Tag: security

  • Simon Willison’s Weblog: gpt-image-1-mini

    Source URL: https://simonwillison.net/2025/Oct/6/gpt-image-1-mini/#atom-everything Source: Simon Willison’s Weblog Title: gpt-image-1-mini Feedly Summary: gpt-image-1-mini OpenAI released a new image model today: gpt-image-1-mini, which they describe as “A smaller image generation model that’s 80% less expensive than the large model." They released it very quietly – I didn’t hear about this in the DevDay keynote but I later…

  • Microsoft Security Blog: Inside Microsoft Threat Intelligence: Calm in the chaos

    Source URL: https://www.microsoft.com/en-us/security/security-insider/threat-landscape/inside-microsoft-threat-intelligence-calm-in-chaos#overview-video Source: Microsoft Security Blog Title: Inside Microsoft Threat Intelligence: Calm in the chaos Feedly Summary: Incident response is never orderly. Threat actors don’t wait. Environments are compromised. Data is missing. Confidence is shaken. But for Microsoft’s Incident Response (IR) team, that chaos is exactly where the work begins. The post Inside Microsoft…

  • Docker: Unlimited access to Docker Hardened Images: Because security should be affordable, always

    Source URL: https://www.docker.com/blog/unlimited-access-to-docker-hardened-images-because-security-should-be-affordable-always/ Source: Docker Title: Unlimited access to Docker Hardened Images: Because security should be affordable, always Feedly Summary: Every organization we speak with shares the same goal: to deliver software that is secure and free of CVEs. Near-zero CVEs is the ideal state. But achieving that ideal is harder than it sounds, because…

  • Simon Willison’s Weblog: GPT-5 pro

    Source URL: https://simonwillison.net/2025/Oct/6/gpt-5-pro/ Source: Simon Willison’s Weblog Title: GPT-5 pro Feedly Summary: GPT-5 pro Here’s OpenAI’s model documentation for their GPT-5 pro model, released to their API today at their DevDay event. It has similar base characteristics to GPT-5: both share a September 30, 2024 knowledge cutoff and 400,000 context limit. GPT-5 pro has maximum…

  • Slashdot: ChatGPT Now Has 800 Million Weekly Active Users

    Source URL: https://slashdot.org/story/25/10/06/1848254/chatgpt-now-has-800-million-weekly-active-users?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: ChatGPT Now Has 800 Million Weekly Active Users Feedly Summary: AI Summary and Description: Yes Summary: OpenAI’s CEO, Sam Altman, announced that ChatGPT has reached 800 million weekly active users, indicating significant adoption across various sectors, including consumers and enterprises. This growth underscores the rising demand for AI infrastructure…

  • OpenAI : Codex is now generally available

    Source URL: https://openai.com/index/codex-now-generally-available Source: OpenAI Title: Codex is now generally available Feedly Summary: OpenAI Codex is now generally available with powerful new features for developers: a Slack integration, Codex SDK, and admin tools like usage dashboards and workspace management—making Codex easier to use and manage at scale. AI Summary and Description: Yes Summary: The announcement…

  • The Register: Level-10 vuln lurking in Redis source code for 13 years could allow remote code execution

    Source URL: https://www.theregister.com/2025/10/06/perfect_10_redis_rce_lurking/ Source: The Register Title: Level-10 vuln lurking in Redis source code for 13 years could allow remote code execution Feedly Summary: No evidence of exploitation … yet A 13-year-old critical flaw in Redis servers, rated a perfect 10 out of 10 in severity, can let an authenticated user trigger remote code execution.……

  • Microsoft Security Blog: Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/ Source: Microsoft Security Blog Title: Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability Feedly Summary: Storm-1175, a financially motivated actor known for deploying Medusa ransomware and exploiting public-facing applications for initial access, was observed exploiting the deserialization vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035. We are publishing this…

  • Cloud Blog: 11 ways to reduce your Google Cloud compute costs today

    Source URL: https://cloud.google.com/blog/products/compute/cost-saving-strategies-when-migrating-to-google-cloud-compute/ Source: Cloud Blog Title: 11 ways to reduce your Google Cloud compute costs today Feedly Summary: As the saying goes, “a penny saved is a penny earned," and this couldn’t be more true when it comes to cloud infrastructure. In today’s competitive business landscape, you need to maintain the performance to meet…