
Porsche AG reports sharp fall in China deliveries
July 9 (Reuters) - German sportscar maker Porsche (P911_p.DE), opens new tab said on Tuesday that global vehicle deliveries were down 7% in the first half of the year compared to the same period in 2023, primarily driven by a 33% year-on-year drop in China. Porsche, majority-owned by Volkswagen (VOWG_p.DE), opens new tab, is highly exposed to the EU-China tariff tensions, with deliveries to China accounting for nearly 20% of global deliveries. An HSBC analyst pointed to weakness in the European car market, saying that "the market is, understandably, worried about China pricing weakness and the prospect of needing to pay dealer compensation." Overall, Porsche delivered 155,945 cars worldwide during the first six months of the year. In North America, deliveries were down 6% year-on-year. Meanwhile, in Porsche’s home market of Germany, deliveries increased by 22% to 20,811 vehicles.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.

Stanford AI project team apologizes for plagiarizing Chinese model
An artificial intelligence (AI) team at Stanford University apologized for plagiarizing a large language model (LLM) from a Chinese AI company, which became a trending topic on the Chinese social media platforms, where it sparked concern among netizens on Tuesday. We apologize to the authors of MiniCPM [the AI model developed by a Chinese company] for any inconvenience that we caused for not doing the full diligence to verify and peer review the novelty of this work, the multimodal AI model Llama3-V's developers wrote in a post on social platform X. The apology came after the team from Stanford University announced Llama3-V on May 29, claiming it had comparable performance to GPT4-V and other models with the capability to train for less than $500. According to media reports, the announcement published by one of the team members quickly received more than 300,000 views. However, some netizens from X found and listed evidence of how the Llama3-V project code was reformatted and similar to MiniCPM-Llama3-V 2.5, an LLM developed by a Chinese technology company, ModelBest, and Tsinghua University. Two team members, Aksh Garg and Siddharth Sharma, reposted a netizen's query and apologized on Monday, while claiming that their role was to promote the model on Medium and X (formerly Twitter), and that they had been unable to contact the member who wrote the code for the project. They looked at recent papers to validate the novelty of the work but had not been informed of or were aware of any of the work by Open Lab for Big Model Base, which was founded by the Natural Language Processing Lab at Tsinghua University and ModelBest, according to their responses. They noted that they have taken all references to Llama3-V down in respect to the original work. In response, Liu Zhiyuan, chief scientist at ModelBest, spoke out on the Chinese social media platform Zhihu, saying that the Llama3-V team failed to comply with open-source protocols for respecting and honoring the achievements of previous researchers, thus seriously undermining the cornerstone of open-source sharing. According to a screenshot leaked online, Li Dahai, CEO of ModelBest, also made a post on his WeChat moment, saying that the two models were verified to have highly similarity in terms of providing answers and even the same errors, and that some relevant data had not yet been released to the public. He said the team hopes that their work will receive more attention and recognition, but not in this way. He also called for an open, cooperative and trusting community environment. Director of the Stanford Artificial Intelligence Laboratory Christopher Manning also responded to Garg's explanation on Sunday, commenting "How not to own your mistakes!" on X. As the incident became a trending topic on Sina Weibo, Chinese netizens commented that academic research should be factual, but the incident also proves that the technology development in China is progressing. Global Times

Samsung Electronics wins cutting-edge AI chip order from Japan's Preferred Networks
SEOUL, July 9 (Reuters) - Samsung Electronics (005930.KS), opens new tab said on Tuesday it won an order from Japanese artificial intelligence company Preferred Networks to make chips for AI applications using the South Korean firm's 2-nanometre foundry process and advanced chip packaging service. It is the first order Samsung has revealed for its cutting-edge 2-nanometre chip contract manufacturing process. Samsung did not elaborate on the size of the order. The chips will be made using high-tech chip architecture known as gate all-around (GAA) and multiple chips will be integrated in one package to enhance inter-connection speed and reduce size, Samsung said in a statement. South Korea's Gaonchips Co (399720.KQ), opens new tab designed the chips, Samsung said. The chips will go toward Preferred Networks' high-performance computing hardware for generative AI technologies such as large language models, Junichiro Makino, Preferred Networks vice president and chief technology officer of computing architecture, said in the statement.

Workers warn of additional walkouts unless demands are met
Members of the National Samsung Electronics Union stage a rally near the company's Hwaseong Campus in Gyeonggi Province, Monday, beginning a three-day strike. Korea Times photo by Shim Hyun-chul By Nam Hyun-woo The biggest labor union at Samsung Electronics initiated a three-day strike on Monday, threatening to disrupt the company's chip manufacturing lines unless management agrees to a wage hike and higher incentives. This marks the first strike by unionized workers in the tech giant's 55-year history. The National Samsung Electronics Union (NSEU) claimed that about 4,000 unionized workers from Samsung's plants nationwide participated in a rally at the company's Hwaseong Campus in Gyeonggi Province. Police estimated that approximately 3,000 union members were present at the rally. According to its own survey, the union reported that a total of 6,540 members expressed their intention to participate in the strike. They emphasized that disruptions in manufacturing are anticipated, with over 5,000 members from facility, manufacturing, and development divisions joining the strike. The comments seem to address market expectations that the walkout is unlikely to cause significant disruptions in the chipmaker's operations, largely because most manufacturing lines are automated. The union said that it may launch another strike for an undetermined period, unless management responds to the union’s demand. Since January, the union has been pressing management for a higher wage increase rate for all members, fulfillment of promises regarding paid leave, and improvements to incentive criteria. With negotiations at an impasse, the union announced on May 29 that it would launch a strike. The NSEU has some 30,000 members, accounting for 24 percent of all Samsung employees. Among the union members, about 80 percent work at the device solutions division, which manufactures semiconductors.