Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)E
Posts
7
Comments
568
Joined
5 mo. ago

  • 100 years is a long time for a company to stay solvent. Especially a company that operates in a low diversity of markets.

  • Thank you for creating qrstuv deepfake content!

  • Where is the documentation for self-hosting it?

  • Yes, all of the mentioned repositories appear to be licensed under a variety of OSI approved licenses: Apache 2.0, MIT, BSD, GPL-2 so if anyone is still using it, they can still distribute their modifications.

  • Is Will Smith selling spaghetti again?

  • Nice reading comprehension.

  • YOU BLACK MOLD FROM J.K.R.'s DAMP WALLS!

    xD

  • and they’re been reared

    Was this article written by a Gen Z author?

  • Oh those are tabs! I thought it was just a "frequently used" list.

    Thanks!

  • I see this:

  • Interesting, thanks.

  • Denuvo is not anti-cheat, it's copy-protection.

  • It's conflicting because the commitment to no DRM and the preservation efforts for old games, keeping them running on modern systems, are tremendously valuable in the current consumer-hostile gaming landscape.

  • Must be a slow news day.

  • RMS

  • What was the story with the JCS video?

  • From the report that's the source of this Register article (emphasis added):

    The threat actor infiltrated the victim’s environments using valid test credentials stolen from public S3 buckets. These buckets contained Retrieval-Augmented Generation (RAG) data for AI models , and the compromised credentials belonged to an Identity and Access Management (IAM) user that had multiple read and write permissions on AWS Lambda and restricted permissions on AWS Bedrock. This user was likely intentionally created by the victim organization to automate Bedrock tasks with Lambda functions across the environment.

    It is also important to note that the affected S3 buckets were named using common AI tool naming conventions, which the attackers actively searched for during reconnaissance.

    https://www.sysdig.com/blog/ai-assisted-cloud-intrusion-achieves-admin-access-in-8-minutes