Security Leftovers
- 
            White House National Cyber Director requests feedback on open-source software securityLast week, the White House said it would launch a Defense Advanced Research Projects Agency competition focused on using artificial intelligence to fix bugs created, in particular, by open-source software. 
- 
            US Government Launches Cyber Contest to Harness AI for National SecurityThe White House launched a multimillion-dollar cyber contest to use artificial intelligence (AI) to detect and fix security vulnerabilities in the U.S. government's digital infrastructure in response to hackers' growing use of AI. 
- 
            Say Hello to Downfall, Another Data-Leaking Security Hole in Several Years of Intel Chips[BLACK HAT] Googlers have lately found not one but two more security vulnerabilities in Intel and AMD processors that can be exploited to steal sensitive data from a vulnerable computer's memory. 
- 
            The Inability to Simultaneously Verify Sentience, Location, and IdentityReally interesting “systematization of knowledge” paper: [...] 
- 
            UK electoral body breached through Microsoft Exchange Server: claimAn unpatched vulnerability in Microsoft Exchange Server appears to have been the entry point for the attackers who breached the systems of the UK Electoral Commission, a fact disclosed by the agency on Wednesday 10 months after it was spotted. 
- 
            Protecting Chrome Traffic with Hybrid Kyber KEMTeams across Google are working hard to prepare the web for the migration to quantum-resistant cryptography.