Tag: AI systems

  • Embrace The Red: Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-spaiware-exploit-persistent-prompt-injection/ Source: Embrace The Red Title: Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit) Feedly Summary: In this second post about Windsurf Cascade we are exploring the SpAIware attack, which allows memory persistent data exfiltration. SpAIware is an attack we first successfully demonstrated with ChatGPT last year and OpenAI mitigated. While inspecting the system prompt…

  • Schneier on Security: AI Agents Need Data Integrity

    Source URL: https://www.schneier.com/blog/archives/2025/08/ai-agents-need-data-integrity.html Source: Schneier on Security Title: AI Agents Need Data Integrity Feedly Summary: Think of the Web as a digital territory with its own social contract. In 2014, Tim Berners-Lee called for a “Magna Carta for the Web” to restore the balance of power between individuals and institutions. This mirrors the original charter’s…

  • The Register: Anthropic scanning Claude chats for queries about DIY nukes for some reason

    Source URL: https://www.theregister.com/2025/08/21/anthropic_claude_nuclear_chat_detection/ Source: The Register Title: Anthropic scanning Claude chats for queries about DIY nukes for some reason Feedly Summary: Because savvy terrorists always use public internet services to plan their mischief, right? Anthropic says it has scanned an undisclosed portion of conversations with its Claude AI model to catch concerning inquiries about nuclear…

  • The Register: Honey, I shrunk the image and now I’m pwned

    Source URL: https://www.theregister.com/2025/08/21/google_gemini_image_scaling_attack/ Source: The Register Title: Honey, I shrunk the image and now I’m pwned Feedly Summary: Google’s Gemini-powered tools tripped up by image-scaling prompt injection Security researchers with Trail of Bits have found that Google Gemini CLI and other production AI systems can be deceived by image scaling attacks, a well-known adversarial challenge…

  • Cloud Blog: How startups can help build — and benefit from — the AI revolution

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/industry-leaders-on-whats-next-for-startups-and-ai/ Source: Cloud Blog Title: How startups can help build — and benefit from — the AI revolution Feedly Summary: Startups are at the forefront of generative AI development, pushing current capabilities and unlocking new potential. Building on our Future of AI: Perspectives for Startups 2025 report, several of the AI industry leaders…

  • Cloud Blog: How to build a real-time voice agent with Gemini, Google ADK, and A2A protocol

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/build-a-real-time-voice-agent-with-gemini-adk/ Source: Cloud Blog Title: How to build a real-time voice agent with Gemini, Google ADK, and A2A protocol Feedly Summary: Building advanced conversational AI has moved well beyond text. Now, we can use AI to create real-time, voice-driven agents. However, these systems need low-latency, two-way communication, real-time information retrieval, and the ability…

  • Simon Willison’s Weblog: Quoting Mustafa Suleyman

    Source URL: https://simonwillison.net/2025/Aug/21/mustafa-suleyman/ Source: Simon Willison’s Weblog Title: Quoting Mustafa Suleyman Feedly Summary: Simply put, my central worry is that many people will start to believe in the illusion of AIs as conscious entities so strongly that they’ll soon advocate for AI rights, model welfare and even AI citizenship. This development will be a dangerous…