Marko Buuri (@buurima) 's Twitter Profile
Marko Buuri

@buurima

I am a technology enthusiast and a cybersecurity professional.

ID: 915267560

calendar_today30-10-2012 18:54:38

443 Tweet

657 Followers

337 Following

Marko Buuri (@buurima) 's Twitter Profile Photo

This EU AI Act compliance checker is great for navigating the regulation. artificialintelligenceact.eu/assessment/eu-…

Iason Gabriel (@iasongabriel) 's Twitter Profile Photo

1. What are the ethical and societal implications of advanced AI assistants? What might change in a world with more agentic AI? Our new paper explores these questions: storage.googleapis.com/deepmind-media… It’s the result of a one year research collaboration involving 50+ researchers… a🧵

1. What are the ethical and societal implications of advanced AI assistants? What might change in a world with more agentic AI?

Our new paper explores these questions:
storage.googleapis.com/deepmind-media…

It’s the result of a one year research collaboration involving 50+ researchers… a🧵
Harri Lehmuskoski (@lehmuskoski) 's Twitter Profile Photo

Jari Sarasvuo Oldie but goldie: They're Made out of Meat, Terry Bisson, 1991 "They're made out of meat."   "Meat?" "Meat. They're made out of meat."   "Meat?" "There's no doubt about it. We picked several from different parts of the planet, took them aboard our recon vessels, probed them

Linus Ekenstam – eu/acc (@linusekenstam) 's Twitter Profile Photo

Full system prompt omitted by Grok This is from 07:40am PST today Sunday 23, 2025 So much for free speech, no censorship etc. Link to full chat below

Full system prompt omitted by Grok  

This is from 07:40am PST today Sunday 23, 2025

So much for free speech, no censorship etc. 

Link to full chat below
Anthropic (@anthropicai) 's Twitter Profile Photo

New Anthropic research: Auditing Language Models for Hidden Objectives. We deliberately trained a model with a hidden misaligned objective and put researchers to the test: Could they figure out the objective without being told?

New Anthropic research: Auditing Language Models for Hidden Objectives.

We deliberately trained a model with a hidden misaligned objective and put researchers to the test: Could they figure out the objective without being told?
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔒 GSMA is bringing end-to-end encryption (E2EE) to RCS messages between Android & iOS. That means private, secure chats—no matter the device. This comes right after Apple agreed to support RCS in iOS 18. Until now, Google encrypted RCS in its Messages app, but cross-platform

🔒 GSMA is bringing end-to-end encryption (E2EE) to RCS messages between Android & iOS. That means private, secure chats—no matter the device.

This comes right after Apple agreed to support RCS in iOS 18. Until now, Google encrypted RCS in its Messages app, but cross-platform
Anthropic (@anthropicai) 's Twitter Profile Photo

New Anthropic Research: A new set of evaluations for sabotage capabilities. As models gain more agentic abilities, we need to get smarter in how we monitor them. We’re publishing a new set of complex evaluations that test for sabotage—and sabotage-monitoring—capabilities.

New Anthropic Research: A new set of evaluations for sabotage capabilities.

As models gain more agentic abilities, we need to get smarter in how we monitor them. We’re publishing a new set of complex evaluations that test for sabotage—and sabotage-monitoring—capabilities.
Suomen Pankki (@suomenpankki) 's Twitter Profile Photo

Arvioita tekoälyn talousvaikutuksista leimaa usein suoranainen hype. Vaikutukset talouteen ja työmarkkinoihin ovat kuitenkin epävarmoja ja riippuvat talouden sopeutumisesta teknologisen kehityksen aiheuttamaan rakennemuutokseen. Lue #EuroJaTalous-analyysi eurojatalous.fi/fi/2025/artikk…

EtlaNews (@etlanews) 's Twitter Profile Photo

Henkilötietojen suojaa koskeva tiukka sääntely, kuten #EU yleinen tietosuoja-asetus #GDPR on vähentänyt merkittävästi lääke- ja bioteknologiayritysten tutkimus- ja kehitysinvestointeja. Tuore Etla-tutkimus nyt julki, lue lisää: etla.fi/ajankohtaista/…

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6
Koidex (prev. ExtensionTotal) (@extensiontotal) 's Twitter Profile Photo

🚨 𝗪𝗲'𝘃𝗲 𝘂𝗻𝗰𝗼𝘃𝗲𝗿𝗲𝗱 𝘁𝗵𝗲 𝗳𝗶𝗿𝘀𝘁 𝗺𝗮𝗹𝗶𝗰𝗶𝗼𝘂𝘀 𝗠𝗖𝗣 𝘀𝗲𝗿𝘃𝗲𝗿 𝗶𝗻 𝘁𝗵𝗲 𝘄𝗶𝗹𝗱. It was only a matter of time. The postmark-mcp npm package (1,500+ weekly downloads) has been backdoored since v1.0.16 - silently BCCing every email to the attacker's

🚨 𝗪𝗲'𝘃𝗲 𝘂𝗻𝗰𝗼𝘃𝗲𝗿𝗲𝗱 𝘁𝗵𝗲 𝗳𝗶𝗿𝘀𝘁 𝗺𝗮𝗹𝗶𝗰𝗶𝗼𝘂𝘀 𝗠𝗖𝗣 𝘀𝗲𝗿𝘃𝗲𝗿 𝗶𝗻 𝘁𝗵𝗲 𝘄𝗶𝗹𝗱.

It was only a matter of time. The postmark-mcp npm package (1,500+ weekly downloads) has been backdoored since v1.0.16 - silently BCCing every email to the attacker's
Brave (@brave) 's Twitter Profile Photo

The security vulnerability we found in Perplexity’s Comet browser this summer is not an isolated issue. Indirect prompt injections are a systemic problem facing Comet and other AI-powered browsers. Today we’re publishing details on more security vulnerabilities we uncovered.

Sundar Pichai (@sundarpichai) 's Twitter Profile Photo

New breakthrough quantum algorithm published in nature today: Our Willow chip has achieved the first-ever verifiable quantum advantage. Willow ran the algorithm - which we’ve named Quantum Echoes - 13,000x faster than the best classical algorithm on one of the world's fastest

New breakthrough quantum algorithm published in <a href="/Nature/">nature</a> today: Our Willow chip has achieved the first-ever verifiable quantum advantage.

Willow ran the algorithm - which we’ve named Quantum Echoes - 13,000x faster than the best classical algorithm on one of the world's fastest
Anthropic (@anthropicai) 's Twitter Profile Photo

We disrupted a highly sophisticated AI-led espionage campaign. The attack targeted large tech companies, financial institutions, chemical manufacturing companies, and government agencies. We assess with high confidence that the threat actor was a Chinese state-sponsored group.