Tag: secure coding practices

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • Hacker News: GPON FTTH networks (in)security (2016)

    Source URL: https://pierrekim.github.io/blog/2016-11-01-gpon-ftth-networks-insecurity.html#introduction Source: Hacker News Title: GPON FTTH networks (in)security (2016) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the (in)security of GPON FTTH networks, particularly focusing on vulnerabilities inherent in devices like the Optical Network Terminal (ONT) used by major ISPs in France. It uncovers significant threats, including…

  • Cloud Blog: Reach beyond the IDE with tools for Gemini Code Assist

    Source URL: https://cloud.google.com/blog/products/application-development/gemini-code-assist-launches-developer-early-access-for-tools/ Source: Cloud Blog Title: Reach beyond the IDE with tools for Gemini Code Assist Feedly Summary: One of the biggest areas of promise for generative AI is coding assistance — leveraging the power of large language models to help developers create or update application code with amazing speed and accuracy, dramatically boosting…

  • The Register: Apache issues patches for critical Struts 2 RCE bug

    Source URL: https://www.theregister.com/2024/12/12/apache_struts_2_vuln/ Source: The Register Title: Apache issues patches for critical Struts 2 RCE bug Feedly Summary: More details released after devs allowed weeks to apply fixes We now know the remote code execution vulnerability in Apache Struts 2 disclosed back in November carries a near-maximum severity rating following the publication of the CVE.……

  • Hacker News: Compromising OpenWrt Supply Chain

    Source URL: https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ Source: Hacker News Title: Compromising OpenWrt Supply Chain Feedly Summary: Comments AI Summary and Description: Yes Summary: This text presents a comprehensive security analysis regarding vulnerabilities in the OpenWrt firmware supply chain, detailing how command injection and SHA-256 collisions can be exploited. It emphasizes the importance of secure coding practices and robust…

  • Embrace The Red: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/ Source: Embrace The Red Title: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection Feedly Summary: Last week Leon Derczynski described how LLMs can output ANSI escape codes. These codes, also known as control characters, are interpreted by terminal emulators and modify behavior. This discovery resonates with areas I had…

  • Wired: How ChatGPT’s Canvas Can Help You Use AI More Productively

    Source URL: https://www.wired.com/story/how-to-use-chatgpt-canvas-productivity/ Source: Wired Title: How ChatGPT’s Canvas Can Help You Use AI More Productively Feedly Summary: Canvas, which is available to OpenAI’s paid subscribers, is a little bit like an AI-powered Google Docs. Here’s how to use it. AI Summary and Description: Yes Summary: The text discusses OpenAI’s introduction of the Canvas feature…

  • Slashdot: Verify the Rust’s Standard Library’s 7,500 Unsafe Functions – and Win ‘Financial Rewards’

    Source URL: https://developers.slashdot.org/story/24/11/23/2327203/verify-the-rusts-standard-librarys-7500-unsafe-functions—and-win-financial-rewards?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Verify the Rust’s Standard Library’s 7,500 Unsafe Functions – and Win ‘Financial Rewards’ Feedly Summary: AI Summary and Description: Yes Summary: The text discusses an initiative led by AWS and the Rust Foundation to enhance safety in the Rust programming language by crowdsourcing the verification of its standard library.…

  • Hacker News: Bad Software Keeps Cyber Security Companies in Business

    Source URL: https://www.dogesec.com/blog/bad_software_keeps_security_industry_in_business/ Source: Hacker News Title: Bad Software Keeps Cyber Security Companies in Business Feedly Summary: Comments AI Summary and Description: Yes **Summary**: The text provides an analysis of vulnerability trends based on CVE and CWE data from October 2023 to September 2024. It highlights that a significant number of developers still hardcode credentials…

  • Hacker News: Ancient Monkey: Pwning a 17-Year-Old Version of SpiderMonkey

    Source URL: https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/ Source: Hacker News Title: Ancient Monkey: Pwning a 17-Year-Old Version of SpiderMonkey Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant vulnerability found in the Zscaler enterprise VPN solution, particularly linked to the pacparser library and its use of an outdated version of the SpiderMonkey JavaScript engine.…