Tag: least
-
The Cloudflare Blog: Connect and secure any private or public app by hostname, not IP — free for everyone in Cloudflare One
Source URL: https://blog.cloudflare.com/tunnel-hostname-routing/ Source: The Cloudflare Blog Title: Connect and secure any private or public app by hostname, not IP — free for everyone in Cloudflare One Feedly Summary: Tired of IP Lists? Securely connect private networks to any app by its hostname, not its IP address. This routing is now built into Cloudflare Tunnel…
-
Simon Willison’s Weblog: I think "agent" may finally have a widely enough agreed upon definition to be useful jargon now
Source URL: https://simonwillison.net/2025/Sep/18/agents/ Source: Simon Willison’s Weblog Title: I think "agent" may finally have a widely enough agreed upon definition to be useful jargon now Feedly Summary: I’ve noticed something interesting over the past few weeks: I’ve started using the term “agent" in conversations where I don’t feel the need to then define it, roll…
-
Krebs on Security: Self-Replicating Worm Hits 180+ Software Packages
Source URL: https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/ Source: Krebs on Security Title: Self-Replicating Worm Hits 180+ Software Packages Feedly Summary: At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages…
-
Bulletins: Vulnerability Summary for the Week of September 8, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-258 Source: Bulletins Title: Vulnerability Summary for the Week of September 8, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Adobe–Acrobat Reader Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the…
-
New York Times – Artificial Intelligence : What Exactly Are A.I. Companies Trying to Build? Here’s a Guide.
Source URL: https://www.nytimes.com/2025/09/16/technology/what-exactly-are-ai-companies-trying-to-build-heres-a-guide.html Source: New York Times – Artificial Intelligence Title: What Exactly Are A.I. Companies Trying to Build? Here’s a Guide. Feedly Summary: Amazon, Microsoft, Google, Meta and OpenAI plan to spend at least $325 billion by the end of the year in pursuit of A.I. We explain why they’re doing it. AI Summary…
-
The Register: Careless engineer stored recovery codes in plaintext, got whole org pwned
Source URL: https://www.theregister.com/2025/09/15/ransomware_recovery_codes_plaintext/ Source: The Register Title: Careless engineer stored recovery codes in plaintext, got whole org pwned Feedly Summary: Cautionary tale from the recent SonicWall attacks Failing to encrypt sensitive data leaves you wide open to attack. During the recent SonicWall attack spree, intruders bypassed multi-factor authentication (MFA) in at least one case, because…
-
Simon Willison’s Weblog: GPT‑5-Codex and upgrades to Codex
Source URL: https://simonwillison.net/2025/Sep/15/gpt-5-codex/#atom-everything Source: Simon Willison’s Weblog Title: GPT‑5-Codex and upgrades to Codex Feedly Summary: GPT‑5-Codex and upgrades to Codex OpenAI half-released a new model today: GPT‑5-Codex, a fine-tuned GPT-5 variant explicitly designed for their various AI-assisted programming tools. I say half-released because it’s not yet available via their API, but they “plan to make…
-
Cloud Blog: Prove your expertise with our Professional Security Operations Engineer certification
Source URL: https://cloud.google.com/blog/products/identity-security/prove-your-expertise-with-our-new-secops-engineer-certification/ Source: Cloud Blog Title: Prove your expertise with our Professional Security Operations Engineer certification Feedly Summary: Security leaders are clear about their priorities: After AI, cloud security is the top training topic for decision-makers. As threats against cloud workloads become more sophisticated, organizations are looking for highly-skilled professionals to help defend against…
-
Cloud Blog: Accelerate data science with new Dataproc multi-tenant clusters
Source URL: https://cloud.google.com/blog/products/data-analytics/announcing-dataproc-multi-tenant-clusters/ Source: Cloud Blog Title: Accelerate data science with new Dataproc multi-tenant clusters Feedly Summary: With the rapid growth of AI/ML, data science teams need a better notebook experience to meet the growing demand for and importance of their work to drive innovation. Additionally, scaling data science workloads also creates new challenges for…
-
Simon Willison’s Weblog: Recreating the Apollo AI adoption rate chart with GPT-5, Python and Pyodide
Source URL: https://simonwillison.net/2025/Sep/9/apollo-ai-adoption/#atom-everything Source: Simon Willison’s Weblog Title: Recreating the Apollo AI adoption rate chart with GPT-5, Python and Pyodide Feedly Summary: Apollo Global Management’s “Chief Economist" Dr. Torsten Sløk released this interesting chart which appears to show a slowdown in AI adoption rates among large (>250 empoloyees) companies: Here’s the full description that accompanied…