Tag: organization

  • Simon Willison’s Weblog: Cross-Agent Privilege Escalation: When Agents Free Each Other

    Source URL: https://simonwillison.net/2025/Sep/24/cross-agent-privilege-escalation/ Source: Simon Willison’s Weblog Title: Cross-Agent Privilege Escalation: When Agents Free Each Other Feedly Summary: Cross-Agent Privilege Escalation: When Agents Free Each Other Here’s a clever new form of AI exploit from Johann Rehberger, who has coined the term Cross-Agent Privilege Escalation to describe an attack where multiple coding agents – GitHub…

  • Unit 42: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework

    Source URL: https://unit42.paloaltonetworks.com/bookworm-to-stately-taurus/ Source: Unit 42 Title: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework Feedly Summary: We connect Bookworm malware to Chinese APT Stately Taurus using our attribution framework, enhancing our understanding of threat group tradecraft. The post Bookworm to Stately Taurus Using the Unit 42 Attribution Framework appeared first on Unit…

  • Embrace The Red: Cross-Agent Privilege Escalation: When Agents Free Each Other

    Source URL: https://embracethered.com/blog/posts/2025/cross-agent-privilege-escalation-agents-that-free-each-other/ Source: Embrace The Red Title: Cross-Agent Privilege Escalation: When Agents Free Each Other Feedly Summary: During the Month of AI Bugs, I described an emerging vulnerability pattern that shows how commonly agentic systems have a design flaw that allows an agent to overwrite its own configuration and security settings. This allows the…

  • Microsoft Security Blog: Retail at risk: How one alert uncovered a persistent cyberthreat​​

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/24/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat/ Source: Microsoft Security Blog Title: Retail at risk: How one alert uncovered a persistent cyberthreat​​ Feedly Summary: In the latest edition of our Cyberattack Series, we dive into real-world cases targeting retail organizations. With 60% of retail companies reporting operational disruptions from cyberattacks and 43% experiencing breaches in the past year, the stakes…

  • Slashdot: Jaguar Land Rover Hack ‘Has Cost 30,000 Cars and Threatens Supply Chain’

    Source URL: https://it.slashdot.org/story/25/09/24/0344223/jaguar-land-rover-hack-has-cost-30000-cars-and-threatens-supply-chain?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Jaguar Land Rover Hack ‘Has Cost 30,000 Cars and Threatens Supply Chain’ Feedly Summary: AI Summary and Description: Yes Summary: Jaguar Land Rover (JLR) has halted production due to a significant cyberattack, resulting in substantial economic losses and operational disruptions. This incident raises concerns about supply chain vulnerabilities and…

  • Cloud Blog: The new data scientist: From analyst to agentic architect

    Source URL: https://cloud.google.com/blog/products/data-analytics/enabling-data-scientists-to-become-agentic-architects/ Source: Cloud Blog Title: The new data scientist: From analyst to agentic architect Feedly Summary: The role of the data scientist is rapidly transforming. For the past decade, their mission has centered on analyzing the past to run predictive models that informed business decisions. Today, that is no longer enough. The market…

  • The Register: US banking giant Citi pilots agentic AI with 5,000 staff

    Source URL: https://www.theregister.com/2025/09/24/citi_pilots_agentic_ai/ Source: The Register Title: US banking giant Citi pilots agentic AI with 5,000 staff Feedly Summary: Fintech firm admits it may mean fewer staff US banking giant Citi has revved the Stylus Workspaces AI platform it has been rolling out to employees, touting that it is “now powered by agentic AI."… AI…

  • The Register: Google warns China-linked spies lurking in ‘numerous’ enterprises since March

    Source URL: https://www.theregister.com/2025/09/24/google_china_spy_report/ Source: The Register Title: Google warns China-linked spies lurking in ‘numerous’ enterprises since March Feedly Summary: Mandiant CTO anticipates ‘hearing about this campaign for the next one to two years’ Unknown intruders – likely China-linked spies – have broken into “numerous" enterprise networks since March and deployed backdoors, providing access for their…