The April rankings of busiest startup investors were topped by well-established VCs such as Andreessen Horowitz and Khosla Ventures, tech giants like Google and Amazon, and a few names that don’t commonly show up in the lists.
An interactive map tracking data center construction and AI policy, built by Isabelle Reksopuro.
When Oregon resident Isabelle Reksopuro heard Google was gobbling up public land to fuel its data centers in her home state, she didn't initially know what to believe. "There's a lot of misinformation about data centers," she said. "Google has denied taking that land."
Technically, she explains, The Dalles, a city near the Washington state border, sought to reclaim that land, "and Google is just a big, unnamed power user." The city had in fact asked for ownership of a 150-acre portion of Mount Hood National Forest, claiming it needs access to Mount Hood's watershed to meet municipal needs as its population - 16,010 as of the 2020 census - …
Read the full story at The Verge.
The misuse of AI metrics at Amazon highlights the pitfalls of incentive structures, potentially skewing genuine AI adoption and innovation.
The post Amazon employees reportedly use MeshClaw to game AI usage leaderboards appeared first on Crypto Briefing.
The post OpenAI Faces Class Action Lawsuit Over ChatGPT Data Sharing With Meta and Google appeared on BitcoinEthereumNews.com.
A class action filed in California federal court accuses OpenAI of disclosing private ChatGPT user data to Meta and Google. The complaint says the company used embedded tracking technology without consumer consent. The lawsuit covers United States residents who entered queries on ChatGPT.com. It argues that OpenAI funneled personal questions and account details to two firms whose advertising networks reach billions of people each day. What The Complaint Alleges The filing centers on tracking technology that Meta and Google supply to website operators for analytics and ad targeting. According to the complaint, OpenAI embedded that code into its ChatGPT site and allowed it to transmit user information automatically. The plaintiffs say the disclosed data included query topics, account identifiers, and email addresses tied to individual users. The case argues that
Amazon's AI usage push highlights risks of metric-driven incentives, potentially skewing productivity and impacting decentralized AI networks.
The post Amazon employees automate tasks with MeshClaw amid AI usage pressure appeared first on Crypto Briefing.
Amazon has launched Alexa for Shopping, a personalised AI shopping assistant powered by Alexa+ that replaces its previous generative AI tool Rufus. Now available to US customers across mobile, desktop, and Echo Show displays, the assistant uses purchase history and browsing habits to deliver tailored product recommendations, comparison tools, price tracking, and automated recurring orders. […]
Insider Brief PRESS RELEASE — Exaforce, the pioneer in agentic security operations, has announced a $125 million Series B financing round, one of the largest ever in the emerging AI SOC space. The round includes participation from HarbourVest, Peak XV, Mayfield, Khosla Ventures, Seligman Ventures and AICONIC. The new capital will help Exaforce scale its AI-native security […]
The post Google warns of first known case of AI-assisted hacking appeared on BitcoinEthereumNews.com.
For years, the cybersecurity industry has warned that AI would eventually be weaponized by hackers. That theoretical future just became the present. Google’s threat intelligence team has identified what it describes as likely the first documented case of cybercriminals using a large language model to discover and exploit a zero-day vulnerability in the wild. The target: a flaw in a widely used open-source system administration tool that allowed attackers to bypass two-factor authentication. What happened The vulnerability was found in a Python script within a popular open-source login platform. Attackers identified a flaw that, when exploited, could circumvent the 2FA protections that millions of users and organizations rely on as a critical second layer of security. Here’s what makes this case different from every previous cyberattack. The exploit code itself appears to have been gene