Tag: media

  • The Register: Expired Juniper routers find new life – as Chinese spy hubs

    Source URL: https://www.theregister.com/2025/03/12/china_spy_juniper_routers/ Source: The Register Title: Expired Juniper routers find new life – as Chinese spy hubs Feedly Summary: Fewer than 10 known victims, but Mandiant suspects others compromised, too Chinese spies have for months exploited old Juniper Networks routers, infecting the buggy gear with custom backdoors and gaining root access to the compromised…

  • Cloud Blog: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers/ Source: Cloud Blog Title: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers Feedly Summary: Written by: Lukasz Lamparski, Punsaen Boonyakarn, Shawn Chew, Frank Tse, Jakub Jozwiak, Mathew Potaczek, Logeswaran Nadarajan, Nick Harbour, Mustafa Nasser Introduction In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos…

  • Cloud Blog: How to deploy serverless AI with Gemma 3 on Cloud Run

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/serverless-ai-with-gemma-3-on-cloud-run/ Source: Cloud Blog Title: How to deploy serverless AI with Gemma 3 on Cloud Run Feedly Summary: Today, we introduced Gemma 3, a family of lightweight, open models built with the cutting-edge technology behind Gemini 2.0. The Gemma 3 family of models have been designed for speed and portability, empowering developers to…

  • Hacker News: Gemma 3 Technical Report [pdf]

    Source URL: https://storage.googleapis.com/deepmind-media/gemma/Gemma3Report.pdf Source: Hacker News Title: Gemma 3 Technical Report [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive technical report on Gemma 3, an advanced multimodal language model introduced by Google DeepMind. It highlights significant architectural improvements, including an increased context size, enhanced multilingual capabilities, and innovations…

  • Alerts: CISA Adds Six Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/11/cisa-adds-six-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Six Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24983 Microsoft Windows Win32k Use-After-Free Vulnerability CVE-2025-24984 Microsoft Windows NTFS Information Disclosure Vulnerability CVE-2025-24985 Microsoft Windows Fast FAT File System Driver Integer…

  • The Register: Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws

    Source URL: https://www.theregister.com/2025/03/12/patch_tuesday/ Source: The Register Title: Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws Feedly Summary: Microsoft tackles 50-plus security blunders, Adobe splats 3D bugs, and Apple deals with a doozy Patch Tuesday Microsoft’s Patch Tuesday bundle has appeared, with a dirty dozen flaws competing for…

  • Cisco Talos Blog: Microsoft Patch Tuesday for March 2025 — Snort rules and prominent vulnerabilities

    Source URL: https://blog.talosintelligence.com/march-patch-tuesday-release/ Source: Cisco Talos Blog Title: Microsoft Patch Tuesday for March 2025 — Snort rules and prominent vulnerabilities Feedly Summary: Microsoft has released its monthly security update for March of 2025 which includes 57 vulnerabilities affecting a range of products, including 6 that Microsoft marked as “critical”.  AI Summary and Description: Yes Summary:…

  • Schneier on Security: Silk Typhoon Hackers Indicted

    Source URL: https://www.schneier.com/blog/archives/2025/03/silk-typhoon-hackers-indicted.html Source: Schneier on Security Title: Silk Typhoon Hackers Indicted Feedly Summary: Lots of interesting details in the story: The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the world, including eight staffers for the contractor i-Soon, two…

  • The Register: ‘Uber for nurses’ exposes 86k+ medical records, PII in open S3 bucket for months

    Source URL: https://www.theregister.com/2025/03/11/uber_for_nurses_exposes_86k/ Source: The Register Title: ‘Uber for nurses’ exposes 86k+ medical records, PII in open S3 bucket for months Feedly Summary: Non-password-protected, unencrypted 108GB database…what could possibly go wrong Exclusive More than 86,000 records containing nurses’ medical records, facial images, ID documents and more sensitive info linked to health tech company ESHYFT was…