Attackers Gain Access to File Servers

0
[ad_1]

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack.

The company, an indirect subsidiary of B. Riley Financial, Inc., announced that an unauthorized entity breached its file systems, prompting an immediate and robust response to mitigate the damage.

Upon detecting the intrusion, Targus wasted no time mobilizing its incident response team.

With the aid of external cybersecurity experts, the company embarked on a thorough investigation to understand the scope and impact of the breach.

Efforts to contain the incident temporarily halted Targus’ business operations, highlighting the severity of the attack and the company’s commitment to security.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Recovery and Impact Assessment

Targus has since managed to contain the breach and is currently in the process of recovering its systems.

The company remains vigilant, with ongoing investigations to address all vulnerabilities.

Despite the temporary disruption, Targus and B. Riley Financial, Inc. are confident that the incident will not have a material impact on their financial health or operational results, as reported by the US Securities and Exchange Commission.

Regulatory Compliance and Law Enforcement Collaboration

Targus has notified the relevant regulatory authorities about the breach, which aligns with its commitment to transparency and legal compliance.

The company also cooperates with law enforcement agencies to trace the perpetrators and prevent future incidents.

This collaborative approach highlights Targus’ dedication to safeguarding its stakeholders’ interests.

Targus’ announcement includes forward-looking statements that caution stakeholders about risks and uncertainties.

These statements reflect the company’s current expectations based on the information available at the time.

However, they are subject to change, and the company commits to updating the public as new information becomes available.

The cyberattack on Targus is a stark reminder of the ever-present threats in the digital world.

While the breach has caused temporary disruptions, Targus’ swift response and comprehensive recovery plan demonstrate strength in adversity.

As the company continues to navigate this challenging time, its actions set a precedent for how businesses can effectively respond to and recover from cyber threats.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here


[ad_2]
Source link

35-year long identity theft leads to imprisonment for victim

0
[ad_1]

Sometimes the consequences of a stolen identity exceed anything you could have imagined.

Matthew David Keirans, a 58-year-old former hospital employee has pleaded guilty to assuming another man’s identity since 1988. He was convicted of one count of making a false statement to a National Credit Union Administration insured institution and one count of aggravated identity theft.

The man whose identity he assumed—William Donald Woods—and Keirans worked together in 1988 at a hot dog cart in Albuquerque.

Keirans was wanted for theft, so he used Woods’ identity “in every aspect of his life,” including obtaining employment, insurance and official documents, and even paying taxes under Wood’s name, according to a plea agreement signed by Keirans. He even fathered a child, whose last name is Woods.

In 1990, Keirans obtained a fraudulent Colorado identification card with Woods’ name and birthday. He used the ID to get a job at a fast-food restaurant and to get a Colorado bank account. He bought a car for $600 in 1991, using Wood’s name, with two $300 checks that bounced.

It wasn’t the first time Keirans had committed car theft. When he was 16, he stole a car after running away from his adoptive parents’ home in San Francisco.

In 2012, Keirans fraudulently acquired a copy of Woods’ birth certificate from the state of Kentucky using information he found about Woods’ family on Ancestry.com.

Under the assumed identity, Keirans also worked as a systems architect for the University of Iowa Hospital where he was fired for misconduct related to the identity theft investigation.

Meanwhile, the real William Woods was homeless and living in Los Angeles, when he discovered that someone was using his credit and had accumulated a lot of debt. Woods didn’t want to pay the debt and so went after the account numbers for any accounts he had open so he could close them. He handed a bank employee his real Social Security card and an authentic California Identification card, which matched the information the bank had on file. But because there was a large amount of money in the accounts, the bank employee asked Woods a series of security questions that he was unable to answer.

At that point, the bank employee called Keirans, whose phone number was associated with the accounts. He was able to answer the security questions correctly and stated that no one in California should have access to the accounts.

So, the bank employee called the police and after an investigation, the real Woods was arrested and charged with identity theft and false impersonation, under a misspelling of Keirans’ name: Matthew Kierans.

Because Woods refused to give up his own identity, a judge ruled in February 2020 that he was not mentally competent to stand trial and he was sent to a mental hospital in California, where he received psychotropic medication and other mental health treatment.

