xAI silent after Grok sexualized images of kids; dril mocks Grok’s “apology”
xAI may be liable for Grok generating AI CSAM.
- Ars Technica - SecurityReal-time analysis of this week's Security news with AI sentiment analysis. Track emotional impact, happiness levels, chaos indicators and societal temperature of breaking Security stories. Page 22 of results.
xAI may be liable for Grok generating AI CSAM.
- Ars Technica - SecuritySubsea Cables Are This Century’s Hidden Battleground
- FA RSS - SecurityOfficials announced the suspect has been charged with attempting to provide 'material support' for 'terrorism'.
- Al Jazeera - SecurityGrok, the artificial intelligence tool created by Elon Musk, posted online about "lapses in safeguards" that led to the generation of lewd images involving chi
- CBS news - SecurityAn ongoing record of U.S. military strikes in the Caribbean and eastern Pacific since Sept. 2.
- Washington Post - SecurityTaiwan’s president pledges to defend sovereignty after China’s military drills
- ABC News World - SecurityThe European Space Agency has confirmed that it suffered a data breach after a threat actor claimed to have stolen and then offered for sale a large volume of i
- SiliconANGLE - SecurityGrok created sexually explicit images of minors in recent days that have been shared on social media platform X
- UK homepage - SecurityChina fired rockets, massed assault ships and flew bombers around Taiwan on Tuesday, simulating a military blockade in a warning to the United States against su
- NBC News World - SecurityThe manhunt is on for the thieves in Germany who police say are responsible for stealing money, jewelry and valuables from a bank on Monday. The heist was the w
- NBC News World - SecurityProspective customers could purchase weapons such as missiles, tanks and drones using crypto, according to a government website.
- CoinDesk: Bitcoin, Ethereum, Crypto News and Price Data - SecurityAchieving "Silicon Sovereignty" means more than just making batteries at home. It requires new battery technologies and the fast-charging benefits needed for na
- EE Times - SecurityThe drug is increasingly manufactured in and trafficked from the U.S.’s northern neighbor, though the numbers remain small compared with Mexico.
- WSJ World - SecurityThe alliance mounted its first coordinated response to a suspected sabotage campaign against critical infrastructure after another cable was severed in the Balt
- WSJ World - SecurityReport of a drone attack on a port facility signals new phase in US military campaign against Nicolás MaduroUS wargames played out scenarios for Maduro’s fal
- Quardian World - SecurityIn April 2025, Ronald Deibert left all electronic devices at home in Toronto and boarded a plane. When he landed in Illinois, he took a taxi to a mall and heade
- MIT Technology Review - SecurityEU law enforcement too dependent on digital infrastructure from US tech companies, Miguel De Bruycker says
- Companies - SecurityComments
- Hacker News - SecurityA transatlantic row between the UK and the Trump administration erupted after the UK attempted to force Apple to break its advanced encryption. That was just on
- TheServerSide.com - SecuritySome fake job applicants are attempting to gain access to an organization's internal systems. Learn how CHROs must work with other departments to guard against
- TheServerSide.com - SecurityAnalyzing sentiment data...