Tag: attack

  • Hacker News: Sol-Ark manufacturer reportedly disables all Deye inverters in the US

    Source URL: https://solarboi.com/2024/11/17/sol-ark-oem-disables-all-deye-inverters-in-the-us/ Source: Hacker News Title: Sol-Ark manufacturer reportedly disables all Deye inverters in the US Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details a situation involving Deye-branded inverters being remotely disabled across the US, leading to significant implications for consumers and broader concerns about the security of internet-connected solar…

  • Simon Willison’s Weblog: 0xfreysa/agent

    Source URL: https://simonwillison.net/2024/Nov/29/0xfreysaagent/#atom-everything Source: Simon Willison’s Weblog Title: 0xfreysa/agent Feedly Summary: 0xfreysa/agent Freysa describes itself as “the world’s first adversarial agent game". On 22nd November they released an LLM-driven application which people could pay to message (using Ethereum), with access to tools that could transfer a prize pool to the message sender, ending the game.…

  • Simon Willison’s Weblog: GitHub OAuth for a static site using Cloudflare Workers

    Source URL: https://simonwillison.net/2024/Nov/29/github-oauth-cloudflare/ Source: Simon Willison’s Weblog Title: GitHub OAuth for a static site using Cloudflare Workers Feedly Summary: GitHub OAuth for a static site using Cloudflare Workers Here’s a TIL covering a Thanksgiving AI-assisted programming project. I wanted to add OAuth against GitHub to some of the projects on my tools.simonwillison.net site in order…

  • The Register: Zabbix urges upgrades after critical SQL injection bug disclosure

    Source URL: https://www.theregister.com/2024/11/29/zabbix_urges_upgrades_after_critical/ Source: The Register Title: Zabbix urges upgrades after critical SQL injection bug disclosure Feedly Summary: US agencies blasted ‘unforgivable’ SQLi flaws earlier this year Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.… AI Summary and Description: Yes…

  • Data and computer security | The Guardian: Alder Hey children’s hospital explores ‘data breach’ after ransomware claims

    Source URL: https://www.theguardian.com/technology/2024/nov/29/alder-hey-childrens-hospital-explores-data-breach-after-ransomware-claims Source: Data and computer security | The Guardian Title: Alder Hey children’s hospital explores ‘data breach’ after ransomware claims Feedly Summary: Screenshots purporting to be from systems of Liverpool NHS health facility have been posted onlineA ransomware gang claims to have stolen data from the Alder Hey children’s hospital in Liverpool, allegedly…

  • Simon Willison’s Weblog: LLM Flowbreaking

    Source URL: https://simonwillison.net/2024/Nov/29/llm-flowbreaking/#atom-everything Source: Simon Willison’s Weblog Title: LLM Flowbreaking Feedly Summary: LLM Flowbreaking Gadi Evron from Knostic: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on the growing list of LLM attack types. Flowbreaking is less about whether prompt or response guardrails can be bypassed, and more about…

  • The Register: Ransom gang claims attack on NHS Alder Hey Children’s Hospital

    Source URL: https://www.theregister.com/2024/11/29/inc_ransom_alder_hey_childrens_hospital/ Source: The Register Title: Ransom gang claims attack on NHS Alder Hey Children’s Hospital Feedly Summary: Second alleged intrusion on English NHS org systems this week Yet another of the UK’s National Health Service (NHS) systems appears to be under attack, with a ransomware gang threatening to leak stolen data it says…

  • Schneier on Security: Race Condition Attacks against LLMs

    Source URL: https://www.schneier.com/blog/archives/2024/11/race-condition-attacks-against-llms.html Source: Schneier on Security Title: Race Condition Attacks against LLMs Feedly Summary: These are two attacks against the system components surrounding LLMs: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on the growing list of LLM attack types. Flowbreaking is less about whether prompt or response…

  • Hacker News: Bootkitty: Analyzing the first UEFI bootkit for Linux

    Source URL: https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/ Source: Hacker News Title: Bootkitty: Analyzing the first UEFI bootkit for Linux Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the emergence of “Bootkitty,” the first UEFI bootkit targeting Linux systems, highlighting its implications for security professionals in AI, cloud, and infrastructure. This new threat reflects an evolving…