For legal reasons, Woods pleaded no contest to the identity theft charges—meaning he accepted the conviction but did not admit guilt—and was sentenced to two years imprisonment with credit for the two years he already served in the county jail and the hospital and was released.

But he didn’t give up his fight for his identity even though the judge ordered him to stop using the name William Woods. He attempted to regain his identity by filing customer disputes with financial organizations to clear his credit report.

It wasn’t until a police detective tested Woods’ biological father’s DNA against Woods’ DNA. Both men had the same birth certificate with the father’s name on it. The DNA test proved Woods was the man’s son. During a follow-up interview Keirans made a mistake and eventually confessed to the prolonged identity theft, according to court documents.

Keirans was indicted on five counts of making a false statement to a National Credit Union Administration insured institution and two counts of aggravated identity theft. He pleaded guilty to one count of each charge, and the other counts were dropped.

A sentence ruling has not yet been scheduled. Keirans is currently in the custody of the US Marshals Service, according to a news release about his plea.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.


[ad_2]
Source link

HONOR starts rolling out Android 14 with MagicOS 8.0 to global devices

0
[ad_1]

HONOR has started rolling out Android 14 with MagicOS 8.0 to global devices. The rollout seems to have started with the HONOR Magic5 Pro, as it came pre-installed on the Magic6 Pro.

HONOR has started rolling out the global version of Android 14 with MagicOS 8.0

Multiple users from several regions reported that the update is rolling out. They said so via Reddit. The changelog is quite beefy, and you can check it out in its entirety by opening the gallery below.

As you can see, the changelog is split into 7 categories, and the update weighs 3 GB. We’ll talk about some of those changes here, of course. HONOR says that new “smooth animations” are rolling out as part of the update. They should offer a “more natural and comfortable experience”.

The ‘Magic Capsule’ is included in the HONOR Magic5 Pro update

The so-called ‘Magic Capsule’ is also included in the update. It’s basically HONOR equivalent to Apple’s Dynamic Island feature, as the HONOR Magic5 Pro also has a pill-shaped cutout. It’s not centered, but it’s there.

Folders are now more customizable, and a new design is rolling out. The new update also allows for stacking cards of the same size on the home screen. So you can basically stack some widgets on top of each other.

This update also brings ‘Magic Portal’ to the table. It allows you to touch and hold text or images and drag them left or right to trigger Magic Portal in some apps. That way you can share them to other apps.

You can now also double-press the Volume Down button in order to enable Ultra Snapshot or trigger the Flashlight. The Ultra Power Saving mode is also a part of this update, just in case.

‘Parallel Space’ can keep your photos, videos, and apps extra private

The ‘Parallel Space’ has been included too. That is a safe space where you can save your photos, videos, and apps. All that, and much more is included in this update.

Do note that the update is quite hefty, though. So, chances are you’ll want to use a Wi-Fi connection for this update. It all depends on your data plan, of course.


[ad_2]
Source link

WhatsApp for Android working on a feature to notify you if someone mentions you in a status

0
[ad_1]

WhatsApp is regularly working on new features and we get to catch glimpses of unreleased ones or in beta all thanks to WABetaInfo. Now, we’re hearing about a feature that will notify you if you’re mentioned in a WhatsApp status update that you haven’t seen yet.

WhatsApp testing notifications for status mentions


This feature is for the Android version of the popular chat app, and it’s still hidden in the code that WABetaInfo was able to dig out. The new feature isn’t even out to beta testers yet, so it may take a while for it to make it as an official feature. It’s been spotted in the code for version 2.24.8.13, which suggests it’s in the works.

It is not entirely clear how this feature might work. It may be activated if someone mentions your WhatsApp username in a status update you have yet to read. It could also be further developed to allow you to select from whom you’d like to get such notifications.

This will help you stay on top of things you might have otherwise missed in the app. Another similar feature that helps you limit the things you’ve missed on WhatsApp is a visual indicator about missing calls from contacts that the company introduced last year.

As with anything that’s still in development though, we can’t be sure when this feature will become official. Stay tuned!


[ad_2]
Source link

D-Link RCE Vulnerability (CVE-2024-3273) Exploited in Wild

0
[ad_1]

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally.

