mrissa: (Default)
mrissa ([personal profile] mrissa) wrote2025-10-12 08:35 am
Entry tags:

Obstetrix, by Naomi Kritzer

 

Review copy provided by the publisher. Also the author is a good friend.

Thrillers and near-future SF are not the same beast. Naomi has written tons of the latter, but as far as I know this is her first foray into the former. And she nails it--the differences in pacing and focus are all spot-on for a thriller. The general plotline of this particular thriller is: an obstetrician under fire for having provided an abortion to a high-risk patient is kidnapped by a cult to handle their obstetrics (and general medical) needs. If you just went, "Ohhhhhh," this is the novella for you.

Some points of clarity: the cult is not a sensationalized one. It's a very straightforward right-wing Christian compound, not wild-eyed goat-chompers but the sort of people who firmly believe that they're doing the right thing while they treat each other horribly, the sort you can find in some remote corner of every state of the US. Without violating someone's privacy, I know someone who joined a cult like this, and Naomi gets the very drab homely terror of it quite right.

One of the things I love about Naomi's writing is that she never relies on Idiot Plot. You never have to say, "but why doesn't Liz just blah blah blah," because Liz does just blah blah blah--that is, she does try the things a sensible person might try, and there are reasons they don't work, or don't work instantly, or are considered but actually can't be tried for lack of some particular element of the plan. But Naomi's characters not only try things, they keep trying things. I love the doggedness of Liz and of several others who aren't even sure what they're reaching for, who have been in a terrible place to find it, but keep striving all the same.

james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-12 08:52 am

The Menace From Earth by Robert A. Heinlein



A diverse assortment of (mostly) non-Future History science fiction stories from Robert A. Heinlein.

The Menace From Earth by Robert A. Heinlein
billroper: (Default)
billroper ([personal profile] billroper) wrote2025-10-11 10:03 pm
Entry tags:

End of Season

The Cubs lost game five of the NLDS to the Brewers tonight, 3-1, up in Milwaukee, ending the Cubs season. Each team held serve in their home games, which is why you play for home field advantage. This time, it was to the advantage of the Brewers who had a tremendous second half to end up with the best record in the league.

The good news is that this means that the Dodgers will need to travel to Milwaukee to begin the best of seven NLCS. And if the Brewers hold serve...

Right now, I am rooting for a Brewers vs. Mariners World Series. Neither team has ever won the World Series, so that matchup would guarantee at least one new champion.

And that beats seeing the Yankees win. :)
james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-11 11:26 am
Entry tags:

New Policy

Asking politely has failed for 20 years. Therefore, comments with naked urls will be deleted, as they break Recent Comments. To post links, follow the advice below.

james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-11 08:51 am
Entry tags:

Books Received, October 4 to October 10



13 works new to me. Four fantasy, two horror, one non-fiction, one thriller, and five SF, of which at least three are series.

Books Received, October 4 to October 10


Poll #33712 Books Received, October 4 to October 10
Open to: Registered Users, detailed results viewable to: All, participants: 48


Which of these look interesting?

View Answers

The Seed of Destruction by Rick Campbell (July 2026)
2 (4.2%)

Uncivil Guard by Foster Chamberlin (November 2025)
7 (14.6%)

Crawlspace by Adam Christopher (March 2026)
5 (10.4%)

The Girl With a Thouand Faces by Sunyi Dean (May 2026)
13 (27.1%)

Your Behavior Will Be Monitored by Justin Feinstein (April 2026)
5 (10.4%)

Blood Bound by Ellis Hunter (April 2026)
0 (0.0%)

Sublimation by Isabel J. Kim (June 2026)
16 (33.3%)

Wolf Worm by T. Kingfisher (March 2026)
21 (43.8%)

Year’s Best Canadian Fantasy and Science Fiction: Volume Three edited by Stephen Kotowych (October 2025)
16 (33.3%)

Rabbit Test and Other Stories by Samantha Mills (April 2026)
14 (29.2%)

The Body by Bethany C. Morrow (February 2026)
4 (8.3%)

I’ll Watch Your Baby by Neena Viel (May 2026)
5 (10.4%)

Nowhere Burning by Catriona Ward (July 2026)
8 (16.7%)

Some other option
0 (0.0%)

Cats!
35 (72.9%)

billroper: (Default)
billroper ([personal profile] billroper) wrote2025-10-10 11:52 pm
Entry tags:

Bonus Baseball

I turned on the Tigers / Mariners game in the fifth inning, figuring it was about halfway through.

The game is now going to the 15th inning. Wow!
ladyjax: (Default)
ladyjax ([personal profile] ladyjax) wrote2025-10-10 06:47 pm
Entry tags:
james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-10 08:47 am

Roll For Initiative (The Last Session, volume 1) by Jasmine Walls & Dozerdraws



Old friends unite for one last adventure without fully understanding the implications of the group's latest recruit.

