Tag: other

  • The Register: Infosec hounds spot prompt injection vuln in Google Gemini apps

    Source URL: https://www.theregister.com/2025/08/08/infosec_hounds_spot_prompt_injection/ Source: The Register Title: Infosec hounds spot prompt injection vuln in Google Gemini apps Feedly Summary: Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large…

  • The Register: Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’

    Source URL: https://www.theregister.com/2025/08/07/microsoft_cisa_warn_yet_another/ Source: The Register Title: Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’ Feedly Summary: No reported in-the-wild exploits…yet Microsoft and the feds late Wednesday sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange…

  • Simon Willison’s Weblog: GPT-5: Key characteristics, pricing and model card

    Source URL: https://simonwillison.net/2025/Aug/7/gpt-5/#atom-everything Source: Simon Willison’s Weblog Title: GPT-5: Key characteristics, pricing and model card Feedly Summary: I’ve had preview access to the new GPT-5 model family for the past two weeks, and have been using GPT-5 as my daily-driver. It’s my new favorite model. It’s still an LLM – it’s not a dramatic departure…

  • Anchore: Meeting 2025’s SBOM Compliance Deadlines: A Practical Implementation Guide

    Source URL: https://anchore.com/blog/meeting-2025s-sbom-compliance-deadlines-a-practical-implementation-guide/ Source: Anchore Title: Meeting 2025’s SBOM Compliance Deadlines: A Practical Implementation Guide Feedly Summary: 2025 has become the year of SBOM compliance deadlines. March 31st marked PCI DSS 4.0’s enforcement date, requiring payment processors to maintain comprehensive inventories of all software components. Meanwhile, the EU’s Cyber Resilience Act takes full effect in…

  • Cloud Blog: Supercharge your AI: GKE inference reference architecture, your blueprint for production-ready inference

    Source URL: https://cloud.google.com/blog/topics/developers-practitioners/supercharge-your-ai-gke-inference-reference-architecture-your-blueprint-for-production-ready-inference/ Source: Cloud Blog Title: Supercharge your AI: GKE inference reference architecture, your blueprint for production-ready inference Feedly Summary: The age of AI is here, and organizations everywhere are racing to deploy powerful models to drive innovation, enhance products, and create entirely new user experiences. But moving from a trained model in a…

  • Simon Willison’s Weblog: Qwen3-4B Instruct and Thinking

    Source URL: https://simonwillison.net/2025/Aug/6/qwen3-4b-instruct-and-thinking/ Source: Simon Willison’s Weblog Title: Qwen3-4B Instruct and Thinking Feedly Summary: Qwen3-4B Instruct and Thinking Yet another interesting model from Qwen—these are tiny compared to their other recent releases (just 4B parameters, 7.5GB on Hugging Face and even smaller when quantized) but with a 262,144 context length, which Qwen suggest is essential…