Tag: harm

  • OpenAI : Working with US CAISI and UK AISI to build more secure AI systems

    Source URL: https://openai.com/index/us-caisi-uk-aisi-ai-safety Source: OpenAI Title: Working with US CAISI and UK AISI to build more secure AI systems Feedly Summary: OpenAI shares progress on the partnership with the US CAISI and UK AISI to strengthen AI safety and security. The collaboration is setting new standards for responsible frontier AI deployment through joint red-teaming, biosecurity…

  • Simon Willison’s Weblog: Comparing the memory implementations of Claude and ChatGPT

    Source URL: https://simonwillison.net/2025/Sep/12/claude-memory/#atom-everything Source: Simon Willison’s Weblog Title: Comparing the memory implementations of Claude and ChatGPT Feedly Summary: Claude Memory: A Different Philosophy Shlok Khemani has been doing excellent work reverse-engineering LLM systems and documenting his discoveries. Last week he wrote about ChatGPT memory. This week it’s Claude. Claude’s memory system has two fundamental characteristics.…

  • Docker: From Hallucinations to Prompt Injection: Securing AI Workflows at Runtime

    Source URL: https://www.docker.com/blog/secure-ai-agents-runtime-security/ Source: Docker Title: From Hallucinations to Prompt Injection: Securing AI Workflows at Runtime Feedly Summary: How developers are embedding runtime security to safely build with AI agents Introduction: When AI Workflows Become Attack Surfaces The AI tools we use today are powerful, but also unpredictable and exploitable. You prompt an LLM and…

  • Slashdot: Jaguar Land Rover Extends Shutdown After Cyber Attack

    Source URL: https://it.slashdot.org/story/25/09/08/2044243/jaguar-land-rover-extends-shutdown-after-cyber-attack Source: Slashdot Title: Jaguar Land Rover Extends Shutdown After Cyber Attack Feedly Summary: AI Summary and Description: Yes Summary: Jaguar Land Rover has faced a significant cyberattack that led to the shutdown of its factories both in the UK and internationally. This incident underscores the vulnerabilities that organizations, especially in manufacturing, face…

  • Cloud Blog: Tata Steel enhances equipment and operations monitoring with the Manufacturing Data Engine

    Source URL: https://cloud.google.com/blog/topics/manufacturing/tata-steel-enhances-equipment-and-operations-monitoring-with-google-cloud/ Source: Cloud Blog Title: Tata Steel enhances equipment and operations monitoring with the Manufacturing Data Engine Feedly Summary: Tata Steel is one of the world’s largest steel producers, with an annual crude steel capacity exceeding 35 millions tons. With such a large and global output, we needed a way to improve asset…

  • Schneier on Security: Indirect Prompt Injection Attacks Against LLM Assistants

    Source URL: https://www.schneier.com/blog/archives/2025/09/indirect-prompt-injection-attacks-against-llm-assistants.html Source: Schneier on Security Title: Indirect Prompt Injection Attacks Against LLM Assistants Feedly Summary: Really good research on practical attacks against LLM agents. “Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous” Abstract: The growing integration of LLMs into applications has introduced new security risks,…

  • Unit 42: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust

    Source URL: https://unit42.paloaltonetworks.com/model-namespace-reuse/ Source: Unit 42 Title: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust Feedly Summary: Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model…

  • The Register: Internet mapping and research tool Censys reveals state-based abuse, harassment

    Source URL: https://www.theregister.com/2025/09/03/censys_abuse_sigcomm_paper/ Source: The Register Title: Internet mapping and research tool Censys reveals state-based abuse, harassment Feedly Summary: ‘Universities are being used to proxy offensive government operations, turning research access decisions political’ Censys Inc, vendor of the popular Censys internet-mapping tool, has revealed that state-based actors are trying to abuse its services by hiding…