Tag: full

  • Slashdot: Hundreds of E-Commerce Sites Hacked In Supply-Chain Attack

    Source URL: https://it.slashdot.org/story/25/05/05/2034207/hundreds-of-e-commerce-sites-hacked-in-supply-chain-attack?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Hundreds of E-Commerce Sites Hacked In Supply-Chain Attack Feedly Summary: AI Summary and Description: Yes Summary: The text details a significant supply-chain attack affecting hundreds of e-commerce sites, including those of a large multinational company, that were compromised by malware capable of executing malicious code in browsers. This incident…

  • Simon Willison’s Weblog: Quoting Max Woolf

    Source URL: https://simonwillison.net/2025/May/5/max-woolf/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Max Woolf Feedly Summary: Two things can be true simultaneously: (a) LLM provider cost economics are too negative to return positive ROI to investors, and (b) LLMs are useful for solving problems that are meaningful and high impact, albeit not to the AGI hype that would…

  • Simon Willison’s Weblog: Feed a video to a vision LLM as a sequence of JPEG frames on the CLI (also LLM 0.25)

    Source URL: https://simonwillison.net/2025/May/5/llm-video-frames/#atom-everything Source: Simon Willison’s Weblog Title: Feed a video to a vision LLM as a sequence of JPEG frames on the CLI (also LLM 0.25) Feedly Summary: The new llm-video-frames plugin can turn a video file into a sequence of JPEG frames and feed them directly into a long context vision LLM such…

  • Anchore: SBOM Fundamentals: Anchore Learning Week (Day 1)

    Source URL: https://anchore.com/blog/sbom-fundamentals-anchore-learning-week-day-1/ Source: Anchore Title: SBOM Fundamentals: Anchore Learning Week (Day 1) Feedly Summary: This blog post is the first in our 5-day series exploring the world of SBOMs and their role in securing the foundational but often overlooked 3rd-party software supply chain. Whether you’re just beginning your SBOM journey or looking to refresh…

  • New York Times – Artificial Intelligence : A.I. Hallucinations Are Getting Worse, Even as New Systems Become More Powerful

    Source URL: https://www.nytimes.com/2025/05/05/technology/ai-hallucinations-chatgpt-google.html Source: New York Times – Artificial Intelligence Title: A.I. Hallucinations Are Getting Worse, Even as New Systems Become More Powerful Feedly Summary: A new wave of “reasoning” systems from companies like OpenAI is producing incorrect information more often. Even the companies don’t know why. AI Summary and Description: Yes Summary: The text…

  • Slashdot: Man Pleads Guilty To Stealing 1.1 Terabytes of Disney’s Slack Data

    Source URL: https://yro.slashdot.org/story/25/05/03/0126234/man-pleads-guilty-to-stealing-11-terabytes-of-disneys-slack-data Source: Slashdot Title: Man Pleads Guilty To Stealing 1.1 Terabytes of Disney’s Slack Data Feedly Summary: AI Summary and Description: Yes Summary: A 25-year-old man has admitted to hacking a Disney employee’s computer by using malware disguised as an AI art tool, leading to the theft of significant confidential data. This incident…

  • Simon Willison’s Weblog: Qwen3-8B

    Source URL: https://simonwillison.net/2025/May/2/qwen3-8b/#atom-everything Source: Simon Willison’s Weblog Title: Qwen3-8B Feedly Summary: Having tried a few of the Qwen 3 models now my favorite is a bit of a surprise to me: I’m really enjoying Qwen3-8B. I’ve been running prompts through the MLX 4bit quantized version, mlx-community/Qwen3-8B-4bit. I’m using llm-mlx like this: llm install llm-mlx llm…

  • Simon Willison’s Weblog: Expanding on what we missed with sycophancy

    Source URL: https://simonwillison.net/2025/May/2/what-we-missed-with-sycophancy/ Source: Simon Willison’s Weblog Title: Expanding on what we missed with sycophancy Feedly Summary: Expanding on what we missed with sycophancy I criticized OpenAI’s initial post about their recent ChatGPT sycophancy rollback as being “relatively thin" so I’m delighted that they have followed it with a much more in-depth explanation of what…

  • Cloud Blog: Palo Alto Networks’ journey to productionizing gen AI

    Source URL: https://cloud.google.com/blog/topics/partners/how-palo-alto-networks-builds-gen-ai-solutions/ Source: Cloud Blog Title: Palo Alto Networks’ journey to productionizing gen AI Feedly Summary: At Google Cloud, we empower businesses to accelerate their generative AI innovation cycle by providing a path from prototype to production. Palo Alto Networks, a global cybersecurity leader, partnered with Google Cloud to develop an innovative security posture…

  • Schneier on Security: NCSC Guidance on “Advanced Cryptography”

    Source URL: https://www.schneier.com/blog/archives/2025/05/ncsc-guidance-on-advanced-cryptography.html Source: Schneier on Security Title: NCSC Guidance on “Advanced Cryptography” Feedly Summary: The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided by traditional cryptography.” It includes things like homomorphic…