Identified as CVE-2024-3273, this remote code execution (RCE) flaw poses a significant threat to as many as 92,000 devices worldwide.

The exploit allows attackers to execute arbitrary code on vulnerable devices, potentially leading to data theft, device hijacking, and the spread of malware.

The Discovery and Impact

A generic shell script pattern that botnet operators frequently use is involved in the exploit. This script attempts to execute malware across every possible CPU architecture, hoping that at least one attempt will succeed.

The malware, identified as “skid.x86,” is fetched from a remote server and has been analyzed and shared for further scrutiny on VirusTotal, a popular platform for malware analysis.

In response to the discovery, GreyNoise quickly released a tag for tracking attempts to exploit the CVE-2024-3273 vulnerability.

Document
Stop Advanced Phishing Attack With AI

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

D-Link, the manufacturer of the affected NAS devices, has issued a support announcement regarding the vulnerability.

The company is actively working on addressing the issue and has urged users of the affected devices to stay informed about updates and patches.

D-Link’s commitment to resolving the vulnerability is a critical step in mitigating the exploit’s impact and safeguarding users’ data and devices.

Free Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

The Broader Implications

The exploitation of CVE-2024-3273 highlights the constant threat that cybercriminals pose and the significance of effective cybersecurity measures.

It highlights the need for continuous monitoring, timely updates, and the adoption of best practices in cybersecurity.

For users of D-Link NAS devices, it is imperative to follow the company’s guidance and apply any available patches to protect against potential attacks.

The vulnerability was first brought to light by GreyNoise, a cybersecurity firm renowned for its expertise in internet-wide scans and attack analysis.

The active exploitation of the CVE-2024-3273 vulnerability in D-Link NAS devices is a stark reminder of the vulnerabilities within our digital infrastructure.

GreyNoise and D-Link’s swift response exemplifies the importance of vigilance and collaboration in the fight against cyber threats.

As the situation evolves, staying informed and taking proactive measures will be key to ensuring the security of our devices and data.

In a world where cyber threats are constantly evolving, the discovery and mitigation of vulnerabilities like CVE-2024-3273 play a crucial role in maintaining the integrity and security of our digital ecosystem.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.


[ad_2]
Source link

Samsung to soon fix Galaxy S23’s fingerprint issues on One UI 6.1

0
[ad_1]

Samsung is preparing a fix for the Galaxy S23’s fingerprint issues that cropped up following the One UI 6.1 update. Responding to a user’s complaint on its community forum, a moderator said that the company is aware of the issues and plans to release a new update to fix those. We don’t yet have a timeframe for its release.

An upcoming update will fix the Galaxy S23’s fingerprint issues

Samsung started updating eligible Galaxy devices to One UI 6.1 at the end of March. The Galaxy S23 series picked up the update first, followed by the Galaxy Z Fold 5, Galaxy Z Flip 5, and Galaxy Tab S9 series. While the new One UI version brought plenty of new features and improvements, it introduced a few bugs to the Galaxy S23 trio.

Users reported issues with fingerprint recognition and the touchscreen. Samsung has already confirmed that the Google Discover feed causes the latter issue. The Google app has compatibility problems with One UI 6.1 on the Galaxy S23, Galaxy S23+, and Galaxy S23 Ultra. It is up to Google to fix it, the company said. In the meantime, you can try deleting app data and restarting the phone.

The fingerprint issues, on the other hand, are something Samsung will fix itself. The Korean firm hasn’t revealed the underlying cause of the problem but confirmed that a fix is on the way. It may arrive with the April security update, which has been already pushed to the latest foldables, flagship tablets, and a handful of mid-range devices. The Galaxy S23 series should also get it soon.

The fingerprint icon occasionally disappears after the One UI 6.1 update

The fingerprint issues on the Galaxy S23 series seem to be fairly widespread. Over the past few days, many users have reported problems with fingerprint recognition following the One UI 6.1 update. They reported the issues on Reddit, X, Samsung Community, and other online platforms. The Galaxy S23 FE, which has an optical scanner instead of an ultrasonic scanner, is also affected.

