The DeepSeek R1 update proves it’s an active threat to OpenAI and Google

The DeepSeek R1 update proves it’s an active threat to OpenAI and Google

This week, DeepSeek released an updated version of its R1 model on HuggingFace, reigniting the open-source versus closed-source competition. The updated version, called DeekSeek-R1-0528, has 685 billion parameters, an upgrade from January’s version, which had 671 billion.  Unlike OpenAI and Google’s models, which are famously closed-source, DeepSeek’s model weights are publicly available. According to the benchmarks,…

Read More
What is Security? | Definition from TechTarget

What is Security? | Definition from TechTarget

Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors. These threats can be external or internal and malicious…

Read More
BOND 2025 AI Trends Report Shows AI Ecosystem Growing Faster than Ever with Explosive User and Developer Adoption

BOND 2025 AI Trends Report Shows AI Ecosystem Growing Faster than Ever with Explosive User and Developer Adoption

BOND’s latest report on Trends – Artificial Intelligence (May 2025) presents a comprehensive data-driven snapshot of the current state and rapid evolution of AI technology. The report highlights some striking trends underscoring the unprecedented velocity of AI adoption, technological improvement, and market impact. This article reviews several key findings from the report and explores their…

Read More
Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

PALO ALTO, California, May 29th, 2025, CyberNewsWire Today, SquareX released new threat research on an advanced Browser-in-the-Middle (BitM) attack targeting Safari users. As highlighted by Mandiant, adversaries have been increasingly using BitM attacks to steal credentials and gain unauthorized access to enterprise SaaS apps. BitM attacks work by using a remote browser to trick victims…

Read More