Tag: malicious data
-
Bulletins: Vulnerability Summary for the Week of August 25, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-245 Source: Bulletins Title: Vulnerability Summary for the Week of August 25, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000projects–Online Project Report Submission and Evaluation System A vulnerability has been found in 1000projects Online Project Report Submission and Evaluation System 1.0. This issue affects some unknown…
-
Bulletins: Vulnerability Summary for the Week of June 9, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-167 Source: Bulletins Title: Vulnerability Summary for the Week of June 9, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Acer–ControlCenter Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named…
-
Simon Willison’s Weblog: An Introduction to Google’s Approach to AI Agent Security
Source URL: https://simonwillison.net/2025/Jun/15/ai-agent-security/#atom-everything Source: Simon Willison’s Weblog Title: An Introduction to Google’s Approach to AI Agent Security Feedly Summary: Here’s another new paper on AI agent security: An Introduction to Google’s Approach to AI Agent Security, by Santiago Díaz, Christoph Kern, and Kara Olive. (I wrote about a different recent paper, Design Patterns for Securing…
-
Simon Willison’s Weblog: CaMeL offers a promising new direction for mitigating prompt injection attacks
Source URL: https://simonwillison.net/2025/Apr/11/camel/#atom-everything Source: Simon Willison’s Weblog Title: CaMeL offers a promising new direction for mitigating prompt injection attacks Feedly Summary: In the two and a half years that we’ve been talking about prompt injection attacks I’ve seen alarmingly little progress towards a robust solution. The new paper Defeating Prompt Injections by Design from Google…
-
The GenAI Bug Bounty Program | 0din.ai: Poison in the Pipeline: Liberating models with Basilisk Venom
Source URL: https://0din.ai/blog/poison-in-the-pipeline-liberating-models-with-basilisk-venom Source: The GenAI Bug Bounty Program | 0din.ai Title: Poison in the Pipeline: Liberating models with Basilisk Venom Feedly Summary: AI Summary and Description: Yes Summary: The provided text highlights a significant incident of data poisoning in generative AI models, emphasizing the long-term implications of malicious data insertion and its potential impact…