According to user reports, the fingerprint icon occasionally disappears. When that happens, the phone doesn’t recognize fingerprints. They have to lift their finger, wait for the icon to re-appear, and try again. This can be frustrating, to say the least. Thankfully, Samsung has quickly acknowledged it and is preparing a fix. We will let you know when the update arrives. You can also manually check for updates from the Settings app.


[ad_2]
Source link

Despite fierce competition, TikTok keeps reigning supreme among video content platforms

0
[ad_1]

Achieving the prodigiousness and amplitude that TikTok accomplished is anything but an easy feat for the upcoming social media platforms of all kinds and purposes. It’s not a secret any longer that the vastness of this ubiquitous app stemmed from building a ground-breaking concept and turning this ambition from what seemed unrealistic and even too innovative to materialize into an easily accessible app within reach for anyone.

Other platforms aiming at the same goal were invented before TikTok, such as Vimeo, which caught traction rapidly, but was snuffed out just as briskly, leaving only the idea of a video-sharing platform behind as an heirloom for TikTok’s devs to work on. However, there are myriad key points where these two seemingly resembling platforms intersect, and the primary one is the uploading and sharing of video content from internaut to internaut with an easy click.

With all the magnitude achieved, people wonder whether anything better can commence and overshine TikTok, potentially bringing new opportunities to improve internauts’ lives in a more accessible and better-facilitated way. Some well-established platforms are struggling to rival and overtake TikTok, such as YouTube or Instagram, which developed resembling categories to gain some market shares. However, it appears that we should set aside such assumptions and premises, as TikTok secures its recognition as the primary avenue through which we can explore the world with just a click, and the following reasons stand as motivation. It remains the reigning avenue for creative inspiration and recommendation, catering to people’s need to learn newness right away without deep delving into instructional, long how-to content.

TikTok image 8339883983839983

TikTok, the anomaly: an unprecedented platform endorsed by academics

TikTok, the platform whose follower base count exceeded 1.5 billion, revolutionized the concept presented by Vimeo to become the largest and most popular video-content social media platform by niching in 15-second video shots from webcams or devices. To help the right audience reach suitable content and actually improve their knowledge in vast areas while developing new interests, possibilities that enabled video content creators to acquire likes and follows on TikTok emerged, bridging the gap between those sharing wisdom and those looking for it. This way, connecting with the targeted audience for whom one’s content is tailored has become easier than ever, ensuring that the platform’s users stay informed about even their most niche and unconventional interests.

This opportunity gave a voice to the voiceless and more, so professionals from the education and psychology systems now recommend individuals to take advantage of the platform’s prowess. Such endorsement has yet to be witnessed by other social media platforms since all that you can hear these days is how these avenues have transformed into a rather time-consuming and problematic addiction. Now, on-point hashtags such as “#teacher,” “#teachertok,” and “#teachersoftiktok” are witnessing increasing adoption rates on the back of their power in helping professors boost their knowledge to further spread it to disciples, ushering in a new era for education and deeper learning through alternative solutions.

Reasonably, TikTok is also to be consumed with precaution since it can rapidly transform into a not-so-healthy habit if one cannot make it through the day without accessing this app once or a few times. Yet, looking at the shared content, it’s safe to say that once the algorithm works in the user’s best interest, it can only reap the benefit of knowledge.
Stay alert and try to use the app solely for educational and entertainment purposes to ensure you’re only gaining the advantages of social media.

Deep learning and topics of high interest finally get tackled boldly

Since we’re now aware of one of the largest trends on TikTok, namely the professors’ involvement and their long-awaited outspeaking, it’s necessary to make a difference between implication by dint of puttering around but by emphasizing social and modern issues openly and daringly, tackling topics of the highest importance that get swept under the carpet by those possessing the power to change them for the better.

Likewise, professors are showcasing areas of improvement in the education system and beyond, so whether you’re into classroom decoration ideas, diverse and trending social justice topics, effective classroom management strategies, the resources are readily available at your fingertips.
Simultaneously, people can connect with those involved in the teaching and educational professions, including teachers, who can recommend all teaching-related matters. Advice, tips, tricks, and insights easily reachable and learned within seconds are what people can get when using TikTok beneficially.

