Tag: size

  • Unit 42: Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth

    Source URL: https://unit42.paloaltonetworks.com/attackers-sell-your-bandwidth-using-sdks/ Source: Unit 42 Title: Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth Feedly Summary: A campaign leverages CVE-2024-36401 to stealthily monetize victims’ bandwidth where legitimate software development kits (SDKs) are deployed for passive income. The post Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth…

  • Embrace The Red: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-data-exfiltration-vulnerabilities/ Source: Embrace The Red Title: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets Feedly Summary: This is the first post in a series exploring security vulnerabilities in Windsurf. If you are unfamiliar with Windsurf, it is a fork of VS Code and the coding agent is called Windsurf Cascade. The attack vectors…

  • Simon Willison’s Weblog: Quoting Mustafa Suleyman

    Source URL: https://simonwillison.net/2025/Aug/21/mustafa-suleyman/ Source: Simon Willison’s Weblog Title: Quoting Mustafa Suleyman Feedly Summary: Simply put, my central worry is that many people will start to believe in the illusion of AIs as conscious entities so strongly that they’ll soon advocate for AI rights, model welfare and even AI citizenship. This development will be a dangerous…

  • Microsoft Security Blog: Quantum-safe security: Progress towards next-generation cryptography

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/08/20/quantum-safe-security-progress-towards-next-generation-cryptography/ Source: Microsoft Security Blog Title: Quantum-safe security: Progress towards next-generation cryptography Feedly Summary: Microsoft is proactively leading the transition to quantum-safe security by advancing post-quantum cryptography, collaborating with global standards bodies, and helping organizations prepare for the coming quantum era. The post Quantum-safe security: Progress towards next-generation cryptography appeared first on Microsoft…

  • Slashdot: Meta Freezes AI Hiring

    Source URL: https://tech.slashdot.org/story/25/08/21/0227208/meta-freezes-ai-hiring?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Meta Freezes AI Hiring Feedly Summary: AI Summary and Description: Yes Summary: Meta’s pause on hiring in its artificial intelligence division highlights a significant shift in their organizational strategy as they aim to refine their approach to developing superintelligence. This is particularly relevant for professionals in AI and organizational…

  • Slashdot: Harvard Dropouts To Launch ‘Always On’ AI Smart Glasses That Listen, Record Every Conversation

    Source URL: https://hardware.slashdot.org/story/25/08/20/2058229/harvard-dropouts-to-launch-always-on-ai-smart-glasses-that-listen-record-every-conversation?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Harvard Dropouts To Launch ‘Always On’ AI Smart Glasses That Listen, Record Every Conversation Feedly Summary: AI Summary and Description: Yes Summary: The launch of Halo X smart glasses represents an innovative leap in AI-powered wearable technology, capitalizing on continuous audio capture and real-time information delivery. This technology raises…

  • The Register: Amazon quietly fixed Q Developer flaws that made AI agent vulnerable to prompt injection, RCE

    Source URL: https://www.theregister.com/2025/08/20/amazon_quietly_fixed_q_developer_flaws/ Source: The Register Title: Amazon quietly fixed Q Developer flaws that made AI agent vulnerable to prompt injection, RCE Feedly Summary: Move along, nothing to see here Amazon has quietly fixed a couple of security issues in its coding agent: Amazon Q Developer VS Code extension. Attackers could use these vulns to…

  • The Register: Perplexity’s Comet browser naively processed pages with evil instructions

    Source URL: https://www.theregister.com/2025/08/20/perplexity_comet_browser_prompt_injection/ Source: The Register Title: Perplexity’s Comet browser naively processed pages with evil instructions Feedly Summary: Rival Brave flags prompt injection vulnerability, now patched To the surprise of no one in the security industry, processing untrusted, unvalidated input is a bad idea.… AI Summary and Description: Yes Summary: The text discusses a recently…

  • The Register: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure

    Source URL: https://www.theregister.com/2025/08/20/russian_fsb_cyberspies_exploiting_cisco_bug/ Source: The Register Title: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure Feedly Summary: Snarfing up config files for ‘thousands’ of devices…just for giggles, we’re sure The FBI and security researchers today warned that Russian government spies exploited a seven-year-old bug in end-of-life Cisco networking devices…

  • Wired: Do Large Language Models Dream of AI Agents?

    Source URL: https://www.wired.com/story/sleeptime-compute-chatbots-memory/ Source: Wired Title: Do Large Language Models Dream of AI Agents? Feedly Summary: For AI models, knowing what to remember might be as important as knowing what to forget. Welcome to the era of “sleeptime compute.” AI Summary and Description: Yes Summary: The text introduces the concept of “sleeptime compute,” which emphasizes…