyring from the keyserver network the vendor’s now-poisoned certificate would be downloaded. At that point upgrades become impossible because the authenticity of downloaded packages cannot be verified. Even downloading the vendor’s certificate and re-importing it would be of no use, because GnuPG would choke trying to import the new certificate. It is not hard to imagine how motivated adversaries could employ this against a Linux-based computer network.”
“}}

Message header Parser

June 19, 2019

https://toolbox.googleapps.com/apps/messageheader/analyzeheader