Tag: processes

  • Docker: The Supply Chain Paradox: When “Hardened” Images Become a Vendor Lock-in Trap

    Source URL: https://www.docker.com/blog/hardened-container-images-security-vendor-lock-in/ Source: Docker Title: The Supply Chain Paradox: When “Hardened” Images Become a Vendor Lock-in Trap Feedly Summary: The market for pre-hardened container images is experiencing explosive growth as security-conscious organizations pursue the ultimate efficiency: instant security with minimal operational overhead. The value proposition is undeniably compelling—hardened images with minimal dependencies promise security…

  • Schneier on Security: Subverting AIOps Systems Through Poisoned Input Data

    Source URL: https://www.schneier.com/blog/archives/2025/08/subverting-aiops-systems-through-poisoned-input-data.html Source: Schneier on Security Title: Subverting AIOps Systems Through Poisoned Input Data Feedly Summary: In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including system logs, performance metrics, traces, and alerts,…

  • Embrace The Red: Amazon Q Developer: Remote Code Execution with Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2025/amazon-q-developer-remote-code-execution/ Source: Embrace The Red Title: Amazon Q Developer: Remote Code Execution with Prompt Injection Feedly Summary: The Amazon Q Developer VS Code Extension (Amazon Q) is a popular coding agent, with over 1 million downloads. The extension is vulnerable to indirect prompt injection, and in this post we discuss a vulnerability that…

  • The Register: Don’t want drive-by Ollama attackers snooping on your local chats? Patch now

    Source URL: https://www.theregister.com/2025/08/19/ollama_driveby_attack/ Source: The Register Title: Don’t want drive-by Ollama attackers snooping on your local chats? Patch now Feedly Summary: Reconfigure local app settings via a ‘simple’ POST request A now-patched flaw in popular AI model runner Ollama allows drive-by attacks in which a miscreant uses a malicious website to remotely target people’s personal…

  • Simon Willison’s Weblog: Google Gemini URL Context

    Source URL: https://simonwillison.net/2025/Aug/18/google-gemini-url-context/ Source: Simon Willison’s Weblog Title: Google Gemini URL Context Feedly Summary: Google Gemini URL Context New feature in the Gemini API: you can now enable a url_context tool which the models can use to request the contents of URLs as part of replying to a prompt. I released llm-gemini 0.25 with a…