Robinson Cole LLP
High Contrast Mode
February 6, 2025 - R+C Newsletter

Data Privacy + Cybersecurity Insider

Share this page:

CYBERSECURITY

DeepSeek AI’s Security Woes + Impersonations: What You Need to Know

Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points to a distributed denial-of-service (DDoS) attack. Read More


ARTIFICIAL INTELLIGENCE

Nation State Backed Groups Using AI for Malicious Purposes

The Google Threat Intelligence Group (GTIG) recently published a new report “Adversarial Misuse of Generative AI,” which is well worth the read. The report shares findings on how government-backed threat actors use and misuse the Gemini web application. Although the GTIG is committed to countering threats across Google’s platforms, it is also committed to sharing findings “to raise awareness and enable stronger protections across the wider ecosystem.” This is an excellent mission. Read More

Colorado’s AI Task Force Proposes Updates to State’s AI Law

Stemming from Colorado’s Concerning Consumer Protections in Interactions with Artificial Intelligence Systems Act (the Act), which will impose obligations on developers and deployers of artificial intelligence (AI), the Colorado Artificial Intelligence Impact Task Force recently issued a report outlining potential areas where the Act can be “clarified, refined[,] and otherwise improved.” Read More

With Enough Human Contribution, AI-Generated Outputs May Be Copyright Protectable

After several months of delays, the U.S. Copyright Office has published part two of its three-part report on the copyright issues raised by artificial intelligence (AI). This part, entitled “Copyrightability,” focuses on whether AI-generated content is eligible for copyright protection in the U.S. Read More


PRIVACY TIP #430

GrubHub Confirms Security Incident Through Third-Party Vendor

GrubHub has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer names, email addresses, telephone numbers, and partial payment information for a subset of campus diners. Find out more in this week's Privacy Tip. Read More