Tag: Fly

  • Cloud Blog: Simplify complex eventing at Scale with Eventarc Advanced

    Source URL: https://cloud.google.com/blog/products/application-modernization/eventarc-advanced-orchestrates-complex-microservices-environments/ Source: Cloud Blog Title: Simplify complex eventing at Scale with Eventarc Advanced Feedly Summary: Modern application development requires organizations to invest not only in scale but also in simplification and central governance. This means more than message routing; it requires a simple, unified messaging platform that can intelligently filter, transform, and govern…

  • Cloud Blog: Building next-gen visuals with Gemini 2.5 Flash Image on Vertex AI

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/gemini-2-5-flash-image-on-vertex-ai/ Source: Cloud Blog Title: Building next-gen visuals with Gemini 2.5 Flash Image on Vertex AI Feedly Summary: Today, we announced native image generation and editing in Gemini 2.5 Flash to deliver higher-quality images and more powerful creative control. Gemini 2.5 Flash Image is State of the Art (SOTA) for both generation and…

  • Simon Willison’s Weblog: Qwen3-4B-Thinking: "This is art – pelicans don’t ride bikes!"

    Source URL: https://simonwillison.net/2025/Aug/10/qwen3-4b/#atom-everything Source: Simon Willison’s Weblog Title: Qwen3-4B-Thinking: "This is art – pelicans don’t ride bikes!" Feedly Summary: I’ve fallen a few days behind keeping up with Qwen. They released two new 4B models last week: Qwen3-4B-Instruct-2507 and its thinking equivalent Qwen3-4B-Thinking-2507. These are relatively tiny models that punch way above their weight. I’ve…

  • Embrace The Red: Amp Code: Arbitrary Command Execution via Prompt Injection Fixed

    Source URL: https://embracethered.com/blog/posts/2025/amp-agents-that-modify-system-configuration-and-escape/ Source: Embrace The Red Title: Amp Code: Arbitrary Command Execution via Prompt Injection Fixed Feedly Summary: Sandbox-escape-style attacks can happen when an AI is able to modify its own configuration settings, such as by writing to configuration files. That was the case with Amp, an agentic coding tool built by Sourcegraph. The…

  • Embrace The Red: Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)

    Source URL: https://embracethered.com/blog/posts/2025/cursor-data-exfiltration-with-mermaid/ Source: Embrace The Red Title: Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132) Feedly Summary: Cursor is a popular AI code editor. In this post I want to share how I found an interesting data exfiltration issue, the demo exploits built and how it got fixed. When using Cursor I noticed that…