Tag: injection

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2025-21418 Microsoft Windows Ancillary Function Driver for…

  • Embrace The Red: Hacking Gemini’s Memory with Prompt Injection and Delayed Tool Invocation

    Source URL: https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/ Source: Embrace The Red Title: Hacking Gemini’s Memory with Prompt Injection and Delayed Tool Invocation Feedly Summary: Imagine your AI rewriting your personal history… A while ago Google added memories to Gemini. Memories allow Gemini to store user-related data across sessions, storing information in long-term memory. The feature is only available to…

  • Slashdot: How To Make Any AMD Zen CPU Always Generate 4 As a Random Number

    Source URL: https://it.slashdot.org/story/25/02/09/2021244/how-to-make-any-amd-zen-cpu-always-generate-4-as-a-random-number?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How To Make Any AMD Zen CPU Always Generate 4 As a Random Number Feedly Summary: AI Summary and Description: Yes Summary: Google security researchers have identified a vulnerability in AMD’s security architecture, allowing them to inject unofficial microcode into processors, which can compromise the integrity of virtual environments…

  • Hacker News: Why LLMs still suck at OCR

    Source URL: https://www.runpulse.com/blog/why-llms-suck-at-ocr Source: Hacker News Title: Why LLMs still suck at OCR Feedly Summary: Comments AI Summary and Description: Yes Summary: The text explores the challenges faced when using Large Language Models (LLMs) for tasks like Optical Character Recognition (OCR) and complex data extraction, emphasizing their limitations in processing intricate document layouts and the…

  • Hacker News: TKey – Security for the New World

    Source URL: https://tillitis.se/products/tkey/ Source: Hacker News Title: TKey – Security for the New World Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes TKey, a flexible USB security token that emphasizes open source principles. TKey generates unique key material tied to specific applications, ensuring security by preventing unauthorized access even if the…

  • Microsoft Security Blog: Code injection attacks using publicly disclosed ASP.NET machine keys

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/ Source: Microsoft Security Blog Title: Code injection attacks using publicly disclosed ASP.NET machine keys Feedly Summary: Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and…

  • Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/06/cisa-adds-five-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added five vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability CVE-2022-23748 Dante Discovery Process Control Vulnerability CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability CVE-2020-29574 CyberoamOS…

  • Hacker News: Gemini 2.0 is now available to everyone

    Source URL: https://blog.google/technology/google-deepmind/gemini-model-updates-february-2025/ Source: Hacker News Title: Gemini 2.0 is now available to everyone Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines the launch and features of the Gemini 2.0 series of AI models by Google, highlighting advancements in performance, multimodal capabilities, and safety measures. It introduces several models tailored for…