Tag: software

  • Schneier on Security: Apple’s New Memory Integrity Enforcement

    Source URL: https://www.schneier.com/blog/archives/2025/09/apples-new-memory-integrity-enforcement.html Source: Schneier on Security Title: Apple’s New Memory Integrity Enforcement Feedly Summary: Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use to get unauthorized system access. From Wired: In recent years, a movement…

  • Simon Willison’s Weblog: CompileBench: Can AI Compile 22-year-old Code?

    Source URL: https://simonwillison.net/2025/Sep/22/compilebench/ Source: Simon Willison’s Weblog Title: CompileBench: Can AI Compile 22-year-old Code? Feedly Summary: CompileBench: Can AI Compile 22-year-old Code? Interesting new LLM benchmark from Piotr Grabowski and Piotr Migdał: how well can different models handle compilation challenges such as cross-compiling gucr for ARM64 architecture? This is one of my favorite applications of…

  • Cloud Blog: Introducing the DORA AI Capabilities Model: 7 keys to succeeding in AI-assisted software development

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/introducing-doras-inaugural-ai-capabilities-model/ Source: Cloud Blog Title: Introducing the DORA AI Capabilities Model: 7 keys to succeeding in AI-assisted software development Feedly Summary: Artificial intelligence is rapidly transforming software development. But simply adopting AI tools isn’t a guarantee of success. Across the industry, tech leaders and developers are asking the same critical questions: How do…

  • Slashdot: Secure Software Supply Chains, Urges Former Go Lead Russ Cox

    Source URL: https://developers.slashdot.org/story/25/09/21/0650219/secure-software-supply-chains-urges-former-go-lead-russ-cox?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Secure Software Supply Chains, Urges Former Go Lead Russ Cox Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the critical need for enhancing software supply chain security, particularly in the face of ongoing vulnerabilities. It outlines practical solutions, such as adopting software signatures and reproducible builds,…

  • Slashdot: Cyberattack Delays Flights at Several of Europe’s Major Airports

    Source URL: https://tech.slashdot.org/story/25/09/20/2119232/cyberattack-delays-flights-at-several-of-europes-major-airports?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Cyberattack Delays Flights at Several of Europe’s Major Airports Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a cyberattack that disrupted check-in and boarding systems across several major European airports, exposing vulnerabilities in these security systems. Despite limited impact on travelers, the incident highlights the ongoing…

  • Slashdot: Self-Replicating Worm Affected Several Hundred NPM Packages, Including CrowdStrike’s

    Source URL: https://it.slashdot.org/story/25/09/20/0542237/self-replicating-worm-affected-several-hundred-npm-packages-including-crowdstrikes Source: Slashdot Title: Self-Replicating Worm Affected Several Hundred NPM Packages, Including CrowdStrike’s Feedly Summary: AI Summary and Description: Yes Summary: The Shai-Hulud malware campaign has affected numerous npm packages, including those maintained by CrowdStrike, via the injection of malicious scripts designed to steal developer credentials and exfiltrate sensitive information. The campaign highlights…

  • Simon Willison’s Weblog: httpjail

    Source URL: https://simonwillison.net/2025/Sep/19/httpjail/#atom-everything Source: Simon Willison’s Weblog Title: httpjail Feedly Summary: httpjail Here’s a promising new (experimental) project in the sandboxing space from Ammar Bandukwala at Coder. httpjail provides a Rust CLI tool for running an individual process against a custom configured HTTP proxy. The initial goal is to help run coding agents like Claude…

  • Simon Willison’s Weblog: The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration

    Source URL: https://simonwillison.net/2025/Sep/19/notion-lethal-trifecta/ Source: Simon Willison’s Weblog Title: The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration Feedly Summary: The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration Abi Raghuram reports that Notion 3.0, released yesterday, introduces new prompt injection data exfiltration vulnerabilities…

  • The Register: Ivanti EPMM holes let miscreants plant shady listeners, CISA says

    Source URL: https://www.theregister.com/2025/09/19/cisa_ivanti_bugs_exploited/ Source: The Register Title: Ivanti EPMM holes let miscreants plant shady listeners, CISA says Feedly Summary: Unnamed org compromised with two malware sets An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed organization, according to the US…

  • Cloud Blog: Strengthen GCE and GKE security with new dashboards powered by Security Command Center

    Source URL: https://cloud.google.com/blog/products/identity-security/new-gce-and-gke-dashboards-strengthen-security-posture/ Source: Cloud Blog Title: Strengthen GCE and GKE security with new dashboards powered by Security Command Center Feedly Summary: As cloud infrastructure evolves, so should how you safeguard that technology. As part of our efforts to help you maintain a strong security posture, we’ve introduced powerful capabilities that can address some of…