Tag: robust security
-
Embrace The Red: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets
Source URL: https://embracethered.com/blog/posts/2025/windsurf-data-exfiltration-vulnerabilities/ Source: Embrace The Red Title: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets Feedly Summary: This is the first post in a series exploring security vulnerabilities in Windsurf. If you are unfamiliar with Windsurf, it is a fork of VS Code and the coding agent is called Windsurf Cascade. The attack vectors…
-
The Register: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure
Source URL: https://www.theregister.com/2025/08/20/russian_fsb_cyberspies_exploiting_cisco_bug/ Source: The Register Title: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure Feedly Summary: Snarfing up config files for ‘thousands’ of devices…just for giggles, we’re sure The FBI and security researchers today warned that Russian government spies exploited a seven-year-old bug in end-of-life Cisco networking devices…
-
Embrace The Red: Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection
Source URL: https://embracethered.com/blog/posts/2025/amazon-q-developer-interprets-hidden-instructions/ Source: Embrace The Red Title: Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection Feedly Summary: The Amazon Q Developer VS Code Extension (Amazon Q) is a very popular coding agent, with over 1 million downloads. In previous posts we showed how prompt injection vulnerabilities in Amazon Q could lead…
-
Schneier on Security: Subverting AIOps Systems Through Poisoned Input Data
Source URL: https://www.schneier.com/blog/archives/2025/08/subverting-aiops-systems-through-poisoned-input-data.html Source: Schneier on Security Title: Subverting AIOps Systems Through Poisoned Input Data Feedly Summary: In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including system logs, performance metrics, traces, and alerts,…
-
Cisco Talos Blog: Ransomware incidents in Japan during the first half of 2025
Source URL: https://blog.talosintelligence.com/ransomware_incidents_in_japan_during_the_first_half_of_2025/ Source: Cisco Talos Blog Title: Ransomware incidents in Japan during the first half of 2025 Feedly Summary: Ransomware attackers continue to primarily target small and medium-sized manufacturing businesses in Japan. AI Summary and Description: Yes Summary: The text provides an in-depth analysis of the rise in ransomware attacks in Japan during the…