Tag: command

  • The Register: Fortinet discloses critical bug with working exploit code amid surge in brute-force attempts

    Source URL: https://www.theregister.com/2025/08/13/fortinet_discloses_critical_bug/ Source: The Register Title: Fortinet discloses critical bug with working exploit code amid surge in brute-force attempts Feedly Summary: If there’s smoke? Fortinet warned customers about a critical FortiSIEM bug that could allow an unauthenticated attacker to execute unauthorized commands, and said working exploit code for the flaw has been found in…

  • Cisco Talos Blog: Malvertising campaign leads to PS1Bot, a multi-stage malware framework

    Source URL: https://blog.talosintelligence.com/ps1bot-malvertising-campaign/ Source: Cisco Talos Blog Title: Malvertising campaign leads to PS1Bot, a multi-stage malware framework Feedly Summary: Cisco Talos has observed an ongoing malware campaign that seeks to infect victims with a multi-stage malware framework, implemented in PowerShell and C#, which we are referring to as “PS1Bot.” AI Summary and Description: Yes **Summary:**…

  • Docker: Building AI agents made easy with Goose and Docker

    Source URL: https://www.docker.com/blog/building-ai-agents-with-goose-and-docker/ Source: Docker Title: Building AI agents made easy with Goose and Docker Feedly Summary: Building AI agents can be a complex task. But it also can be a fairly simple combination of answers to the following questions:  What is the AI backend that powers my intelligent fuzzy computation? What tools do you…

  • Simon Willison’s Weblog: LLM 0.27, the annotated release notes: GPT-5 and improved tool calling

    Source URL: https://simonwillison.net/2025/Aug/11/llm-027/ Source: Simon Willison’s Weblog Title: LLM 0.27, the annotated release notes: GPT-5 and improved tool calling Feedly Summary: I shipped LLM 0.27 today, adding support for the new GPT-5 family of models from OpenAI plus a flurry of improvements to the tool calling features introduced in LLM 0.26. Here are the annotated…

  • Cloud Blog: Run OpenAI’s new gpt-oss model at scale with Google Kubernetes Engine

    Source URL: https://cloud.google.com/blog/products/containers-kubernetes/run-openais-new-gpt-oss-model-at-scale-with-gke/ Source: Cloud Blog Title: Run OpenAI’s new gpt-oss model at scale with Google Kubernetes Engine Feedly Summary: It’s exciting to see OpenAI contribute to the open ecosystem with the release of their new open weights model, gpt-oss. In keeping with our commitment to provide the best platform for open AI innovation, we’re…

  • Embrace The Red: Claude Code: Data Exfiltration with DNS Requests

    Source URL: https://embracethered.com/blog/posts/2025/claude-code-exfiltration-via-dns-requests/ Source: Embrace The Red Title: Claude Code: Data Exfiltration with DNS Requests Feedly Summary: Today we cover Claude Code and a high severity vulnerability that Anthropic fixed in early June. The vulnerability allowed an attacker to hijack Claude Code via indirect prompt injection and leak sensitive information from the developer’s machine, e.g.…

  • Simon Willison’s Weblog: Chromium Docs: The Rule Of 2

    Source URL: https://simonwillison.net/2025/Aug/11/the-rule-of-2/ Source: Simon Willison’s Weblog Title: Chromium Docs: The Rule Of 2 Feedly Summary: Chromium Docs: The Rule Of 2 Alex Russell pointed me to this principle in the Chromium security documentation as similar to my description of the lethal trifecta. First added in 2019, the Chromium guideline states: When you write code…

  • Slashdot: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code

    Source URL: https://yro.slashdot.org/story/25/08/11/0037258/1m-stolen-in-industrial-scale-crypto-theft-using-ai-generated-code?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated cybercrime operation, GreedyBear, which utilizes a highly coordinated strategy, weaponizing browser extensions and phishing sites to facilitate industrial-scale crypto theft. The group’s innovative techniques, including the modification…