Tag: data leaks
-
Hacker News: Strengthening AI Agent Hijacking Evaluations
Source URL: https://www.nist.gov/news-events/news/2025/01/technical-blog-strengthening-ai-agent-hijacking-evaluations Source: Hacker News Title: Strengthening AI Agent Hijacking Evaluations Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines security risks related to AI agents, particularly focusing on “agent hijacking,” where malicious instructions can be injected into data handled by AI systems, leading to harmful actions. The U.S. AI Safety…
-
Hacker News: Gemma 3 Technical Report [pdf]
Source URL: https://storage.googleapis.com/deepmind-media/gemma/Gemma3Report.pdf Source: Hacker News Title: Gemma 3 Technical Report [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive technical report on Gemma 3, an advanced multimodal language model introduced by Google DeepMind. It highlights significant architectural improvements, including an increased context size, enhanced multilingual capabilities, and innovations…
-
The Register: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware
Source URL: https://www.theregister.com/2025/03/07/commoditization_ransomware/ Source: The Register Title: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware Feedly Summary: Which is why taking down chiefs and infra behind big name brand operations isn’t working Interview There’s a handful of cybercriminal gangs that Jason Baker, a ransomware negotiator with GuidePoint Security, regularly gets called in to respond…
-
CSA: AI Gone Wild: Why Shadow AI Is Your Worst Nightmare
Source URL: https://cloudsecurityalliance.org/blog/2025/03/04/ai-gone-wild-why-shadow-ai-is-your-it-team-s-worst-nightmare Source: CSA Title: AI Gone Wild: Why Shadow AI Is Your Worst Nightmare Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the emerging risks associated with “shadow AI,” where employees use unsanctioned AI tools without IT knowledge, leading to potential data breaches, compliance failures, and security vulnerabilities. It provides…
-
Slashdot: Thousands of Exposed GitHub Repositories, Now Private, Can Still Be Accessed Through Copilot
Source URL: https://yro.slashdot.org/story/25/02/27/2129241/thousands-of-exposed-github-repositories-now-private-can-still-be-accessed-through-copilot?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Thousands of Exposed GitHub Repositories, Now Private, Can Still Be Accessed Through Copilot Feedly Summary: AI Summary and Description: Yes Summary: This text highlights significant security concerns raised by researchers regarding potential data exposure through generative AI tools like Microsoft Copilot. It underscores the persistence of data that can…
-
Hacker News: Exposed GitHub repos, now private, can be accessed through Copilot
Source URL: https://techcrunch.com/2025/02/26/thousands-of-exposed-github-repos-now-private-can-still-be-accessed-through-copilot/ Source: Hacker News Title: Exposed GitHub repos, now private, can be accessed through Copilot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the risks associated with data exposure in generative AI systems, particularly focusing on Microsoft Copilot’s ability to access previously public data from GitHub repositories, even after…