Tag: Risk

  • The Register: AI gone rogue: Models may try to stop people from shutting them down, Google warns

    Source URL: https://www.theregister.com/2025/09/22/google_ai_misalignment_risk/ Source: The Register Title: AI gone rogue: Models may try to stop people from shutting them down, Google warns Feedly Summary: Misalignment risk? That’s an area for future study Google DeepMind added a new AI threat scenario – one where a model might try to prevent its operators from modifying it or…

  • Slashdot: LinkedIn Set To Start To Train Its AI on Member Profiles

    Source URL: https://tech.slashdot.org/story/25/09/22/2118229/linkedin-set-to-start-to-train-its-ai-on-member-profiles Source: Slashdot Title: LinkedIn Set To Start To Train Its AI on Member Profiles Feedly Summary: AI Summary and Description: Yes Summary: LinkedIn’s announcement regarding the use of member profiles, posts, and public activity to train its AI models raises significant privacy and compliance concerns. The default opt-in mechanism for data collection…

  • Anton on Security – Medium: Anton’s Security Blog Quarterly Q3 2025

    Source URL: https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2025-74fc422be3d3?source=rss—-8e8c3ed26c4c—4 Source: Anton on Security – Medium Title: Anton’s Security Blog Quarterly Q3 2025 Feedly Summary: AI Summary and Description: Yes Summary: The provided text outlines various security topics and resources related to cloud security and AI security, emphasizing the ongoing discussions and research in these fields. It highlights key articles and podcasts…

  • Cloud Blog: Introducing the DORA AI Capabilities Model: 7 keys to succeeding in AI-assisted software development

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/introducing-doras-inaugural-ai-capabilities-model/ Source: Cloud Blog Title: Introducing the DORA AI Capabilities Model: 7 keys to succeeding in AI-assisted software development Feedly Summary: Artificial intelligence is rapidly transforming software development. But simply adopting AI tools isn’t a guarantee of success. Across the industry, tech leaders and developers are asking the same critical questions: How do…

  • The Register: ‘Technical debt’ in police database built to respond to child murders causing a ‘failing service’

    Source URL: https://www.theregister.com/2025/09/22/police_database_built_to_respond/ Source: The Register Title: ‘Technical debt’ in police database built to respond to child murders causing a ‘failing service’ Feedly Summary: Project rated at ‘Red’ risk as it struggles to move off obsolete Oracle tech and cloud transition stalls The risk rating of the UK’s crime intelligence database is being elevated to…

  • The Register: FOMO? Brit banking biz rolls out AI tools, talks up security

    Source URL: https://www.theregister.com/2025/09/22/lloyds_data_ai_deployment/ Source: The Register Title: FOMO? Brit banking biz rolls out AI tools, talks up security Feedly Summary: Lloyds Data and AI lead doesn’t want devs downloading models from the likes of Hugging Face – too risky Lloyds Banking Group is leaning into 21st century tech – yet trying to do so in…

  • Simon Willison’s Weblog: Locally AI

    Source URL: https://simonwillison.net/2025/Sep/21/locally-ai/ Source: Simon Willison’s Weblog Title: Locally AI Feedly Summary: Locally AI Handy new iOS app by Adrien Grondin for running local LLMs on your phone. It just added support for the new iOS 26 Apple Foundation model, so you can install this app and instantly start a conversation with that model without…

  • Slashdot: AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn

    Source URL: https://yro.slashdot.org/story/25/09/21/2022257/ai-tools-give-dangerous-powers-to-cyberattackers-security-researchers-warn?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn Feedly Summary: AI Summary and Description: Yes **Summary:** The text highlights significant vulnerabilities associated with AI technologies, particularly in the context of automated systems and malicious actors leveraging them to exploit security gaps. It underscores emerging threats posed by…

  • Slashdot: Secure Software Supply Chains, Urges Former Go Lead Russ Cox

    Source URL: https://developers.slashdot.org/story/25/09/21/0650219/secure-software-supply-chains-urges-former-go-lead-russ-cox?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Secure Software Supply Chains, Urges Former Go Lead Russ Cox Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the critical need for enhancing software supply chain security, particularly in the face of ongoing vulnerabilities. It outlines practical solutions, such as adopting software signatures and reproducible builds,…

  • Simon Willison’s Weblog: httpjail

    Source URL: https://simonwillison.net/2025/Sep/19/httpjail/#atom-everything Source: Simon Willison’s Weblog Title: httpjail Feedly Summary: httpjail Here’s a promising new (experimental) project in the sandboxing space from Ammar Bandukwala at Coder. httpjail provides a Rust CLI tool for running an individual process against a custom configured HTTP proxy. The initial goal is to help run coding agents like Claude…