Tag: manipulation
- 
		
		
		Microsoft Security Blog: Investigating targeted “payroll pirate” attacks affecting US universitiesSource URL: https://www.microsoft.com/en-us/security/blog/2025/10/09/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/ Source: Microsoft Security Blog Title: Investigating targeted “payroll pirate” attacks affecting US universities Feedly Summary: Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts, attacks that have been dubbed… 
- 
		
		
		The Register: AI companion bots use emotional manipulation to boost usageSource URL: https://www.theregister.com/2025/10/08/ai_bots_use_emotional_manipulation/ Source: The Register Title: AI companion bots use emotional manipulation to boost usage Feedly Summary: Researchers argue that this dark pattern poses a legal risk AI companion apps such as Character.ai and Replika commonly try to boost user engagement with emotional manipulation, a practice that academics characterize as a dark pattern.… AI… 
- 
		
		
		The Register: OpenAI bans suspected Chinese accounts using ChatGPT to plan surveillanceSource URL: https://www.theregister.com/2025/10/07/openai_bans_suspected_china_accounts/ Source: The Register Title: OpenAI bans suspected Chinese accounts using ChatGPT to plan surveillance Feedly Summary: It also banned some suspected Russian accounts trying to create influence campaigns and malware OpenAI has banned ChatGPT accounts believed to be linked to Chinese government entities attempting to use AI models to surveil individuals and… 
- 
		
		
		Tomasz Tunguz: Circular Financing: Does Nvidia’s $110B Bet Echo the Telecom Bubble?Source URL: https://www.tomtunguz.com/nvidia_nortel_vendor_financing_comparison/ Source: Tomasz Tunguz Title: Circular Financing: Does Nvidia’s $110B Bet Echo the Telecom Bubble? Feedly Summary: When Nvidia announced a $100 billion investment commitment to OpenAI1 in September 2025 , analysts immediately drew comparisons to the telecom bubble. The concern : is this vendor financing , where a supplier lends money to… 
- 
		
		
		Simon Willison’s Weblog: Sora 2 prompt injectionSource URL: https://simonwillison.net/2025/Oct/3/cameo-prompt-injections/ Source: Simon Willison’s Weblog Title: Sora 2 prompt injection Feedly Summary: It turns out Sora 2 is vulnerable to prompt injection! When you onboard to Sora you get the option to create your own “cameo" – a virtual video recreation of yourself. Here’s mine singing opera at the Royal Albert Hall. You… 
- 
		
		
		Cloud Blog: The oracles of DeFi: How to build trustworthy data feeds for decentralized applicationsSource URL: https://cloud.google.com/blog/topics/financial-services/blockchain-oracles-dz-bank-solution-defi-enterprise-applications/ Source: Cloud Blog Title: The oracles of DeFi: How to build trustworthy data feeds for decentralized applications Feedly Summary: Distributed ledger technology (DLT) emerged with Bitcoin as a censorship-resistant way to conduct payments between distrusting peers. After a period, traditional financial institutions began to explore the technology, recognizing the potential of its… 
- 
		
		
		Cloud Blog: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening RecommendationsSource URL: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations/ Source: Cloud Blog Title: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations Feedly Summary: Written by: Omar ElAhdan, Matthew McWhirt, Michael Rudden, Aswad Robinson, Bhavesh Dhake, Laith Al Background Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing… 
- 
		
		
		Simon Willison’s Weblog: Video models are zero-shot learners and reasonersSource URL: https://simonwillison.net/2025/Sep/27/video-models-are-zero-shot-learners-and-reasoners/ Source: Simon Willison’s Weblog Title: Video models are zero-shot learners and reasoners Feedly Summary: Video models are zero-shot learners and reasoners Fascinating new paper from Google DeepMind which makes a very convincing case that their Veo 3 model – and generative video models in general – serve a similar role in the… 
- 
		
		
		Microsoft Security Blog: XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventorySource URL: https://www.microsoft.com/en-us/security/blog/2025/09/25/xcsset-evolves-again-analyzing-the-latest-updates-to-xcssets-inventory/ Source: Microsoft Security Blog Title: XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory Feedly Summary: Microsoft Threat Intelligence has uncovered a new variant of the XCSSET malware, which is designed to infect Xcode projects, typically used by software developers building Apple or macOS-related applications. The post XCSSET evolves again: Analyzing… 
- 
		
		
		The Register: AI gone rogue: Models may try to stop people from shutting them down, Google warnsSource URL: https://www.theregister.com/2025/09/22/google_ai_misalignment_risk/ Source: The Register Title: AI gone rogue: Models may try to stop people from shutting them down, Google warns Feedly Summary: Misalignment risk? That’s an area for future study Google DeepMind added a new AI threat scenario – one where a model might try to prevent its operators from modifying it or…