
Autonomous driving is not so hot
From the perspective of the two major markets of the United States and China, the autonomous driving industry has fallen into a low tide in recent years. For example, last year, Cruise Origin, one of the twin stars of Silicon Valley autonomous driving companies and once valued at more than $30 billion, failed completely, its Robotaxi (driverless taxi) operation qualification was revoked, and autonomous driving models have been discontinued. However, as a new track with the deep integration of digital economy and real economy, automatic driving is a must answer: on the one hand, automatic driving will accelerate the process of technology commercialization and industrialization, and become an important part of the game of major powers; On the other hand, autonomous driving will also promote industrial transformation and upgrading by improving the mass travel service experience, seeking new engines for urban development, and injecting new vitality into the urban economy.

Porsche AG reports sharp fall in China deliveries
July 9 (Reuters) - German sportscar maker Porsche (P911_p.DE), opens new tab said on Tuesday that global vehicle deliveries were down 7% in the first half of the year compared to the same period in 2023, primarily driven by a 33% year-on-year drop in China. Porsche, majority-owned by Volkswagen (VOWG_p.DE), opens new tab, is highly exposed to the EU-China tariff tensions, with deliveries to China accounting for nearly 20% of global deliveries. An HSBC analyst pointed to weakness in the European car market, saying that "the market is, understandably, worried about China pricing weakness and the prospect of needing to pay dealer compensation." Overall, Porsche delivered 155,945 cars worldwide during the first six months of the year. In North America, deliveries were down 6% year-on-year. Meanwhile, in Porsche’s home market of Germany, deliveries increased by 22% to 20,811 vehicles.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.

Clear Check | Russian satellite disintegrated and hit GPS and Starlink satellites?
On June 27, the U.S. Space Command announced that a retired Russian satellite disintegrated in low Earth orbit on June 26, generating more than 100 pieces of debris, forcing astronauts on the International Space Station to hide for about an hour. The X-platform account of the International Space Station showed that shortly after 9 p.m. Eastern Time on June 26, NASA instructed the crew on the space station to hide in their respective spacecraft for safety because NASA learned in the morning of the 26th that a satellite disintegrated near the space station. About an hour later, the crew was allowed to leave the spacecraft and the space station resumed normal operation. There are rumors on social platforms that the satellite hit six U.S. GPS satellites after the disintegration and damaged 20 Starlink satellites developed by Space Exploration Technologies Corporation (SpaceX) led by Musk, triggering speculation that the relevant satellites were deliberately disintegrated.

OpenAI's internal AI details stolen in 2023 breach, NYT reports
July 4 (Reuters) - A hacker gained access to the internal messaging systems at OpenAI last year and stole details about the design of the company's artificial intelligence technologies, the New York Times reported, opens new tab on Thursday. The hacker lifted details from discussions in an online forum where employees talked about OpenAI's latest technologies, the report said, citing two people familiar with the incident. However, they did not get into the systems where OpenAI, the firm behind chatbot sensation ChatGPT, houses and builds its AI, the report added. OpenAI executives informed both employees at an all-hands meeting in April last year and the company's board about the breach, according to the report, but executives decided not to share the news publicly as no information about customers or partners had been stolen. OpenAI executives did not consider the incident a national security threat, believing the hacker was a private individual with no known ties to a foreign government, the report said. The San Francisco-based company did not inform the federal law enforcement agencies about the breach, it added. OpenAI in May said it had disrupted five covert influence operations that sought to use its AI models for "deceptive activity" across the internet, the latest to stir safety concerns about the potential misuse of the technology. The Biden administration was poised to open up a new front in its effort to safeguard the U.S. AI technology from China and Russia with preliminary plans to place guardrails around the most advanced AI Models including ChatGPT, Reuters earlier reported, citing sources.