Tag: security professionals

  • Simon Willison’s Weblog: deepseek-ai/DeepSeek-V3-0324

    Source URL: https://simonwillison.net/2025/Mar/24/deepseek/ Source: Simon Willison’s Weblog Title: deepseek-ai/DeepSeek-V3-0324 Feedly Summary: deepseek-ai/DeepSeek-V3-0324 Chinese AI lab DeepSeek just released the latest version of their enormous DeepSeek v3 model, baking the release date into the name DeepSeek-V3-0324. The license is MIT, the README is empty and the release adds up a to a total of 641 GB…

  • Schneier on Security: More Countries are Demanding Back-Doors to Encrypted Apps

    Source URL: https://www.schneier.com/blog/archives/2025/03/more-countries-are-demanding-back-doors-to-encrypted-apps.html Source: Schneier on Security Title: More Countries are Demanding Back-Doors to Encrypted Apps Feedly Summary: Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating mandating back doors. Both initiatives are attempting to scare people into…

  • Wired: The Quantum Apocalypse Is Coming. Be Very Afraid

    Source URL: https://www.wired.com/story/q-day-apocalypse-quantum-computers-encryption/ Source: Wired Title: The Quantum Apocalypse Is Coming. Be Very Afraid Feedly Summary: What happens when quantum computers can finally crack encryption and break into the world’s best-kept secrets? It’s called Q-Day—the worst holiday maybe ever. AI Summary and Description: Yes Summary: The text discusses the impending threat posed by the advent…

  • The Register: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns

    Source URL: https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/ Source: The Register Title: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns Feedly Summary: PLUS: Russian bug-buyers seeks Telegram flaws; Another WordPress security mess; NIST backlog grows; and more! Infosec In Brief Organized crime networks are now reliant on digital tech for most of their activities according…

  • Slashdot: How AI Coding Assistants Could Be Compromised Via Rules File

    Source URL: https://developers.slashdot.org/story/25/03/23/2138230/how-ai-coding-assistants-could-be-compromised-via-rules-file?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How AI Coding Assistants Could Be Compromised Via Rules File Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant security vulnerability in AI coding assistants like GitHub Copilot and Cursor, highlighting how malicious rule configuration files can be used to inject backdoors and vulnerabilities in…

  • The Register: Oracle Cloud says it’s not true someone broke into its login servers and stole data

    Source URL: https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/ Source: The Register Title: Oracle Cloud says it’s not true someone broke into its login servers and stole data Feedly Summary: Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information…

  • Hacker News: Next.js and the corrupt middleware: the authorizing artifact

    Source URL: https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware Source: Hacker News Title: Next.js and the corrupt middleware: the authorizing artifact Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a critical security vulnerability discovered in Next.js, a widely used JavaScript framework, specifically regarding its middleware functionality. The vulnerability allows unauthorized access by manipulating request headers, which could…