Tag: ARM
-
The Register: Sainsbury’s eyes up shoplifters with live facial recognition
Source URL: https://www.theregister.com/2025/09/04/sainsburys_lfr/ Source: The Register Title: Sainsbury’s eyes up shoplifters with live facial recognition Feedly Summary: Privacy campaigners cry foul as grocer joins Asda, Iceland, and others in retail surveillance boom Sainsbury’s, Britain’s second-largest supermarket chain, has caught the attention of privacy campaigners by launching an eight-week trial of live facial recognition (LFR) tech…
-
The Register: Crims claim HexStrike AI penetration tool makes quick work of Citrix bugs
Source URL: https://www.theregister.com/2025/09/03/hexstrike_ai_citrix_exploits/ Source: The Register Title: Crims claim HexStrike AI penetration tool makes quick work of Citrix bugs Feedly Summary: LLMs and 0-days – what could possibly go wrong? Attackers on underground forums claimed they were using HexStrike AI, an open-source red-teaming tool, against Citrix NetScaler vulnerabilities within hours of disclosure, according to Check…
-
Slashdot: AI-Powered Drone Swarms Have Now Entered the Battlefield
Source URL: https://tech.slashdot.org/story/25/09/02/2139235/ai-powered-drone-swarms-have-now-entered-the-battlefield?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI-Powered Drone Swarms Have Now Entered the Battlefield Feedly Summary: AI Summary and Description: Yes Summary: The provided text highlights Ukraine’s innovative use of artificial intelligence in coordinating drone swarm attacks against Russian positions. This technology marks a significant advancement in military applications of AI and drone warfare, showcasing…
-
Unit 42: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
Source URL: https://unit42.paloaltonetworks.com/model-namespace-reuse/ Source: Unit 42 Title: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust Feedly Summary: Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model…
-
The Register: Internet mapping and research tool Censys reveals state-based abuse, harassment
Source URL: https://www.theregister.com/2025/09/03/censys_abuse_sigcomm_paper/ Source: The Register Title: Internet mapping and research tool Censys reveals state-based abuse, harassment Feedly Summary: ‘Universities are being used to proxy offensive government operations, turning research access decisions political’ Censys Inc, vendor of the popular Censys internet-mapping tool, has revealed that state-based actors are trying to abuse its services by hiding…
-
NCSC Feed: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards
Source URL: https://www.ncsc.gov.uk/blog-post/from-bugs-to-bypasses-adapting-vulnerability-disclosure-for-ai-safeguards Source: NCSC Feed Title: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards Feedly Summary: Exploring how far cyber security approaches can help mitigate risks in generative AI systems AI Summary and Description: Yes Summary: The text addresses the intersection of cybersecurity strategies and generative AI systems, highlighting how established cybersecurity…