Tag: security testing

  • Docker: From Hallucinations to Prompt Injection: Securing AI Workflows at Runtime

    Source URL: https://www.docker.com/blog/secure-ai-agents-runtime-security/ Source: Docker Title: From Hallucinations to Prompt Injection: Securing AI Workflows at Runtime Feedly Summary: How developers are embedding runtime security to safely build with AI agents Introduction: When AI Workflows Become Attack Surfaces The AI tools we use today are powerful, but also unpredictable and exploitable. You prompt an LLM and…

  • Slashdot: Boffins Build Automated Android Bug Hunting System

    Source URL: https://it.slashdot.org/story/25/09/05/196218/boffins-build-automated-android-bug-hunting-system?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Boffins Build Automated Android Bug Hunting System Feedly Summary: AI Summary and Description: Yes Summary: The text discusses an innovative AI-powered bug-hunting agent called A2, developed by researchers from Nanjing University and the University of Sydney. This agent aims to enhance vulnerability discovery in Android apps, achieving significantly higher…

  • OpenAI : GPT-5 bio bug bounty call

    Source URL: https://openai.com/gpt-5-bio-bug-bounty Source: OpenAI Title: GPT-5 bio bug bounty call Feedly Summary: OpenAI invites researchers to its Bio Bug Bounty. Test GPT-5’s safety with a universal jailbreak prompt and win up to $25,000. AI Summary and Description: Yes Summary: OpenAI’s initiative invites researchers to participate in its Bio Bug Bounty program, focusing on testing…

  • The Register: GitHub engineer claims team was ‘coerced’ to put Grok into Copilot

    Source URL: https://www.theregister.com/2025/08/29/github_deepens_ties_with_elon/ Source: The Register Title: GitHub engineer claims team was ‘coerced’ to put Grok into Copilot Feedly Summary: Platform’s staffer complains security review was ‘rushed’ Microsoft-owned collaborative coding platform GitHub is deepening its ties with Elon Musk’s xAI, bringing early access to the company’s Grok Code Fast 1 large language model (LLM) into…

  • Embrace The Red: AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2025/aws-kiro-aribtrary-command-execution-with-indirect-prompt-injection/ Source: Embrace The Red Title: AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection Feedly Summary: On the day AWS Kiro was released, I couldn’t resist putting it through some of my Month of AI Bugs security tests for coding agents. AWS Kiro was vulnerable to arbitrary command execution via indirect prompt…

  • Slashdot: Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ For Enterprise

    Source URL: https://it.slashdot.org/story/25/08/08/2113251/red-teams-jailbreak-gpt-5-with-ease-warn-its-nearly-unusable-for-enterprise?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ For Enterprise Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant security vulnerabilities in the newly released GPT-5 model, noting that it was easily jailbroken within a short timeframe. The results from different red teaming efforts…

  • Embrace The Red: Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)

    Source URL: https://embracethered.com/blog/posts/2025/cursor-data-exfiltration-with-mermaid/ Source: Embrace The Red Title: Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132) Feedly Summary: Cursor is a popular AI code editor. In this post I want to share how I found an interesting data exfiltration issue, the demo exploits built and how it got fixed. When using Cursor I noticed that…

  • Anchore:  Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps

    Source URL: https://webinars.techstronglearning.com/accelerate-secure-optimizing-your-software-supply-chain-with-devsecops Source: Anchore Title:  Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps Feedly Summary: The post  Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps appeared first on Anchore. AI Summary and Description: Yes Summary: The text discusses optimizing the software supply chain using DevSecOps practices, emphasizing the importance of…

  • Cloud Blog: Your guide to Google Cloud Security at Black Hat USA 2025

    Source URL: https://cloud.google.com/blog/products/identity-security/your-guide-to-google-cloud-security-at-black-hat-usa-2025/ Source: Cloud Blog Title: Your guide to Google Cloud Security at Black Hat USA 2025 Feedly Summary: At Google Cloud Security, our mission is to empower organizations to strengthen their defenses with innovative security capabilities, all while simplifying and modernizing their cybersecurity. In a world of evolving threats and increasing complexity, we…