Did you know that AI geolocation tools can find the location of photos taken indoors? 😳
(I found out half an hour ago from twitter.com/ronkaminskyy)
(checked 4 pictures from the rental adverts and for 3 of them the city was correctly identified)
Did you know that AI geolocation tools can find the location of photos taken indoors? 😳
(I found out half an hour ago from twitter.com/ronkaminskyy)
(checked 4 pictures from the rental adverts and for 3 of them the city was correctly identified)
I created a web service that allows you to verify on which yara versions your rule compiles.
In the past, shipping rules to customers, I wondered if there were limitations but couldn't find out easily. Now I can.
https://yaravalidator.manalyzer.org
But wait, do you have many rules that need to be checked for compliance? I got you covered, there's also an API with a complete Python script provided.
The paint is still fresh and I have ideas for improvements, but I hope you'll find it useful!
Shocking spyware attacks have been attempted against civil society, journalists, politicians and academics in the European Union (EU), USA and Asia, according to a major new investigation by Amnesty International. Among the targets of Predator spyware are United Nations (UN) officials, a Senator and Congressman in the USA and even the Presidents of the European […]

If global warming reaches or exceeds two degrees Celsius by 2100, University of Western Ontario's Joshua Pearce says it is likely that mainly richer humans will be responsible for the death of roughly one billion mainly poorer humans over the next century.
NEW: Elon Musk’s brain-chip startup conducted years of tests at #UCDavis, a public university. A WIRED investigation reveals how #Neuralink and the university keep the grisly images of its botched — and sometimes unlawful — surgeries hidden. (TW: graphic descriptions)
https://www.wired.com/story/neuralink-uc-davis-monkey-photos-videos-secret/
Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in attacks.