Embedding human rights into crypto isn’t optional, it’s foundational

Opinion by: Shady El Damaty, co-founder of Human.Tech Beyond the hype of accelerationist and technophile circles, a quiet crisis of confidence is taking hold in emerging technologies. Crypto and decentralized identity solutions still carry enormous potential to empower individuals and distribute power — but many builders and users are sounding the alarm. Their disillusionment stems … Read more

ChatGPT, Other AI Models Can Be as Good as Human Lawyers; Perform Better in Bar Exam Score

Artificial intelligence can now outperform most law school graduates on the bar exam, the grueling two-day test aspiring attorneys must pass to practice law in the United States, according to a new study released Wednesday. GPT-4, the upgraded AI model released this week by Microsoft-backed OpenAI, scored 297 on the bar exam in an experiment … Read more

Lumma Stealer Malware Being Spread to Windows Devices via Fake Human Verification Pages, CloudSEK Says

Lumma Stealer, a recently identified information-stealing malware, is being distributed to users via fake human verification pages. According to researchers at the cybersecurity firm CloudSEK, the malware is targeting Windows devices and is designed to steal sensitive information from the infected device. Concerningly, researchers have discovered multiple phishing websites which are deploying these fake verification … Read more

DOJ’s $225M Seizure Puts Human Cost of Crypto Scams in Focus, Former Acting U.S. Attorney Says

The U.S. Department of Justice is sending a message with its recent effort to seize $225 million in crypto tied to pig butchering scams: these funds were stolen from victims. At least, that’s the takeaway from Phil Selden, a member at Cole Schotz PC and former acting US Attorney for the District of Maryland. The … Read more

The Role of Machine Learning in Cyber Threat Intelligence: Will It Replace Human Analysts?

In an era where cyber threats are increasingly sophisticated and relentless, traditional methods of threat detection and response often fall short. Enter machine learning (ML), a transformative technology that’s reshaping the landscape of cyber threat intelligence (CTI). While much has been said about ML’s role in cybersecurity, several unique and less-discussed applications of ML in … Read more