Tag: made

  • Slashdot: Police Department Apologizes for Sharing AI-Doctored Evidence Photo on Social Media

    Source URL: https://yro.slashdot.org/story/25/07/06/0252201/police-department-apologizes-for-sharing-ai-doctored-evidence-photo-on-social-media?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Police Department Apologizes for Sharing AI-Doctored Evidence Photo on Social Media Feedly Summary: AI Summary and Description: Yes Summary: A police department in Maine admitted to inadvertently sharing an AI-altered photo of drug evidence on social media, resulting in public scrutiny over the integrity of evidence presentation. This incident…

  • Simon Willison’s Weblog: Frequently Asked Questions (And Answers) About AI Evals

    Source URL: https://simonwillison.net/2025/Jul/3/faqs-about-ai-evals/#atom-everything Source: Simon Willison’s Weblog Title: Frequently Asked Questions (And Answers) About AI Evals Feedly Summary: Frequently Asked Questions (And Answers) About AI Evals Hamel Husain and Shreya Shankar have been running a paid, cohort-based course on AI Evals For Engineers & PMs over the past few months. Here Hamel collects answers to…

  • Simon Willison’s Weblog: Sandboxed tools in a loop

    Source URL: https://simonwillison.net/2025/Jul/3/sandboxed-tools-in-a-loop/#atom-everything Source: Simon Willison’s Weblog Title: Sandboxed tools in a loop Feedly Summary: Something I’ve realized about LLM tool use is that it means that if you can reduce a problem to something that can be solved by an LLM in a sandbox using tools in a loop, you can brute force that…

  • CSA: MFA Made Easy: 8 Best Practices for Authentication

    Source URL: https://cloudsecurityalliance.org/articles/mfa-made-easy-8-best-practices-for-seamless-authentication-journeys Source: CSA Title: MFA Made Easy: 8 Best Practices for Authentication Feedly Summary: AI Summary and Description: Yes **Summary:** The text primarily discusses the critical role of Multi-Factor Authentication (MFA) in enhancing security strategies, particularly within the framework of compliance and Zero Trust models. It highlights various best practices for implementing MFA,…

  • Cisco Talos Blog: PDFs: Portable documents, or perfect deliveries for phish?

    Source URL: https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/ Source: Cisco Talos Blog Title: PDFs: Portable documents, or perfect deliveries for phish? Feedly Summary: A popular social engineering technique returns: callback phishing, or TOAD attacks, which leverage PDFs, VoIP anonymity and even QR code tricks. AI Summary and Description: Yes Summary: Cisco’s update to its brand impersonation detection engine enhances email…

  • Microsoft Security Blog: Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers 

    Source URL: https://techcommunity.microsoft.com/blog/microsoft-security-blog/planning-your-move-to-microsoft-defender-portal-for-all-microsoft-sentinel-custo/4428613 Source: Microsoft Security Blog Title: Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers  Feedly Summary: Microsoft is transitioning Microsoft Sentinel into the Microsoft Defender portal to create a unified security operations experience. The post Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers  appeared first…

  • Simon Willison’s Weblog: microsoft/vscode-copilot-chat

    Source URL: https://simonwillison.net/2025/Jun/30/vscode-copilot-chat/#atom-everything Source: Simon Willison’s Weblog Title: microsoft/vscode-copilot-chat Feedly Summary: microsoft/vscode-copilot-chat As promised at Build 2025 in May, Microsoft have released the GitHub Copilot Chat client for VS Code under an open source (MIT) license. So far this is just the extension that provides the chat component of Copilot, but the launch announcement promises…