Reading List
The most recent articles from a list of feeds I subscribe to.
Jack Black wants to join the Red Dead Redemption franchise
OpenAI, Supposedly Tightening Its Focus on Its Core Products, Buys Tech-Industry Talk Show TBPN
Katie Deighton, reporting for The Wall Street Journal (main link is a gift link; also on News+):
OpenAI bought TBPN to encourage constructive conversation around the changes AI creates by helping the show grow, according to a memo sent by Fidji Simo, the OpenAI’s CEO of applications. TBPN will report to Chris Lehane, OpenAI’s chief global affairs officer, and will help with company communications and marketing outside of the show.
“They’ve helped many brands market online and because they have a strong pulse on where the industry is going, their comms and marketing ideas have really impressed me,” Simo wrote in the memo.
But TBPN will remain editorially independent, retaining control over its programming, editorial decisions, guest selection and production schedule, OpenAI said.
Yes, I’m sure they’ll remain totally independent. You know, like The Washington Post under Jeff Bezos, and CBS News under David Ellison. Many news and commentary publications have remained steadfastly independent while reporting to the head of PR for a company they ostensibly cover.
Why Trump betrayed MAGA, according to Tucker Carlson
Where is Maurice's Black Market Vending Machine in Borderlands 4
Axios, Super Popular NPM Package, Was Compromised in Attack on the Module’s Maintainer
StepSecurity:
If you have installed axios@1.14.1 or axios@0.30.4, assume your system is compromised.
There are zero lines of malicious code inside
axiositself, and that’s exactly what makes this attack so dangerous. Both poisoned releases inject a fake dependency,plain-crypto-js@4.2.1, a package never imported anywhere in theaxiossource, whose sole purpose is to run apostinstallscript that deploys a cross-platform remote access trojan. The dropper contacts a live command-and-control server, delivers separate second-stage payloads for macOS, Windows, and Linux, then erases itself and replaces its ownpackage.jsonwith a clean decoy. A developer who inspects theirnode_modulesfolder after the fact will find no indication anything went wrong.This was not opportunistic. It was precision. The malicious dependency was staged 18 hours in advance. Three payloads were pre-built for three operating systems. Both release branches were poisoned within 39 minutes of each other. Every artifact was designed to self-destruct. Within two seconds of
npm install, the malware was already calling home to the attacker’s server before npm had even finished resolving dependencies. This is among the most operationally sophisticated supply chain attacks ever documented against a top-10 npm package.
Could be my bigotry against JavaScript speaking, but I find it unsurprising that this happened to the same framework that this and this happened to.