Roll For Initiative (The Last Session, volume 1) by Jasmine Walls & Dozerdraws
Schneier on Security ([syndicated profile] bruce_schneier_feed) wrote2025-10-10 11:06 am

Autonomous AI Hacking and the Future of Cybersecurity

Posted by Bruce Schneier

AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything.

Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge collectively found 54 new vulnerabilities in a target system, in four hours (of compute). Also in August, Google announced that its Big Sleep AI found dozens of new vulnerabilities in open-source projects.

It gets worse. In July Ukraine’s CERT discovered a piece of Russian malware that used an LLM to automate the cyberattack process, generating both system reconnaissance and data theft commands in real-time. In August, Anthropic reported that they disrupted a threat actor that used Claude, Anthropic’s AI model, to automate the entire cyberattack process. It was an impressive use of the AI, which performed network reconnaissance, penetrated networks, and harvested victims’ credentials. The AI was able to figure out which data to steal, how much money to extort out of the victims, and how to best write extortion emails.

Another hacker used Claude to create and market his own ransomware, complete with “advanced evasion capabilities, encryption, and anti-recovery mechanisms.” And in September, Checkpoint reported on hackers using HexStrike-AI to create autonomous agents that can scan, exploit, and persist inside target networks. Also in September, a research team showed how they can quickly and easily reproduce hundreds of vulnerabilities from public information. These tools are increasingly free for anyone to use. Villager, a recently released AI pentesting tool from Chinese company Cyberspike, uses the Deepseek model to completely automate attack chains.

This is all well beyond AIs capabilities in 2016, at DARPA’s Cyber Grand Challenge. The annual Chinese AI hacking challenge, Robot Hacking Games, might be on this level, but little is known outside of China.

Tipping point on the horizon

AI agents now rival and sometimes surpass even elite human hackers in sophistication. They automate operations at machine speed and global scale. The scope of their capabilities allows these AI agents to completely automate a criminal’s command to maximize profit, or structure advanced attacks to a government’s precise specifications, such as to avoid detection.

In this future, attack capabilities could accelerate beyond our individual and collective capability to handle. We have long taken it for granted that we have time to patch systems after vulnerabilities become known, or that withholding vulnerability details prevents attackers from exploiting them. This is no longer the case.

The cyberattack/cyberdefense balance has long skewed towards the attackers; these developments threaten to tip the scales completely. We’re potentially looking at a singularity event for cyber attackers. Key parts of the attack chain are becoming automated and integrated: persistence, obfuscation, command-and-control, and endpoint evasion. Vulnerability research could potentially be carried out during operations instead of months in advance.

The most skilled will likely retain an edge for now. But AI agents don’t have to be better at a human task in order to be useful. They just have to excel in one of four dimensions: speed, scale, scope, or sophistication. But there is every indication that they will eventually excel at all four. By reducing the skill, cost, and time required to find and exploit flaws, AI can turn rare expertise into commodity capabilities and gives average criminals an outsized advantage.

The AI-assisted evolution of cyberdefense

AI technologies can benefit defenders as well. We don’t know how the different technologies of cyber-offense and cyber-defense will be amenable to AI enhancement, but we can extrapolate a possible series of overlapping developments.

Phrase One: The Transformation of the Vulnerability Researcher. AI-based hacking benefits defenders as well as attackers. In this scenario, AI empowers defenders to do more. It simplifies capabilities, providing far more people the ability to perform previously complex tasks, and empowers researchers previously busy with these tasks to accelerate or move beyond them, freeing time to work on problems that require human creativity. History suggests a pattern. Reverse engineering was a laborious manual process until tools such as IDA Pro made the capability available to many. AI vulnerability discovery could follow a similar trajectory, evolving through scriptable interfaces, automated workflows, and automated research before reaching broad accessibility.

Phase Two: The Emergence of VulnOps. Between research breakthroughs and enterprise adoption, a new discipline might emerge: VulnOps. Large research teams are already building operational pipelines around their tooling. Their evolution could mirror how DevOps professionalized software delivery. In this scenario, specialized research tools become developer products. These products may emerge as a SaaS platform, or some internal operational framework, or something entirely different. Think of it as AI-assisted vulnerability research available to everyone, at scale, repeatable, and integrated into enterprise operations.

Phase Three: The Disruption of the Enterprise Software Model. If enterprises adopt AI-powered security the way they adopted continuous integration/continuous delivery (CI/CD), several paths open up. AI vulnerability discovery could become a built-in stage in delivery pipelines. We can envision a world where AI vulnerability discovery becomes an integral part of the software development process, where vulnerabilities are automatically patched even before reaching production—a shift we might call continuous discovery/continuous repair (CD/CR). Third-party risk management (TPRM) offers a natural adoption route, lower-risk vendor testing, integration into procurement and certification gates, and a proving ground before wider rollout.

