Tag: based

  • Simon Willison’s Weblog: llm-sort

    Source URL: https://simonwillison.net/2025/Feb/11/llm-sort/ Source: Simon Willison’s Weblog Title: llm-sort Feedly Summary: llm-sort Delightful LLM plugin by Evangelos Lamprou which adds the ability to perform “semantic search" – allowing you to sort the contents of a file based on using a prompt against an LLM to determine sort order. Best illustrated by these examples from the…

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2025-21418 Microsoft Windows Ancillary Function Driver for…

  • The Register: AUKUS blasts holes in LockBit’s bulletproof hosting provider

    Source URL: https://www.theregister.com/2025/02/11/aukus_zservers_lockbit_sanctions/ Source: The Register Title: AUKUS blasts holes in LockBit’s bulletproof hosting provider Feedly Summary: UK foreign secretary says Putin is running a ‘corrupt mafia state’ One of the bulletproof hosting (BPH) providers used by the LockBit ransomware operation has been hit with sanctions in the US, UK, and Australia (AUKUS), along with…

  • Cloud Blog: Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure

    Source URL: https://cloud.google.com/blog/topics/systems/mitigating-power-and-thermal-fluctuations-in-ml-infrastructure/ Source: Cloud Blog Title: Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure Feedly Summary: The recent explosion of machine learning (ML) applications has created unprecedented demand for power delivery in the data center infrastructure that underpins those applications. Unlike server clusters in the traditional data center,…

  • The Register: I’m a security expert, and I almost fell for a North Korea-style deepfake job applicant …Twice

    Source URL: https://www.theregister.com/2025/02/11/it_worker_scam/ Source: The Register Title: I’m a security expert, and I almost fell for a North Korea-style deepfake job applicant …Twice Feedly Summary: Remote position, webcam not working, then glitchy AI face … Red alert! Twice, over the past two months, Dawid Moczadło has interviewed purported job seekers only to discover that these…

  • Hacker News: CAPTCHAs: ‘a tracking cookie farm for profit masquerading as a security service’

    Source URL: https://www.pcgamer.com/gaming-industry/a-2023-study-concluded-captchas-are-a-tracking-cookie-farm-for-profit-masquerading-as-a-security-service-that-made-us-spend-819-billion-hours-clicking-on-traffic-lights-to-generate-nearly-usd1-trillion-for-google/ Source: Hacker News Title: CAPTCHAs: ‘a tracking cookie farm for profit masquerading as a security service’ Feedly Summary: Comments AI Summary and Description: Yes Summary: The study from UC Irvine critically evaluates Google’s reCAPTCHA v2, highlighting its inefficacy in preventing bot traffic while raising significant privacy concerns. The findings indicate that reCAPTCHA…

  • Hacker News: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024)

    Source URL: https://www.xstore.co.za/stuff/2024/01/kaspersky-finds-hardware-backdoor-in-5-generations-of-apple-silicon/ Source: Hacker News Title: Kaspersky finds hardware backdoor in 5 generations of Apple Silicon (2024) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant security concern regarding a hardware backdoor found in Apple’s silicon. Identified as CVE-2023-38606, this vulnerability reportedly affects five generations of Apple mobile CPUs,…