Tag: source code

  • The Register: Scumbag puts ‘stolen’ Nokia source code, SSH and RSA keys, more up for sale

    Source URL: https://www.theregister.com/2024/11/06/nokia_data_theft/ Source: The Register Title: Scumbag puts ‘stolen’ Nokia source code, SSH and RSA keys, more up for sale Feedly Summary: Data pinched from pwned outside supplier, thief says IntelBroker, a notorious peddler of stolen data, claims to have pilfered source code, private keys, and other sensitive materials belonging to Nokia.… AI Summary…

  • Schneier on Security: AIs Discovering Vulnerabilities

    Source URL: https://www.schneier.com/blog/archives/2024/11/ais-discovering-vulnerabilities.html Source: Schneier on Security Title: AIs Discovering Vulnerabilities Feedly Summary: I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in between. The AIs aren’t very…

  • Simon Willison’s Weblog: Nous Hermes 3

    Source URL: https://simonwillison.net/2024/Nov/4/nous-hermes-3/#atom-everything Source: Simon Willison’s Weblog Title: Nous Hermes 3 Feedly Summary: Nous Hermes 3 The Nous Hermes family of fine-tuned models have a solid reputation. Their most recent release came out in August, based on Meta’s Llama 3.1: Our training data aggressively encourages the model to follow the system and instruction prompts exactly…

  • Hacker News: Writing Secure Go Code

    Source URL: https://jarosz.dev/article/writing-secure-go-code/ Source: Hacker News Title: Writing Secure Go Code Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a comprehensive guide on best practices for writing secure Go code. It emphasizes the importance of keeping Go versions updated, utilizing static code analyzers, checking for known vulnerabilities, and implementing best practices…

  • Slashdot: New ‘Open Source AI Definition’ Criticized for Not Opening Training Data

    Source URL: https://news.slashdot.org/story/24/11/03/0257241/new-open-source-ai-definition-criticized-for-not-opening-training-data?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: New ‘Open Source AI Definition’ Criticized for Not Opening Training Data Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the controversy surrounding the newly-released Open Source AI definition, which some believe undermines traditional open-source principles by allowing certain proprietary practices around training data. The concerns raised…

  • Cloud Blog: PyTorch/XLA 2.5: vLLM support and an improved developer experience

    Source URL: https://cloud.google.com/blog/products/ai-machine-learning/whats-new-with-pytorchxla-2-5/ Source: Cloud Blog Title: PyTorch/XLA 2.5: vLLM support and an improved developer experience Feedly Summary: Machine learning engineers are bullish on PyTorch/XLA, a Python package that uses the XLA deep learning compiler to connect the PyTorch deep learning framework and Cloud TPUs. And now, PyTorch/XLA 2.5 is here, along with a set…

  • Cloud Blog: Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-10-ways-to-make-cyber-physical-systems-more-resilient/ Source: Cloud Blog Title: Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient Feedly Summary: Welcome to the second Cloud CISO Perspectives for October 2024. Today, Anton Chuvakin, senior security consultant for our Office of the CISO, offers 10 leading indicators to improve cyber-physical systems, guided by our analysis of…

  • The Register: Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

    Source URL: https://www.theregister.com/2024/10/29/belgian_cops_arrest_two_suspected/ Source: The Register Title: Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting Feedly Summary: US also charges an alleged Redline dev, no mention of an arrest International law enforcement officials have arrested two individuals and charged another in connection with the use and distribution of the Redline and Meta…

  • The Register: Dutch cops pwn the Redline and Meta infostealers, leak ‘VIP’ aliases

    Source URL: https://www.theregister.com/2024/10/28/dutch_cops_pwn_the_redline/ Source: The Register Title: Dutch cops pwn the Redline and Meta infostealers, leak ‘VIP’ aliases Feedly Summary: Legal proceedings underway with more details to follow Dutch police (Politie) say they’ve dismantled the servers powering the Redline and Meta infostealers – two key tools in a modern cyber crook’s arsenal.… AI Summary and…

  • Simon Willison’s Weblog: llm-whisper-api

    Source URL: https://simonwillison.net/2024/Oct/27/llm-whisper-api/#atom-everything Source: Simon Willison’s Weblog Title: llm-whisper-api Feedly Summary: llm-whisper-api I wanted to run an experiment through the OpenAI Whisper API this morning so I knocked up a very quick plugin for LLM that provides the following interface: llm install llm-whisper-api llm whisper-api myfile.mp3 It uses the API key that you previously configured…