Phase Four: The Self-Healing Network. If organizations can independently discover and patch vulnerabilities in running software, they will not have to wait for vendors to issue fixes. Building in-house research teams is costly, but AI agents could perform such discovery and generate patches for many kinds of code, including third-party and vendor products. Organizations may develop independent capabilities that create and deploy third-party patches on vendor timelines, extending the current trend of independent open-source patching. This would increase security, but having customers patch software without vendor approval raises questions about patch correctness, compatibility, liability, right-to-repair, and long-term vendor relationships.

These are all speculations. Maybe AI-enhanced cyberattacks won’t evolve the ways we fear. Maybe AI-enhanced cyberdefense will give us capabilities we can’t yet anticipate. What will surprise us most might not be the paths we can see, but the ones we can’t imagine yet.

This essay was written with Heather Adkins and Gadi Evron, and originally appeared in CSO.

billroper: (Default)
billroper ([personal profile] billroper) wrote2025-10-09 11:37 pm
Entry tags:

Cubs Win!

The Cubs won and have tied up the series with the Brewers. The Saturday game in Milwaukee will determine the winner.

This is better than I expected.
james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-09 08:50 am

The Cool War by Frederik Pohl



A hapless minister is drafted into international intrigue.

The Cool War by Frederik Pohl
oyceter: teruterubouzu default icon (Default)
Oyceter ([personal profile] oyceter) wrote2025-10-09 01:15 am

Update

Thank you to everyone for your kind thoughts, sharing experiences with international medical situations, and translation help! The hospital says CB can be discharged this weekend, yay! His facial paralysis has gotten a little worse in the past few days, though the doctors say this can happen. Right now we're trying to figure out how to get him home. Our travel insurance seemed like they might help, but now it sounds like nothing is covered, and the other private air ambulance service wants him to have a hospital bed ready back in California, but that is also proving difficult to get. From what the doctor said yesterday, he is probably okay to fly commercially but would need a medical escort, so we are figuring out how to get that arranged. Fingers crossed...
billroper: (Default)
billroper ([personal profile] billroper) wrote2025-10-08 10:33 pm
Entry tags:

Cubs Win!

The Cubs beat the Brewers tonight by a final of 4-3 so they survive for another day.

They scored four in the first, chasing the Brewers' starting pitcher, Quinn Priester, who had been quite good for them, but not tonight. The offense then pretty much went to sleep for the rest of the game, leaving the pitching staff to nurse what started as a 4-1 lead to the end of the game.

Remarkably, this trick worked.

Tomorrow's game is a night game, so I am hoping that the remote parking lot is open. :)
Cogito, Ergo Sumana ([syndicated profile] sumana_feed) wrote2025-10-08 09:11 pm

Candy Considerations

Posted by Sumana Harihareswara

This past weekend in New York City, the weather's oscillated in and out of crispness, sun and breeze cordially nudging each other out of the way. Talking with a newer volunteer at the outreach table …
mrissa: (Default)
mrissa ([personal profile] mrissa) wrote2025-10-08 01:20 pm

The better to trust you with, my dear

 New story! What a Big Heart You Have is out in Kaleidotrope. The more I thought about the Red Riding Hood story, the more I thought that the grandmother/granddaughter relationship was pretty sketched-in...and it's been one of the most important ones in my life. Hope you enjoy.
james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-08 02:15 pm
Entry tags:

Bundle of Holding: Mystery Flesh Pit



Welcome, visitor, to Mystery Flesh Pit National Park: The RPG, the Cypher System tabletop roleplaying game rulebook from Ganza Gaming about the Permian Basin Superorganism.

Bundle of Holding: Mystery Flesh Pit
Schneier on Security ([syndicated profile] bruce_schneier_feed) wrote2025-10-08 04:10 pm

Flok License Plate Surveillance

Posted by Bruce Schneier

The company Flok is surveilling us as we drive:

A retired veteran named Lee Schmidt wanted to know how often Norfolk, Virginia’s 176 Flock Safety automated license-plate-reader cameras were tracking him. The answer, according to a U.S. District Court lawsuit filed in September, was more than four times a day, or 526 times from mid-February to early July. No, there’s no warrant out for Schmidt’s arrest, nor is there a warrant for Schmidt’s co-plaintiff, Crystal Arrington, whom the system tagged 849 times in roughly the same period.

You might think this sounds like it violates the Fourth Amendment, which protects American citizens from unreasonable searches and seizures without probable cause. Well, so does the American Civil Liberties Union. Norfolk, Virginia Judge Jamilah LeCruise also agrees, and in 2024 she ruled that plate-reader data obtained without a search warrant couldn’t be used against a defendant in a robbery case.

james_davis_nicoll: (Default)
james_davis_nicoll ([personal profile] james_davis_nicoll) wrote2025-10-08 11:00 am