Tag: HR

  • Slashdot: Amid Service Disruption, Colt Confirms ‘Criminal Group’ Accessed Their Data, As Ransomware Gang Threatens to Sell It

    Source URL: https://it.slashdot.org/story/25/08/23/0910226/amid-service-disruption-colt-confirms-criminal-group-accessed-their-data-as-ransomware-gang-threatens-to-sell-it?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Amid Service Disruption, Colt Confirms ‘Criminal Group’ Accessed Their Data, As Ransomware Gang Threatens to Sell It Feedly Summary: AI Summary and Description: Yes Summary: Colt Telecom has faced a significant cyber attack leading to prolonged service disruption and data theft. The incident highlights vulnerabilities in telecommunications infrastructure and…

  • Embrace The Red: Sneaking Invisible Instructions by Developers in Windsurf

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-sneaking-invisible-instructions-for-prompt-injection/ Source: Embrace The Red Title: Sneaking Invisible Instructions by Developers in Windsurf Feedly Summary: Imagine a malicious instruction hidden in plain sight, invisible to you but not to the AI. This is a vulnerability discovered in Windsurf Cascade, it follows invisible instructions. This means there can be instructions in a file or…

  • Slashdot: Arch Linux Faces ‘Ongoing’ DDoS Attack

    Source URL: https://linux.slashdot.org/story/25/08/23/0513229/arch-linux-faces-ongoing-ddos-attack?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Arch Linux Faces ‘Ongoing’ DDoS Attack Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a DDoS attack on the Arch Linux community, emphasizing the security challenges faced by volunteer-driven projects and their reliance on external hosting and infrastructure. It highlights the ongoing mitigation efforts by the…

  • The Register: Search-capable AI agents may cheat on benchmark tests

    Source URL: https://www.theregister.com/2025/08/23/searchcapable_ai_agents_may_cheat/ Source: The Register Title: Search-capable AI agents may cheat on benchmark tests Feedly Summary: Data contamination can make models seem more capable than they really are Researchers with Scale AI have found that search-based AI models may cheat on benchmark tests by fetching the answers directly from online sources rather than deriving…

  • Slashdot: Amid Service Disruption, Colt Telecom Confirms ‘Criminal Group’ Accessed Their Data, As Ransomware Gang Threatens to Sell It

    Source URL: https://it.slashdot.org/story/25/08/23/0910226/amid-service-disruption-colt-telecom-confirms-criminal-group-accessed-their-data-as-ransomware-gang-threatens-to-sell-it?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Amid Service Disruption, Colt Telecom Confirms ‘Criminal Group’ Accessed Their Data, As Ransomware Gang Threatens to Sell It Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant cyber attack on Colt Telecom that has led to prolonged service disruptions and the theft of customer documentation.…

  • Embrace The Red: Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-spaiware-exploit-persistent-prompt-injection/ Source: Embrace The Red Title: Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit) Feedly Summary: In this second post about Windsurf Cascade we are exploring the SpAIware attack, which allows memory persistent data exfiltration. SpAIware is an attack we first successfully demonstrated with ChatGPT last year and OpenAI mitigated. While inspecting the system prompt…

  • Slashdot: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code

    Source URL: https://it.slashdot.org/story/25/08/22/2059255/microsoft-reportedly-cuts-chinas-early-access-to-bug-disclosures-poc-exploit-code Source: Slashdot Title: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code Feedly Summary: AI Summary and Description: Yes Summary: Microsoft has modified its Microsoft Active Protections Program (MAPP) to restrict access to proof-of-concept exploit code for companies in certain countries, including China, to combat the leak of sensitive…

  • Simon Willison’s Weblog: DeepSeek 3.1

    Source URL: https://simonwillison.net/2025/Aug/22/deepseek-31/#atom-everything Source: Simon Willison’s Weblog Title: DeepSeek 3.1 Feedly Summary: DeepSeek 3.1 The latest model from DeepSeek, a 685B monster (like DeepSeek v3 before it) but this time it’s a hybrid reasoning model. DeepSeek claim: DeepSeek-V3.1-Think achieves comparable answer quality to DeepSeek-R1-0528, while responding more quickly. Drew Breunig points out that their benchmarks…

  • The Register: Short circuit: Electronics supplier to tech giants suffers ransomware shutdown

    Source URL: https://www.theregister.com/2025/08/22/data_io_ransomware_attack_temporarily/ Source: The Register Title: Short circuit: Electronics supplier to tech giants suffers ransomware shutdown Feedly Summary: Amazon, Apple, Google, and Microsoft among major customers Data I/O, a major electronics manufacturer whose customers include Amazon, Apple, Google, and Microsoft, notified federal regulators that it fell victim to a ransomware infection on August 16…

  • Slashdot: Apple Explores Using Google Gemini AI To Power Revamped Siri

    Source URL: https://apple.slashdot.org/story/25/08/22/1733230/apple-explores-using-google-gemini-ai-to-power-revamped-siri?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Apple Explores Using Google Gemini AI To Power Revamped Siri Feedly Summary: AI Summary and Description: Yes Summary: Apple is considering leveraging Google Gemini to enhance its Siri voice assistant, indicating a potential shift in its AI strategy towards outsourcing. This exploration comes as Apple seeks to catch up…