The new features could be handy for customer service systems, but OpenAI says they have applications that work across a variety of other fields, including education and creator platforms.
TechCrunchAI startup Pit is led by the co-founders of European scooter giant Voi and backed by a16z, which is leading the startup’s $16 million seed round.
TechCrunchElon Musk's legal effort to dismantle OpenAI may hinge on how its for-profit subsidiary enhances or detracts from the frontier lab's founding mission of ensuring that humanity benefits from artificial general intelligence.
TechCrunchEvery few centuries, changes in how information moves reshape how societies govern themselves. The printing press spread vernacular literacy, helping give rise to the Reformation and, eventually, representative government. The telegraph made it possible to administer vast nations like the US, accele
MIT Technology ReviewThis story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. Two of the most powerful people in AI—Sam Altman and Elon Musk—began their face-off in court in Oakland, California, last week. Musk is suing OpenAI, allegin
MIT Technology ReviewThe federal SECURE Data Act is not a serious consumer privacy bill, and its provisions—if enacted—would be a retreat from already insufficient state protections. Republicans on the House Energy and Commerce Committee released a draft of the bill late last month without bipartisan support. The bill i
EFFWilliam Binney, the NSA surveillance architect-turned-whistleblower, called it the "turnkey totalitarian state." Whoever sits in power gains access to a boundless surveillance empire that scorns privacy and crushes dissent. Politicians will come and go, but you can help us claw the tools of oppressi
EFFLa cinquième édition de la Journée de recherche sur la vie privée (Privacy Research Day) se tiendra le 24 juin 2026, dans le cadre du G7 des autorités de protection des données accueilli par la CNIL. Cet évènement international, reliant le monde académique aux acteurs de la régulation des données, s
CNILAcheter un logement, financer un achat… demander un crédit implique de partager de nombreuses données personnelles. Pour mieux vous protéger, la CNIL publie des recommandations pour les professionnels qui renforcent la transparence, encadrent les pratiques et facilitent l’exercice de vos droits.
CNILÀ l’issue d’une consultation publique, la CNIL publie ses recommandations sur l’évaluation de la solvabilité dans le cadre de l’octroi de crédit. Elle renforce transparence et contrôle, notamment des décisions automatisées, et accompagne les acteurs à mieux comprendre leurs obligations.
CNILDu 23 au 26 juin 2026, les autorités de protection des données des pays du G7 se réuniront à Paris sous la présidence de la CNIL. Cette rencontre annuelle vise à renforcer la coopération internationale et à promouvoir une protection élevée des données personnelles à l’ère des transformations numériq
CNILSelon une enquête du Groupe VYV et de la CNIL menée dans quatre pays européens, près de 9 jeunes sur 10 utilisent une IA conversationnelle en France et près d’un sur deux y évoque des sujets personnels, ces outils s’imposant comme des interlocuteurs en matière de santé mentale — non sans risques pou
CNILThe UC Berkeley Center for Long-Term Cybersecurity (CLTC) offers tools and support to schools, local governments, and non-profits as they defend themselves against a growing volume of cyberattacks.
Dark ReadingShortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there's been zero-day activity for at least a month.
Dark ReadingIvanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0
The Hacker NewsPalo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026. The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the User-ID Authentication
The Hacker NewsA dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted JavaScript code inside a secure sandbox by
The Hacker NewsPalo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3
The Hacker NewsA newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are distributed from the legitimate website of DAEMON Tools and are signed with digital certificates belonging t
The Hacker NewsA sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by Cisco Talos under the moniker UAT-8302, w
The Hacker NewsSan José, Costa Rica – mayo, 2026 – En un paso decisivo para consolidar su arquitectura de servicios en la región, Niubox Legal Digital celebró este jueves 16 de abril el lanzamiento oficial de sus operaciones en Costa Rica con un espacio de conversación acerca de inteligencia artificial y regulació
Estado DiarioJuan Pablo López* La decisión de Anthropic de restringir el acceso a uno de sus modelos más avanzados (Mythos) no solo evidencia el nivel de desarrollo alcanzado en inteligencia artificial, sino que instala una pregunta que rara vez se formula en el gobierno corporativo. ¿Cómo se ejerce el deber de
Estado Diario“Si la tecnología sin gobernanza es negligencia, la implementación de IA sin control fiduciario es una abdicación de funciones. Para los Directorios que aún intentan descifrar la ‘caja negra’, la respuesta no es la parálisis, sino la imposición de límites técnicos y legales infranqueables”. The post
IdealexEl tribunal confirmó que la elaboración de listados con sanciones disciplinarias constituye tratamiento de datos personales, cuya divulgación está prohibida cuando las sanciones se encuentran cumplidas o prescritas The post Corte de Santiago rechaza reclamo contra el Consejo para la Transparencia po
Diario ConstitucionalPor Lucas Chávez Grille* El pasado 29 de abril de 2026, la empresa de ciberseguridad Vecert Analyzer emitió una señal de alerta que, en un principio, pareció caer en el vacío. Se informaba que bases de datos con nombres, RUT, domicilios e historiales clínicos de ciudadanos chilenos circulaban en gru
Estado DiarioPor Juan Pablo González Gutiérrez* A meses de la entrada en vigencia de la Ley Nº 21.719 que reforma la Ley Nº 19.628 sobre protección de datos personales, varias organizaciones a nivel nacional han avanzando en el diseño de un Modelo de Prevención de Infracciones, en los términos indicados en los a
Estado Diario