Tag: making

  • Rekt: Zoth – Rekt

    Source URL: https://www.rekt.news/zoth-rekt Source: Rekt Title: Zoth – Rekt Feedly Summary: Admin keys stolen, $8.4M drained in minutes through a malicious contract upgrade. Zoth suffers two hacks in three weeks – first for logic, now for keys. Auditing code is easy. Auditing the humans behind it? That’s where protocols bleed out. AI Summary and Description:…

  • Cloud Blog: Build gen AI agents using Google Cloud databases

    Source URL: https://cloud.google.com/blog/products/databases/learn-how-to-connect-agents-to-google-cloud-databases/ Source: Cloud Blog Title: Build gen AI agents using Google Cloud databases Feedly Summary: As enterprises build generative AI agents to strengthen their security posture or improve their customer experience, they need access to real-time data. Because most business critical and real-time data is stored and processed in databases, you need ways…

  • Cisco Security Blog: Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy

    Source URL: https://feedpress.me/link/23535/16990587/cisco-co-authors-update-to-nist-adversarial-machine-learning-taxonomy Source: Cisco Security Blog Title: Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy Feedly Summary: Cisco and the UK AI Security Institute partnered with NIST to release the latest update to the Adversarial Machine Learning Taxonomy. AI Summary and Description: Yes Summary: The collaboration between Cisco, the UK AI Security…

  • Simon Willison’s Weblog: deepseek-ai/DeepSeek-V3-0324

    Source URL: https://simonwillison.net/2025/Mar/24/deepseek/ Source: Simon Willison’s Weblog Title: deepseek-ai/DeepSeek-V3-0324 Feedly Summary: deepseek-ai/DeepSeek-V3-0324 Chinese AI lab DeepSeek just released the latest version of their enormous DeepSeek v3 model, baking the release date into the name DeepSeek-V3-0324. The license is MIT, the README is empty and the release adds up a to a total of 641 GB…

  • The Register: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns

    Source URL: https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/ Source: The Register Title: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns Feedly Summary: PLUS: Russian bug-buyers seeks Telegram flaws; Another WordPress security mess; NIST backlog grows; and more! Infosec In Brief Organized crime networks are now reliant on digital tech for most of their activities according…

  • Hacker News: Aiter: AI Tensor Engine for ROCm

    Source URL: https://rocm.blogs.amd.com/software-tools-optimization/aiter:-ai-tensor-engine-for-rocm™/README.html Source: Hacker News Title: Aiter: AI Tensor Engine for ROCm Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses AMD’s AI Tensor Engine for ROCm (AITER), emphasizing its capabilities in enhancing performance across various AI workloads. It highlights the ease of integration with existing frameworks and the significant performance…

  • Hacker News: LangManus: An Open-Source Manus Agent with LangChain + LangGraph

    Source URL: https://github.com/langmanus/langmanus Source: Hacker News Title: LangManus: An Open-Source Manus Agent with LangChain + LangGraph Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses LangManus, an open-source AI automation framework designed for academic research and collaboration, focusing on multi-agent systems and integration with language models. It highlights various components involved in…

  • Slashdot: How AI Coding Assistants Could Be Compromised Via Rules File

    Source URL: https://developers.slashdot.org/story/25/03/23/2138230/how-ai-coding-assistants-could-be-compromised-via-rules-file?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How AI Coding Assistants Could Be Compromised Via Rules File Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant security vulnerability in AI coding assistants like GitHub Copilot and Cursor, highlighting how malicious rule configuration files can be used to inject backdoors and vulnerabilities in…

  • Slashdot: Doc Searls Proposes We Set Our Own Terms and Policies for Web Site Tracking

    Source URL: https://yro.slashdot.org/story/25/03/23/1842242/doc-searls-proposes-we-set-our-own-terms-and-policies-for-web-site-tracking?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Doc Searls Proposes We Set Our Own Terms and Policies for Web Site Tracking Feedly Summary: AI Summary and Description: Yes Summary: The proposed IEEE P7012 standard, nicknamed MyTerms, aims to revolutionize personal privacy on the web by allowing individuals to be the first party in online agreements. This…