Tag: cross
-
Unit 42: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
Source URL: https://unit42.paloaltonetworks.com/model-namespace-reuse/ Source: Unit 42 Title: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust Feedly Summary: Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model…
-
The Register: Zscaler latest victim of Salesloft Drift attacks, customer data exposed
Source URL: https://www.theregister.com/2025/09/02/zscaler_customer_data_drift_compromise/ Source: The Register Title: Zscaler latest victim of Salesloft Drift attacks, customer data exposed Feedly Summary: Joins Google, Palo Alto Networks in the ever-growing supply chain compromise Zscaler is the latest company to disclose some of its customers’ data was exposed in the recent spate of Salesloft Drift attacks affecting Salesforce databases.……
-
The Register: Salesforce sacrifices 4,000 support jobs on the altar of AI
Source URL: https://www.theregister.com/2025/09/02/salesforce_4000_jobs_ai/ Source: The Register Title: Salesforce sacrifices 4,000 support jobs on the altar of AI Feedly Summary: Benioff boasts bots now handle half of customer chats as doubts over reliability linger Speaking ahead of Labor Day – celebrated in the US to recognize the nation’s labor movement – Salesforce CEO and co-founder Marc…
-
The Register: Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk
Source URL: https://www.theregister.com/2025/09/02/frostbyte10_copeland_controller_bugs/ Source: The Register Title: Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk Feedly Summary: Major flaws uncovered in Copeland controllers: Patch now Ten vulnerabilities in Copeland controllers, which are found in thousands of devices used by the world’s largest supermarket chains and cold storage companies, could have allowed…
-
NCSC Feed: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards
Source URL: https://www.ncsc.gov.uk/blog-post/from-bugs-to-bypasses-adapting-vulnerability-disclosure-for-ai-safeguards Source: NCSC Feed Title: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards Feedly Summary: Exploring how far cyber security approaches can help mitigate risks in generative AI systems AI Summary and Description: Yes Summary: The text addresses the intersection of cybersecurity strategies and generative AI systems, highlighting how established cybersecurity…
-
AWS News Blog: Now Open — AWS Asia Pacific (New Zealand) Region
Source URL: https://aws.amazon.com/blogs/aws/now-open-aws-asia-pacific-new-zealand-region/ Source: AWS News Blog Title: Now Open — AWS Asia Pacific (New Zealand) Region Feedly Summary: AWS has launched its first New Zealand Region with three Availability Zones, marking its 16th Region in Asia Pacific and enabling local data residency for New Zealand organizations. AI Summary and Description: Yes Summary: The text…
-
Embrace The Red: Wrap Up: The Month of AI Bugs
Source URL: https://embracethered.com/blog/posts/2025/wrapping-up-month-of-ai-bugs/ Source: Embrace The Red Title: Wrap Up: The Month of AI Bugs Feedly Summary: That’s it. The Month of AI Bugs is done. There won’t be a post tomorrow, because I will be at PAX West. Overview of Posts ChatGPT: Exfiltrating Your Chat History and Memories With Prompt Injection | Video ChatGPT…