Tag: mitigation

  • The Register: ‘An attacker’s playground:’ Crims exploit GoAnywhere perfect-10 bug

    Source URL: https://www.theregister.com/2025/09/26/an_apts_playground_goanywhere_perfect10/ Source: The Register Title: ‘An attacker’s playground:’ Crims exploit GoAnywhere perfect-10 bug Feedly Summary: Researchers say tens of thousands of instances remain publicly reachable Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra’s GoAnywhere managed file transfer (MFT), and chastised the vendor for a lack of transparency.……

  • Microsoft Security Blog: XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/25/xcsset-evolves-again-analyzing-the-latest-updates-to-xcssets-inventory/ Source: Microsoft Security Blog Title: XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory Feedly Summary: Microsoft Threat Intelligence has uncovered a new variant of the XCSSET malware, which is designed to infect Xcode projects, typically used by software developers building Apple or macOS-related applications. The post XCSSET evolves again: Analyzing…

  • Simon Willison’s Weblog: Cross-Agent Privilege Escalation: When Agents Free Each Other

    Source URL: https://simonwillison.net/2025/Sep/24/cross-agent-privilege-escalation/ Source: Simon Willison’s Weblog Title: Cross-Agent Privilege Escalation: When Agents Free Each Other Feedly Summary: Cross-Agent Privilege Escalation: When Agents Free Each Other Here’s a clever new form of AI exploit from Johann Rehberger, who has coined the term Cross-Agent Privilege Escalation to describe an attack where multiple coding agents – GitHub…

  • Docker: MCP Horror Stories: The Drive-By Localhost Breach

    Source URL: https://www.docker.com/blog/mpc-horror-stories-cve-2025-49596-local-host-breach/ Source: Docker Title: MCP Horror Stories: The Drive-By Localhost Breach Feedly Summary: This is Part 4 of our MCP Horror Stories series, where we examine real-world security incidents that expose the devastating vulnerabilities in AI infrastructure and demonstrate how Docker MCP Gateway provides enterprise-grade protection against sophisticated attack vectors. The Model Context…

  • The Register: One token to pwn them all: Entra ID bug could have granted access to every tenant

    Source URL: https://www.theregister.com/2025/09/19/microsoft_entra_id_bug/ Source: The Register Title: One token to pwn them all: Entra ID bug could have granted access to every tenant Feedly Summary: Until Microsoft lobbed it into a virtual volcano A security researcher claims to have found a flaw that could have handed him the keys to almost every Entra ID tenant…

  • Schneier on Security: Time-of-Check Time-of-Use Attacks Against LLMs

    Source URL: https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html Source: Schneier on Security Title: Time-of-Check Time-of-Use Attacks Against LLMs Feedly Summary: This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.: Abstract: Large Language Model (LLM)-enabled agents are rapidly emerging across a wide range of applications, but their deployment introduces vulnerabilities with security implications.…

  • OpenAI : Detecting and reducing scheming in AI models

    Source URL: https://openai.com/index/detecting-and-reducing-scheming-in-ai-models Source: OpenAI Title: Detecting and reducing scheming in AI models Feedly Summary: Apollo Research and OpenAI developed evaluations for hidden misalignment (“scheming”) and found behaviors consistent with scheming in controlled tests across frontier models. The team shared concrete examples and stress tests of an early method to reduce scheming. AI Summary and…

  • Cisco Talos Blog: Why a Cisco Talos Incident Response Retainer is a game-changer

    Source URL: https://blog.talosintelligence.com/why-a-cisco-talos-incident-response-retainer-is-a-game-changer/ Source: Cisco Talos Blog Title: Why a Cisco Talos Incident Response Retainer is a game-changer Feedly Summary: With a Cisco Talos IR retainer, your organization can stay resilient and ahead of tomorrow’s threats. Here’s how. AI Summary and Description: Yes Summary: The text details the benefits of a Cisco Talos Incident Response…