Tag: defenses

  • The Register: Xi know what you did last summer: China was all up in Republicans’ email, says book

    Source URL: https://www.theregister.com/2025/02/25/china_hacked_gop_emails/ Source: The Register Title: Xi know what you did last summer: China was all up in Republicans’ email, says book Feedly Summary: Of course, Microsoft is in the mix, isn’t it Chinese spies reportedly broke into the US Republication National Committee’s Microsoft-powered email and snooped around for months before being caught.… AI…

  • The Register: MITRE Caldera security suite scores perfect 10 for insecurity

    Source URL: https://www.theregister.com/2025/02/25/10_bug_mitre_caldera/ Source: The Register Title: MITRE Caldera security suite scores perfect 10 for insecurity Feedly Summary: Is a trivial remote-code execution hole in every version part of the training, or? The smart cookie who discovered a perfect 10-out-of-10-severity remote code execution (RCE) bug in MITRE’s Caldera security training platform has urged users to…

  • Cisco Security Blog: AI Threat Intelligence Roundup: February 2025

    Source URL: https://blogs.cisco.com/security/ai-threat-intelligence-roundup-february-2025 Source: Cisco Security Blog Title: AI Threat Intelligence Roundup: February 2025 Feedly Summary: AI threat research is a fundamental part of Cisco’s approach to AI security. Our roundups highlight new findings from both original and third-party sources. AI Summary and Description: Yes Summary: The text emphasizes Cisco’s commitment to AI security through…

  • Unit 42: Auto-Color: An Emerging and Evasive Linux Backdoor

    Source URL: https://unit42.paloaltonetworks.com/?p=138356 Source: Unit 42 Title: Auto-Color: An Emerging and Evasive Linux Backdoor Feedly Summary: The new Linux malware named Auto-color uses advanced evasion tactics. Discovered by Unit 42, this article cover its installation, evasion features and more. The post Auto-Color: An Emerging and Evasive Linux Backdoor appeared first on Unit 42. AI Summary…

  • Simon Willison’s Weblog: Grok 3 is highly vulnerable to indirect prompt injection

    Source URL: https://simonwillison.net/2025/Feb/23/grok-3-indirect-prompt-injection/#atom-everything Source: Simon Willison’s Weblog Title: Grok 3 is highly vulnerable to indirect prompt injection Feedly Summary: Grok 3 is highly vulnerable to indirect prompt injection xAI’s new Grok 3 is so far exclusively deployed on Twitter (aka “X"), and apparently uses its ability to search for relevant tweets as part of every…

  • Hacker News: The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived

    Source URL: https://blog.trailofbits.com/2025/02/21/the-1.5b-bybit-hack-the-era-of-operational-security-failures-has-arrived/ Source: Hacker News Title: The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant operation security breach in the cryptocurrency domain, highlighting how sophisticated attackers, particularly North Korean state-sponsored threat actors, have shifted from exploiting vulnerabilities…

  • Unit 42: Investigating LLM Jailbreaking of Popular Generative AI Web Products

    Source URL: https://unit42.paloaltonetworks.com/jailbreaking-generative-ai-web-products/ Source: Unit 42 Title: Investigating LLM Jailbreaking of Popular Generative AI Web Products Feedly Summary: We discuss vulnerabilities in popular GenAI web products to LLM jailbreaks. Single-turn strategies remain effective, but multi-turn approaches show greater success. The post Investigating LLM Jailbreaking of Popular Generative AI Web Products appeared first on Unit 42.…

  • Schneier on Security: An LLM Trained to Create Backdoors in Code

    Source URL: https://www.schneier.com/blog/archives/2025/02/an-llm-trained-to-create-backdoors-in-code.html Source: Schneier on Security Title: An LLM Trained to Create Backdoors in Code Feedly Summary: Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes.” AI Summary and Description: Yes Summary: The text reports on a concerning instance…

  • The Register: Medusa ransomware gang demands $2M from UK private health services provider

    Source URL: https://www.theregister.com/2025/02/20/medusa_hcrg_ransomware/ Source: The Register Title: Medusa ransomware gang demands $2M from UK private health services provider Feedly Summary: 2.3 TB held to ransom as biz formerly known as Virgin Care tells us it’s probing IT ‘security incident’ Exclusive HCRG Care Group, a private health and social services provider, has seemingly fallen victim to…