New tool protects open source AI from malware and code compromise

In the digital age, a new kind of Trojan horse has emerged in the form of AI models laced with malicious code. The AI community got a jolt from Protect AI’s revelation that a staggering 3,354 models on Hugging Face, a go-to AI model depot, contained potential malware or compromised code. Worse, it also appeared […]
Open-source code fuels rise in supply chain cyberattacks

Recent research highlights a concerning trend in cybersecurity: the increasing use of open-source code and legitimate hacking tools in software supply chain attacks. These attacks, once rare and complex, have become more popular among various malicious actors, from nation-state groups to lower-level cybercriminals. In 2023, there was a notable rise in the sharing of open-source […]
Biden Administration Wades Into Debate Around Open-Source AI

The Biden administration is tackling mounting controversy around open-source artificial intelligence and whether unfettered access risks enabling misuse or fuels innovation. It tasked the National Telecommunications and Information Administration (NTIA) with studying the issue and providing recommendations by next July. Most advanced AI models today are closely guarded by companies like OpenAI, Google, and Microsoft. […]
Mistral AI’s Mixtral 8x7B: Upstart new open source offering rivals or surpasses results of larger models

Mistral AI, a Paris-based startup, is shaking up the AI industry with its Mixtral 8x7B model, outperforming giants like ChatGPT and Llama with speed and efficiency. Mistral AI steps into the competitive field with Mixtral 8x7B, an open-source model leveraging Sparse Mixture of Experts architecture for efficient pre-training and scalability. The model and its “Mixture […]
EU’s Cyber Resilience Act threatens open source developers
The European Union’s (EU) Cyber Resilience Act (CRA), a piece of legislation that aims to improve cybersecurity across the bloc has been met with fierce opposition from the open source community, which fears that it will stifle innovation and make it more difficult to develop and maintain open source software. One of the main concerns […]
Legislation advances for open-source security infrastructure
The House Homeland Security Committee has advanced legislation aimed at protecting the federal government and vital infrastructure by securely accessing open-source software. It requires the Cybersecurity and Infrastructure Security Agency (CISA) to create a risk strategy that outlines how the federal government may rely on open-source code. The proposed legislation directs CISA to create a […]
Optimizing data centers with open-source software
Akash Network’s cloud computing marketplace is counting on its open-sourced, decentralized “super” cloud to provide data center operators with more server space. By offering unused compute cycles, data centers and anyone with a computer will be able to become cloud providers. According to Akash Network CEO Greg Osuri, running community-developed open-source software creates a competitive […]
Open-Source usage on the rise says Open-Source Initiative
According to Perforce Software and the Open-Source Initiative’s (OSI) annual State of Open-Source Report, there is an increase in open-source usage, but approximately 40% of teams using open source lack the internal skills to test, use, or integrate that software. The report details open-source software usage, adoption, and challenges based on anonymous survey responses from […]
Linux New Media Launches Open Source JobHub
Linux New Media USA has launched a new website for jobs in open-source technology called Open Source JobHub, which will help people find their place in the global open-source ecosystem. Linux New Media is an open-source publisher behind Linux Magazine and FOSSlife. Given that 92% of managers have difficulty finding enough talent, and many of […]
Kubernetes To Use Sigstore To Stop Supply Chain Attacks
Kubernetes will now add cryptographically signed signatures to protect users and organizations from supply chain attacks. Access to the cryptographically signed signatures is via the Sigstore project created by the Linux Foundation. Using sigstore certificates allows Kubernetes users to verify the authenticity and integrity of the distribution they are using. According to founding Sigstore developer […]