Tag: security researchers

  • The Register: Today’s LLMs craft exploits from patches at lightning speed

    Source URL: https://www.theregister.com/2025/04/21/ai_models_can_generate_exploit/ Source: The Register Title: Today’s LLMs craft exploits from patches at lightning speed Feedly Summary: Erlang? Er, man, no problem. ChatGPT, Claude to go from flaw disclosure to actual attack code in hours The time from vulnerability disclosure to proof-of-concept (PoC) exploit code can now be as short as a few hours,…

  • Microsoft Security Blog: Microsoft’s Secure by Design journey: One year of success

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/04/17/microsofts-secure-by-design-journey-one-year-of-success/ Source: Microsoft Security Blog Title: Microsoft’s Secure by Design journey: One year of success Feedly Summary: Read about the initiatives Microsoft has undertaken over the past 18 months to support secure by design, secure by default, and secure in operations objectives as part of our SFI Initiative. The post Microsoft’s Secure by…

  • Slashdot: New Ubuntu Linux Security Bypasses Require Manual Mitigations

    Source URL: https://it.slashdot.org/story/25/03/29/0555241/new-ubuntu-linux-security-bypasses-require-manual-mitigations?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: New Ubuntu Linux Security Bypasses Require Manual Mitigations Feedly Summary: AI Summary and Description: Yes Summary: The text discusses significant security bypasses discovered in Ubuntu Linux that could allow local attackers to exploit kernel vulnerabilities. With the involvement of cloud security researchers from Qualys, it highlights the limitations in…

  • The Register: Malware in Lisp? Now you’re just being cruel

    Source URL: https://www.theregister.com/2025/03/29/malware_obscure_languages/ Source: The Register Title: Malware in Lisp? Now you’re just being cruel Feedly Summary: Miscreants warming to Delphi, Haskell, and the like to evade detection Malware authors looking to evade analysis are turning to less popular programming languages like Delphi or Haskell.… AI Summary and Description: Yes Summary: The text discusses a…

  • Slashdot: Again and Again, NSO Group’s Customers Keep Getting Their Spyware Operations Caught

    Source URL: https://yro.slashdot.org/story/25/03/28/1915238/again-and-again-nso-groups-customers-keep-getting-their-spyware-operations-caught Source: Slashdot Title: Again and Again, NSO Group’s Customers Keep Getting Their Spyware Operations Caught Feedly Summary: AI Summary and Description: Yes Summary: The report by Amnesty International highlights ongoing cyber threats faced by journalists, particularly from the NSO Group’s Pegasus spyware. The details emphasize the rising capability of security researchers to…

  • Hacker News: We hacked Google’s A.I Gemini and leaked its source code (at least some part)

    Source URL: https://www.landh.tech/blog/20250327-we-hacked-gemini-source-code/ Source: Hacker News Title: We hacked Google’s A.I Gemini and leaked its source code (at least some part) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the hacker team’s experience at the Google LLM bugSWAT event, focusing on their discovery of vulnerabilities in Google’s Gemini AI model. The…