shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

261
active users

#whisper

0 posts0 participants0 posts today
Replied in thread

Just to clarify: I don't think #AI use is inherently bad for science.
#LLM‘s can help you reword, make text flow better, be more precise and write better, because – unfortunately – training data also includes lots of good scientific texts.
ASR systems like #whisper allow you to spend less time on word by word #transcription and more on what's between the lines.

But use for citing literature? Writing whole sections or papers? Review? Coding in qualitative research?!

That's an issue

#ESETresearch analyzed a campaign deployed by BladedFeline, an Iran-aligned threat actor with likely ties to #OilRig. We discovered the campaign, which targeted Kurdish and Iraqi government officials, in 2024. welivesecurity.com/en/eset-res
BladedFeline, a cyberespionage group active since at least 2017, develops malware for strategic access within the Kurdistan Regional Government and the government of Iraq. We discovered BladedFeline in 2023 after it targeted Kurdish officials with the #Shahmaran backdoor.
The systems compromised in the latest campaign contained the #Whisper backdoor, a malicious IIS module #PrimeCache, two reverse tunnels, and several supplementary tools. Whisper uses #MicrosoftExchange server to communicate with the attackers via email attachments.
We believe with medium confidence that BladedFeline is a subgroup of OilRig, an 🇮🇷-based APT group also known as APT34 or Hazel Sandstorm.
First, there were OilRig tools present in the systems compromised in this campaign. BladedFeline’s PrimeCache also shares code similarities with OilRig’s #RDAT backdoor. Moreover, as does OilRig, BladedFeline targets organizations in the Middle East.
IoCs will be available in our GitHub repo: github.com/eset/malware-ioc/tr

Evolution of Home Assistant:
- Runs on Raspberry Pi, controls a single WiFi light switch
- Controls a dozen switches and plugs
- Automations using Phone locations and time of day
- AddOns! Mosquitto, AdGuard Home and MotionEye/Frigate get installed
- Migrates to beefier server
- Voice and Whisper addons get installed
- Zigbee takes over for switches and plugs

- What's next?