Iran’s Khamenei says US will not be able to destroy government
Iran’s Supreme Leader Ali Khamenei has taken aim at Donald Trump.
More results...
Iran’s Supreme Leader Ali Khamenei has taken aim at Donald Trump.
submitted by /u/Street_Anon [link] [comments]
A major security vulnerability was recently discovered in the online infrastructure of Dava India, one of the country’s largest generic pharmacy retail chains. The breach, identified by security researcher Eaton, exposed sensitive customer person…
Lunar New Year Horoscopes for 2026, the Year of the Fire Horse Teen VogueChinese zodiac predictions: What’s in store for 2026 as we enter the Year of the Fire Horse CNNLunar New Year 2026 Google DoodlesThe Year of the F…
Here are three papers describing different side-channel attacks against LLMs.
“Remote Timing Attacks on Efficient Language Model Inference“:
Abstract: Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average case) efficiency of language model generation. But these techniques introduce data-dependent timing characteristics. We show it is possible to exploit these timing differences to mount a timing attack. By monitoring the (encrypted) network traffic between a victim user and a remote language model, we can learn information about the content of messages by noting when responses are faster or slower. With complete black-box access, on open source systems we show how it is possible to learn the topic of a user’s conversation (e.g., medical advice vs. coding assistance) with 90%+ precision, and on production systems like OpenAI’s ChatGPT and Anthropic’s Claude we can distinguish between specific messages or infer the user’s language. We further show that an active adversary can leverage a boosting attack to recover PII placed in messages (e.g., phone numbers or credit card numbers) for open source systems. We conclude with potential defenses and directions for future work…
Four people were taken to hospital after inhaling smoke
As an assembly member, Mamdani backed the Stop Fakes Act. Now, the NYPD has admitted to spying online – but wielding actual power as mayor is complexWhen Zohran Mamdani was a New York state assembly member, he sponsored the Stop Fakes Act, which would …
The large-scale disclosure of materials known as the “Epstein Files” has revealed “disturbing and credible evidence” of what independent human rights experts describe as a possible global criminal enterprise involving systematic sexual abuse, trafficki…
As the war in Sudan approaches a fourth year, the UN refugee agency, UNHCR, and 123 partners appealed on Tuesday for $1.6 billion to support millions of people forced to flee the country in pursuit of safety. Read the full story, “Sudan crisis: UN agen…
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
CVE-2008-0015 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
CVE-2020-7796 Synacor Zim…