Tag: s pattern
-
Simon Willison’s Weblog: Continuous AI
Source URL: https://simonwillison.net/2025/Jun/27/continuous-ai/#atom-everything Source: Simon Willison’s Weblog Title: Continuous AI Feedly Summary: Continuous AI GitHub Next have coined the term “Continuous AI" to describe "all uses of automated AI to support software collaboration on any platform". It’s intended as an echo of Continuous Integration and Continuous Deployment: We’ve chosen the term "Continuous AI” to align…
-
AWS News Blog: Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities
Source URL: https://aws.amazon.com/blogs/aws/verify-internal-access-to-critical-aws-resources-with-new-iam-access-analyzer-capabilities/ Source: AWS News Blog Title: Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities Feedly Summary: A new capability in IAM Access Analyzer helps security teams verify which principals within their AWS organization have access to critical resources like S3 buckets, DynamoDB tables, and RDS snapshots by using…
-
Cloud Blog: Build a multi-agent KYC workflow in three steps using Google’s Agent Development Kit and Gemini
Source URL: https://cloud.google.com/blog/products/ai-machine-learning/build-kyc-agentic-workflows-with-googles-adk/ Source: Cloud Blog Title: Build a multi-agent KYC workflow in three steps using Google’s Agent Development Kit and Gemini Feedly Summary: Know Your Customer (KYC) processes are foundational to any Financial Services Institution’s (FSI) regulatory compliance practices and risk mitigation strategies. KYC is how financial institutions verify the identity of their customers…
-
Simon Willison’s Weblog: Design Patterns for Securing LLM Agents against Prompt Injections
Source URL: https://simonwillison.net/2025/Jun/13/prompt-injection-design-patterns/#atom-everything Source: Simon Willison’s Weblog Title: Design Patterns for Securing LLM Agents against Prompt Injections Feedly Summary: This a new paper by 11 authors from organizations including IBM, Invariant Labs, ETH Zurich, Google and Microsoft is an excellent addition to the literature on prompt injection and LLM security. In this work, we describe…
-
Cloud Blog: The Cost of a Call: From Voice Phishing to Data Extortion
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion/ Source: Cloud Blog Title: The Cost of a Call: From Voice Phishing to Data Extortion Feedly Summary: Introduction Google Threat Intelligence Group (GTIG) is tracking UNC6040, a financially motivated threat cluster that specializes in voice phishing (vishing) campaigns specifically designed to compromise organization’s Salesforce instances for large-scale data theft and subsequent extortion.…
-
Simon Willison’s Weblog: claude-trace
Source URL: https://simonwillison.net/2025/Jun/2/claude-trace/ Source: Simon Willison’s Weblog Title: claude-trace Feedly Summary: claude-trace I’ve been thinking for a while it would be interesting to run some kind of HTTP proxy against the Claude Code CLI app and take a peek at how it works. Mario Zechner just published a really nice version of that. It works…