TikTok is essentially a basic video content platform but with a twist

TikTok’s traction among users resembles a teenager’s adoration of pizza—it’s how things are. Yet, the TikTok algorithm is designed to help people from all areas of life improve their lifestyle, whether we look at start-ups and small businesses looking to grow their audience, talented individuals exploiting their flair and making careers, or simply those with entrepreneurial spirit kick off their project.

From TikTok to Hollywood, TikTokers with large followings made their way into the Hollywood world. They took it over, with myriad examples such as Addison Rae and Charli D’Amelio standing as proof of the power of free, endorsed expression. Being focused mainly on seconds-long videos, usually limited to less than 1-2 minutes, it’s easy to see why users prefer this platform for easily digestible, on-point video-englobed information, being no longer stuck with scrolling through endless streams of images or texts.

Time is being consumed more efficiently by anyone leveraging the platform, so give it a shot if you have something to say and want to be heard (or watched).

TikTok’s algorithm and bite-sized content approach are unparalleled

The TikTok algorithm is the best in the biz for recommending content to its user base thanks to its avant-garde recommending system that is continuously worked on and improved. Furthermore, its virality-driven features and snappy content provide a buffet of bite-sized video content to shape into the brainchild of trending challenges; this platform has transformed how the world consumes and regards content.

Drawing a parallel between this mammoth and an equally vast video-content platform, YouTube, one can observe that the former is exceptionally sculpted around short-sized videos, which appeals to the younger demographics.

As a fun fact, this bite-sized format led to the fame of the Creative Center – a place specially crafted for exploiting trend reports and coming trends. In contrast, a personalized commerce platform is offered for those looking to leverage in-app touchpoints such as live shopping, among other possibilities.

As you can see, gaining such unparalleled magnitude is anything but straightforward for any other media platform we know to date.


[ad_2]
Source link

Notepad++ Wants Your Help to Take Down the Parasite Website

0
[ad_1]

In a recent announcement, the team behind the widely acclaimed source code editor, Notepad++, has issued a call to arms for its user community.

The appeal comes in response to the emergence of a deceptive website that misleads users and poses significant security risks.

Here’s a closer look at the situation and how you can help.

The website [https://notepad.plus/] has been masquerading as an official source for downloading Notepad++.

This has led to confusion among users, some of whom have been tricked into believing it is the legitimate site for the popular code editor.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

The creators of Notepad++ have received numerous complaints through emails, social media, and forums, highlighting this imposter site’s frustration and potential dangers.!

Fi A screenshot showing the misleading website’s interface, clearly indicating its attempt to mimic the official Notepad++ site

Hidden Dangers Lurking Behind Every Click

Despite its claims of being an “unofficial fan website created for general information/educational purposes only,” the site harbors malicious intentions.

It is littered with misleading advertisements that aim to profit from unsuspecting visitors and pose serious security risks.

These ads are designed to trick users into clicking on them, thereby compromising their online safety.

The Real Victim: Notepad++ and Its Community

The existence of [https://notepad.plus/] does more than mislead users; it actively diverts traffic away from the legitimate Notepad++ website, notepad-plus-plus.org.

This undermines the integrity of the Notepad++ community and threatens user safety by exposing them to potential security threats.

The Notepad++ team is urging its community to take action against this parasitic website.

By reporting the site as harmful, you can play a crucial role in protecting not only the Notepad++ community but also the broader internet ecosystem.

Your vigilance and prompt action can help maintain a safe and secure online environment for all users.!

The call to action from the Notepad++ team is a reminder of the power of community.

In the face of deceptive practices and online threats, standing together can make a significant difference.

By reporting the malicious website, you contribute to a safer internet, ensuring that the integrity and security of the Notepad++ community remain intact.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here


[ad_2]
Source link

X brings passkey support to iPhones globally

0
[ad_1]

Back in January, Elon Musk’s social media platform X rolled out support for passkey login for iOS devices. However, initially, this feature was only available in the US. But now, things have changed.

X has now introduced passkey support for iOS devices worldwide. This means that anyone with an iPhone can now use a passkey as a login option, providing a more secure and convenient way to access their iOS devices and accounts.

Curious about passkeys? Passkeys are built using public key cryptography from the WebAuthentication standard. Here’s how it works: when you sign up for an account, your device creates a special key pair – one public and one private – for that account.

