Toggle light / dark theme

One of the most high-profile blockchain systems in traditional banking has added a new feature that lets companies shift cash automatically.

JPMorgan Chase & Co’s JPM Coin now allows clients to program their accounts by plugging in a set of key conditions, enabling them to move funds to cover overdue payments and margin calls. Further down the line, it may help them seize on differences in exchange rates.

Germany’s Siemens AG used the system this week, configuring its accounts to transfer money to fill potential shortfalls, Naveen Mallela, head of Coin Systems at JPMorgan’s blockchain division Onyx, said in an interview.

The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote shells on compromised devices.

BlueNorOff is a financially motivated hacking group known for attacking cryptocurrency exchanges and financial organizations such as venture capital firms and banks worldwide.

The malicious payload observed by Jamf malware analysts (labeled ProcessRequest) communicates with the swissborg[.]blog, an attacker-controlled domain registered on May 31 and hosted at 104.168.214[.]151 (an IP address part of BlueNorOff infrastructure).

The team’s research, including their code, data, and models, is now publicly available on GitHub. This open-source approach encourages the broader AI community to continue this line of exploration, potentially leading to further advancements in machine learning.

The advent of LeMa represents a major milestone in AI, suggesting that machines’ learning (ML) processes can be made more akin to human learning. This development could revolutionize sectors heavily reliant on AI, such as healthcare, finance, and autonomous vehicles, where error correction and continuous learning are critical.

As the AI field continues to evolve rapidly, the integration of human-like learning processes, such as learning from mistakes, appears to be an essential factor in developing more efficient and effective AI systems.

01. AI’s model outperforms Meta’s Llama 2 on certain metricsStartup to offer open-source model; proprietary options laterA Chinese startup founded by computer scientist Kai-Fu Lee has become a unicorn in less than eight months on the strength of a new open-source artificial-intelligence model that outstrips Silicon Valley’s best, on at least certain metrics.

The company, 01.AI, has reached a valuation of more than $1 billion after a funding round that included Alibaba Group Holding Ltd.’s cloud unit, Lee said in an interview. The chief executive officer of venture firm Sinovation Ventures will also be CEO of the new startup. He began assembling the team for 01.AI in March and started… More.


Bloomberg connects decision makers to a dynamic network of data, delivering business and financial information, news and insights globally.

CNBC’s Andrea Day joins Shep Smith to report on ‘robot nurses’ meant to give a hand to live nurses, who suffered under very difficult conditions during the pandemic. For access to live and exclusive video from CNBC subscribe to CNBC PRO: https://cnb.cx/2NGeIvi.

» Subscribe to CNBC TV: https://cnb.cx/SubscribeCNBCtelevision.
» Subscribe to CNBC: https://cnb.cx/SubscribeCNBC

Turn to CNBC TV for the latest stock market news and analysis. From market futures to live price updates CNBC is the leader in business news worldwide.

The News with Shepard Smith is CNBC’s daily news podcast providing deep, non-partisan coverage and perspective on the day’s most important stories. Available to listen by 8:30pm ET / 5:30pm PT daily beginning September 30: https://www.cnbc.com/2020/09/29/the-news-with-shepard-smith-…7Cpodcast.

A study by the Global Antibiotic Research & Development Partnership and Innoviva Specialty Therapeutics found a single dose of a first-in-class oral antibiotic called zoliflodacin was as safe and effective as standard therapy for uncomplicated urogenital gonorrhea. NIAID contributed financial and scientific support to the development of zoliflodacin and applauds its non-governmental and private sector partners on successfully conducting the study. Read the NIH statement on these results: https://go.nih.gov/Wquuct


A single dose of a novel oral antibiotic called zoliflodacin has been found to be as safe and effective as standard therapy for uncomplicated urogenital gonorrhea in an international Phase 3 non-inferiority clinical trial, according to the Global Antibiotic Research & Development Partnership (GARDP), the study sponsor. Gonorrhea treatment options are increasingly limited due to antimicrobial resistance seen in Neisseria gonorrhoeae, the bacteria that cause gonococcal infection.

Because of the imperative to expand the gonococcal therapeutic pipeline, the National Institute of Allergy and Infectious Diseases (NIAID), part of the National Institutes of Health, has contributed financial and scientific support to the development of zoliflodacin and applauds its non-governmental and private sector partners on successfully conducting the Phase 3 study. This research has generated important new evidence for a field in urgent need of alternative therapeutic options. Specifically, zoliflodacin may offer an alternative to current therapy for uncomplicated urogenital gonococcal infection.

“Decades-old antibiotics are becoming ineffective for treating Neisseria gonorrhoeae, which creates a huge global health burden. NIAID celebrates this exemplary public-private partnership for supporting science to improve the sexual health of people worldwide,” said NIAID Director Jeanne Marrazzo, M.D. “These encouraging results should bolster additional, intersectoral efforts to develop safe and effective therapeutic options for gonorrhea and other bacteria that exhibit antimicrobial resistance.”

Microsoft warns of Scattered Spider, a financially motivated hacking crew that infiltrates firms worldwide using SMS phishing, SIM swapping, and by posing as new employees, leading to data breaches and takeovers.

Find out more:


The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as a ploy to blend into normal on-hire processes and takeover accounts and breach organizations across the world.

Microsoft, which disclosed the activities of the financially motivated hacking crew, described the adversary as “one of the most dangerous financial criminal groups,” calling out its operational fluidity and its ability to incorporate SMS phishing, SIM swapping, and help desk fraud into its attack model.

🚨Executives in U.S. firms under attack.

A new EvilProxy phishing campaign is targeting top-level employees, including banking, insurance, real estate, and manufacturing sectors.

Learn how they operate:


A new phishing campaign is on the rise, targeting U.S. organizations. Cybercriminals use EvilProxy to hijack accounts.

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”