Tag: protocol

  • Cisco Talos Blog: UAT-7237 targets Taiwanese web hosting infrastructure

    Source URL: https://blog.talosintelligence.com/uat-7237-targets-web-hosting-infra/ Source: Cisco Talos Blog Title: UAT-7237 targets Taiwanese web hosting infrastructure Feedly Summary: Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918. AI Summary and Description: Yes Summary: The text discusses the activities of UAT-7237, a Chinese-speaking advanced persistent…

  • The Register: Telco giant Colt suffers attack, takes systems offline

    Source URL: https://www.theregister.com/2025/08/15/london_telco_colts_services_disrupted/ Source: The Register Title: Telco giant Colt suffers attack, takes systems offline Feedly Summary: London-based multinational takes customer portal and Voice API platform offline as ‘protective measure’ following breach Multinational telco Colt Technology Services says a “cyber incident" is to blame for its customer portal and other services being down for a…

  • The Register: Why the UK public sector still creaks along on COBOL

    Source URL: https://www.theregister.com/2025/08/15/cobol_in_the_public_sector_feature/ Source: The Register Title: Why the UK public sector still creaks along on COBOL Feedly Summary: Government: ‘Trust us, it’ll be different this time’ Feature The UK government has gone all-in on AI. More than 50 years after Harold Wilson gave his famous “White heat of technology" speech, this is the hot…

  • The Register: LLM chatbots trivial to weaponise for data theft, say boffins

    Source URL: https://www.theregister.com/2025/08/15/llm_chatbots_trivial_to_weaponise/ Source: The Register Title: LLM chatbots trivial to weaponise for data theft, say boffins Feedly Summary: System prompt engineering turns benign AI assistants into ‘investigator’ and ‘detective’ roles that bypass privacy guardrails A team of boffins is warning that AI chatbots built on large language models (LLM) can be tuned into malicious…

  • New York Times – Artificial Intelligence : La IA aumenta los riesgos de publicar las fotos de tus hijos en internet

    Source URL: https://www.nytimes.com/es/2025/08/15/espanol/negocios/ia-riesgos-fotos-hijos-internet.html Source: New York Times – Artificial Intelligence Title: La IA aumenta los riesgos de publicar las fotos de tus hijos en internet Feedly Summary: Las aplicaciones de inteligencia artificial que generan desnudos falsos, entre otros problemas de privacidad, hacen que compartir imágenes de tus hijos sea mucho más arriesgado que hace unos…

  • The Register: Ransomware crews don’t care about your endpoint security – they’ve already killed it

    Source URL: https://www.theregister.com/2025/08/14/edr_killers_ransomware/ Source: The Register Title: Ransomware crews don’t care about your endpoint security – they’ve already killed it Feedly Summary: Some custom malware, some legit software tools At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on…

  • The Register: ‘MadeYouReset’ HTTP/2 flaw lets attackers DoS servers

    Source URL: https://www.theregister.com/2025/08/14/madeyoureset_http2_flaw_lets_attackers/ Source: The Register Title: ‘MadeYouReset’ HTTP/2 flaw lets attackers DoS servers Feedly Summary: Researchers had to notify over 100 vendors of flaw that builds on 2023’s Rapid Reset with neat twist past usual mitigations Security researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel have published details of a “common design flaw"…

  • Docker: MCP Horror Stories: The GitHub Prompt Injection Data Heist

    Source URL: https://www.docker.com/blog/mcp-horror-stories-github-prompt-injection/ Source: Docker Title: MCP Horror Stories: The GitHub Prompt Injection Data Heist Feedly Summary: This is Part 3 of our MCP Horror Stories series, where we examine real-world security incidents that validate the critical vulnerabilities threatening AI infrastructure and demonstrate how Docker MCP Toolkit provides enterprise-grade protection. The Model Context Protocol (MCP)…

  • Slashdot: Microsoft Says Voice Will Emerge as Primary Input for Next Windows

    Source URL: https://tech.slashdot.org/story/25/08/14/1441240/microsoft-says-voice-will-emerge-as-primary-input-for-next-windows?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Says Voice Will Emerge as Primary Input for Next Windows Feedly Summary: AI Summary and Description: Yes Summary: The upcoming version of Windows will significantly evolve through the integration of AI technologies, specifically enhancing user interaction by making voice a primary input method. This transformation will leverage both…