 
The public key is sent to and stored securely by X, while the private key stays on your device. Your passkey is never shared with X, keeping things secure and reducing the risk of unauthorized access to your account.


Oh, and with passkeys, you can wave goodbye to trying to remember those long and complicated passwords. Instead, you can simply use your biometric data with Face ID or Touch ID to access your accounts.

 
Overall, passkeys offer two major benefits:


  • Easy login: With passkeys, logging in becomes a breeze. Once set up, you can use your passkey to access your account across various devices without the hassle of remembering or resetting a forgotten password.

  • Better security: Passkeys provide a higher level of security for your account. Because they are generated uniquely by your device, they are less susceptible to security threats such as fraudulent or unauthorized attacks. This helps keep your account safe and secure.

If you’re using X and have an iOS device, and, of course, you want to use a passkey as a login option, here’s what you need to do:

  1. Log in to the X app with the account you want to enable the passkey for.
  2. Click on “Your account” in the navigation bar.
  3. Select “Settings and privacy,” then click on “Security and account access,” and then “Security.”
  4. Under “Additional password protection,” click on “Passkey.”
  5. Enter your password when prompted.
  6. Select “Add a passkey” and follow the prompts.

[ad_2]
Source link

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

0
[ad_1]

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain.

These mistakes can include weak passwords, unsecured networks, and outdated software, making it easier for threat actors to infiltrate and exploit vulnerabilities.

Recently, a top Israeli chief’s identity was exposed through a mistake in privacy.

Top Israeli Spy Chief Identity Exposed

Israel’s elite Unit 8200 surveillance agency chief Yossi Sariel inadvertently exposed his identity online through an embarrassing lapse linked to a book he anonymously published on Amazon under the name “Brigadier General YS.” 

The 2021 book “The Human Machine Team” on AI transforming military-machine relations included an email address traceable to Sariel’s name and a private Google account with ID, maps, and calendar profiles after over 20 years in the shadows.

Document
Stop Advanced Phishing Attack With AI

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

While the IDF called it a “mistake” and said the email wasn’t personal, the exposure highlights security lapses surrounding one of the world’s most powerful spy chiefs comparable to the NSA director.

The security lapse exposes the identity of Yossi Sariel, shadowy Unit 8200 cyber intel chief who “lives and breathes” intelligence, but whose tenure is marred by controversy, reads The Guardian report.

Unit 8200 built vast Palestinian surveillance yet failed to prevent Hamas’ deadly 2023 assault on Israel.

Critics say its “technological hubris” compromised intelligence gathering. 

In the Gaza war, IDF embraced Sariel’s radical AI vision where machines undertake complex battlefield tasks, possibly preventing repeat intelligence failures.

The exposure further pressures the elite spy chief leading Israel’s powerful NSA equivalent.

Unit 8200 chief Yossi Sariel’s 2021 book promoted integrating AI for “human-machine teaming” in warfare, reflecting his vision of machines assisting intelligence like IDF’s controversial AI target recommendation systems deployed in the Gaza bombardment. 

The book, written under an alias after US research, conveyed the balance of humans with AI over full autonomy.

Its exposure of Sariel’s identity adds pressure on the elite but criticized spy head, once part of “The Choir” pushing intelligence overhaul. 

IDF defends AI tools as lawful target verification aids for researchers despite concerns over corrupting human oversight and ethical risks from unproven battlefield AI systems rapidly developed under Sariel’s leadership.

The public disclosure highlights increasing pressure on the boss of Israel’s elite Unit 8200, Yossi Sariel, whose 2021 book under an alias promoted an AI-driven “targets machine” that employed big data to fuse intelligence and warfare with a non-human focus on technology.

Sariel was subjected to unusual public censure for the Israeli intelligence agency Unit 8200’s “technological arrogance,” which led to fatal intel failure in the wake of the Hamas attack on Israel in 2023.

However, his leadership witnessed his technological vision conflicting with traditional intelligence techniques, as revealed by this latest security leak regarding his identification in conjunction with Israel reflecting over its worst intelligence letdown during his command.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.


[ad_2]
Source link