
OpenAI's internal AI details stolen in 2023 breach, NYT reports
July 4 (Reuters) - A hacker gained access to the internal messaging systems at OpenAI last year and stole details about the design of the company's artificial intelligence technologies, the New York Times reported, opens new tab on Thursday. The hacker lifted details from discussions in an online forum where employees talked about OpenAI's latest technologies, the report said, citing two people familiar with the incident. However, they did not get into the systems where OpenAI, the firm behind chatbot sensation ChatGPT, houses and builds its AI, the report added. OpenAI executives informed both employees at an all-hands meeting in April last year and the company's board about the breach, according to the report, but executives decided not to share the news publicly as no information about customers or partners had been stolen. OpenAI executives did not consider the incident a national security threat, believing the hacker was a private individual with no known ties to a foreign government, the report said. The San Francisco-based company did not inform the federal law enforcement agencies about the breach, it added. OpenAI in May said it had disrupted five covert influence operations that sought to use its AI models for "deceptive activity" across the internet, the latest to stir safety concerns about the potential misuse of the technology. The Biden administration was poised to open up a new front in its effort to safeguard the U.S. AI technology from China and Russia with preliminary plans to place guardrails around the most advanced AI Models including ChatGPT, Reuters earlier reported, citing sources.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.

Exclusive: India's Paytm gets government panel nod to invest in payments arm, sources say
NEW DELHI, July 9 (Reuters) - India's beleaguered Paytm (PAYT.NS), opens new tab has secured approval from a government panel that oversees investments linked to China to invest 500 million rupees ($6 million) in a key subsidiary, three sources with direct knowledge of the matter said. The approval, which still has to be vetted by the finance ministry, will remove the main stumbling block to the unit, Paytm Payment Services, resuming normal business operations. Paytm Payment Services is one of the biggest remaining parts of the fintech firm's business, accounting for a quarter of consolidated revenue in the financial year ended March 2023. A separate unit, Paytm Payments Bank, was wound down this year by order of the central bank due to persistent compliance issues, triggering a meltdown in Paytm's stock. The government panel had earlier held back approval due to concerns about the 9.88% stake in Paytm held by China's Ant Group. India has intensified scrutiny of Chinese businesses since a 2020 border clash between the two countries. All in all, Paytm has been waiting for the nod from the government panel for about two years and without it, it would have had to also wind down its payment services business, which was forbidden from taking on new customers in March 2023. Once the approval has been formalised, it will be able to seek a so-called "payment aggregator" licence from the Reserve Bank of India. The sources, two of whom are government sources, declined to be identified as the decision has not been formally announced. India's foreign, home, finance and industries ministries, whose representatives sit on the panel, did not reply to emails seeking comment. A Paytm spokesperson said the company does not comment on market speculation. "We will continue to make disclosures in compliance with our obligations under the SEBI Regulations, and will inform the exchanges when there is any new material information to share," the spokesperson said.

Avi Bruce appointed as head of IDF Central Command
On the evening of July 8, local time, the Israel Defense Forces issued a statement saying that Major General Avi Bluth replaced Yehuda Fox as the commander of the Israeli Central Command. Earlier that day, the Israeli army held a handover ceremony, which was presided over by the Israeli Chief of Staff Halevy. Avi Bluth joined the Israel Defense Forces in 1993 and commanded the Israeli military operations in the West Bank. In May this year, Bruce was promoted to major general and served as a military commander in the Israeli Central Command. CCTV reporters learned that in late April this year, Yehuda Fox, then commander of the Israeli Central Command, requested to resign and retire from the army in August this year. Fox had previously stated that he should bear part of the responsibility for the military intelligence failure on October 7 last year, and "must end his term like everyone else." According to the official website of the Israeli Defense Forces, the Central Command is one of the four major commands of the Israeli army, headquartered in Jerusalem, and its responsibility covers nearly one-third of Israel's territory.

Rotten eggs chemical detected on Jupiter-like alien planet
WASHINGTON, July 8 (Reuters) - The planet known as HD 189733b, discovered in 2005, already had a reputation as a rather extreme place, a scorching hot gas giant a bit larger than Jupiter that is a striking cobalt blue color and has molten glass rain that blows sideways in its fierce atmospheric winds. So how can you top that? Add hydrogen sulfide, the chemical compound behind the stench of rotten eggs. Researchers said on Monday new data from the James Webb Space Telescope is giving a fuller picture of HD 189733b, already among the most thoroughly studied exoplanets, as planets beyond our solar system are called. A trace amount of hydrogen sulfide was detected in its atmosphere, a first for any exoplanet. "Yes, the stinky smell would certainly add to its already infamous reputation. This is not a planet we humans want to visit, but a valuable target for furthering our understanding of planetary science," said astrophysicist Guangwei Fu of Johns Hopkins University in Baltimore, lead author of the study published in the journal Nature, opens new tab. It is a type called a "hot Jupiter" - gas giants similar to the largest planet in our solar system, only much hotter owing to their close proximity to their host stars. This planet orbits 170 times closer to its host star than Jupiter does to the sun. It completes one orbit every two days as opposed to the 12 years Jupiter takes for one orbit of the sun. In fact, its orbit is 13 times nearer to its host star than our innermost planet Mercury is to the sun, leaving the temperature on the side of the planet facing the star at about 1,700 degrees Fahrenheit (930 degrees Celsius). "They are quite rare," Fu said of hot Jupiters. "About less than one in 100 star systems have them." This planet is located 64 light-years from Earth, considered in our neighborhood within the Milky Way galaxy, in the constellation Vulpecula. A light-year is the distance light travels in a year, 5.9 trillion miles (9.5 trillion km). "The close distance makes it bright and easy for detailed studies. For example, the hydrogen sulfide detection reported here would be much more challenging to make on other faraway planets," Fu said. The star it orbits is smaller and cooler than the sun, and only about a third as luminous. That star is part of a binary system, meaning it is gravitationally bound to another star. Webb, which became operational in 2022, observes a wider wavelength range than earlier space telescopes, allowing for more thorough examinations of exoplanet atmospheres.