Tag: Col

  • Slashdot: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code

    Source URL: https://yro.slashdot.org/story/25/08/11/0037258/1m-stolen-in-industrial-scale-crypto-theft-using-ai-generated-code?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated cybercrime operation, GreedyBear, which utilizes a highly coordinated strategy, weaponizing browser extensions and phishing sites to facilitate industrial-scale crypto theft. The group’s innovative techniques, including the modification…

  • The Register: Trend Micro offers weak workaround for already-exploited critical vuln in management console

    Source URL: https://www.theregister.com/2025/08/10/infosec_in_brief/ Source: The Register Title: Trend Micro offers weak workaround for already-exploited critical vuln in management console Feedly Summary: PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform…

  • Slashdot: WSJ Finds ‘Dozens’ of Delusional Claims from AI Chats as Companies Scramble for a Fix

    Source URL: https://slashdot.org/story/25/08/10/2023212/wsj-finds-dozens-of-delusional-claims-from-ai-chats-as-companies-scramble-for-a-fix?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: WSJ Finds ‘Dozens’ of Delusional Claims from AI Chats as Companies Scramble for a Fix Feedly Summary: AI Summary and Description: Yes Summary: The Wall Street Journal has reported on concerning instances where ChatGPT and other AI chatbots have reinforced delusional beliefs, leading users to trust in fantastical narratives,…

  • Embrace The Red: OpenHands ZombAI Exploit: Prompt Injection To Remote Code Execution

    Source URL: https://embracethered.com/blog/posts/2025/openhands-remote-code-execution-zombai/ Source: Embrace The Red Title: OpenHands ZombAI Exploit: Prompt Injection To Remote Code Execution Feedly Summary: Today we have another post about OpenHands from All Hands AI. It is a popular agent, initially named “OpenDevin”, and recently the company also provides a cloud-based service. Which is all pretty cool and exciting. Prompt…

  • The Register: The inside story of the Telemessage saga, and how you can view the data

    Source URL: https://www.theregister.com/2025/08/10/telemessage_archive_online/ Source: The Register Title: The inside story of the Telemessage saga, and how you can view the data Feedly Summary: It turns out no one was clean on OPSEC DEF CON On Saturday at DEF CON, security boffin Micah Lee explained just how he hacked into TeleMessage, the supposedly secure messaging app…

  • Slashdot: Google Says Its AI-Based Bug Hunter Found 20 Security Vulnerabilities

    Source URL: https://it.slashdot.org/story/25/08/09/1947230/google-says-its-ai-based-bug-hunter-found-20-security-vulnerabilities Source: Slashdot Title: Google Says Its AI-Based Bug Hunter Found 20 Security Vulnerabilities Feedly Summary: AI Summary and Description: Yes Summary: Google’s Big Sleep, an LLM-based vulnerability researcher, reported 20 vulnerabilities in popular open-source software, marking a significant advancement in automated vulnerability discovery. This highlights the increasing efficacy of AI tools in…

  • Slashdot: Initiative Seeks AI Lab to Build ‘American Truly Open Models’ (ATOM)

    Source URL: https://news.slashdot.org/story/25/08/09/1916243/initiative-seeks-ai-lab-to-build-american-truly-open-models-atom?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Initiative Seeks AI Lab to Build ‘American Truly Open Models’ (ATOM) Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the launch of the ATOM Project, aimed at enhancing U.S. open-source AI competitiveness, highlighting a significant gap in open-source AI development in the country compared to China.…

  • Simon Willison’s Weblog: When a Jira Ticket Can Steal Your Secrets

    Source URL: https://simonwillison.net/2025/Aug/9/when-a-jira-ticket-can-steal-your-secrets/ Source: Simon Willison’s Weblog Title: When a Jira Ticket Can Steal Your Secrets Feedly Summary: When a Jira Ticket Can Steal Your Secrets Zenity Labs describe a classic lethal trifecta attack, this time against Cursor, MCP, Jira and Zendesk. They also have a short video demonstrating the issue. Zendesk support emails are…