Tag: SUSE

  • The Register: Biased bots: AI hiring managers shortlist candidates with AI resumes

    Source URL: https://www.theregister.com/2025/09/03/ai_hiring_biased/ Source: The Register Title: Biased bots: AI hiring managers shortlist candidates with AI resumes Feedly Summary: When AI runs recruiting, the winning move is using the same bot Job seekers who use the same AI model to compose their resumes as the AI model used to evaluate their application are more likely…

  • The Cloudflare Blog: AI Week 2025: Recap

    Source URL: https://blog.cloudflare.com/ai-week-2025-wrapup/ Source: The Cloudflare Blog Title: AI Week 2025: Recap Feedly Summary: How do we embrace the power of AI without losing control? That was one of our big themes for AI Week 2025. Check out all of the products, partnerships, and features we announced. AI Summary and Description: Yes **Summary:** The text…

  • Schneier on Security: Indirect Prompt Injection Attacks Against LLM Assistants

    Source URL: https://www.schneier.com/blog/archives/2025/09/indirect-prompt-injection-attacks-against-llm-assistants.html Source: Schneier on Security Title: Indirect Prompt Injection Attacks Against LLM Assistants Feedly Summary: Really good research on practical attacks against LLM agents. “Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous” Abstract: The growing integration of LLMs into applications has introduced new security risks,…

  • Unit 42: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust

    Source URL: https://unit42.paloaltonetworks.com/model-namespace-reuse/ Source: Unit 42 Title: Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust Feedly Summary: Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution. The post Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model…

  • The Register: Internet mapping and research tool Censys reveals state-based abuse, harassment

    Source URL: https://www.theregister.com/2025/09/03/censys_abuse_sigcomm_paper/ Source: The Register Title: Internet mapping and research tool Censys reveals state-based abuse, harassment Feedly Summary: ‘Universities are being used to proxy offensive government operations, turning research access decisions political’ Censys Inc, vendor of the popular Censys internet-mapping tool, has revealed that state-based actors are trying to abuse its services by hiding…

  • Slashdot: Frostbyte10 Bugs Put Thousands of Refrigerators At Major Grocery Chains At Risk

    Source URL: https://it.slashdot.org/story/25/09/02/209250/frostbyte10-bugs-put-thousands-of-refrigerators-at-major-grocery-chains-at-risk?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Frostbyte10 Bugs Put Thousands of Refrigerators At Major Grocery Chains At Risk Feedly Summary: AI Summary and Description: Yes Summary: The text discusses significant vulnerabilities in Copeland controllers, essential for managing refrigeration systems used by large supermarkets and cold storage companies. Identified as Frostbyte10, these flaws risk causing severe…

  • Unit 42: Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances

    Source URL: https://unit42.paloaltonetworks.com/threat-brief-compromised-salesforce-instances/ Source: Unit 42 Title: Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances Feedly Summary: This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials. The post Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances appeared first on Unit 42.…

  • NCSC Feed: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards

    Source URL: https://www.ncsc.gov.uk/blog-post/from-bugs-to-bypasses-adapting-vulnerability-disclosure-for-ai-safeguards Source: NCSC Feed Title: From bugs to bypasses: adapting vulnerability disclosure for AI safeguards Feedly Summary: Exploring how far cyber security approaches can help mitigate risks in generative AI systems AI Summary and Description: Yes Summary: The text addresses the intersection of cybersecurity strategies and generative AI systems, highlighting how established cybersecurity…

  • Cisco Security Blog: Detecting Exposed LLM Servers: A Shodan Case Study on Ollama

    Source URL: https://feedpress.me/link/23535/17131153/detecting-exposed-llm-servers-shodan-case-study-on-ollama Source: Cisco Security Blog Title: Detecting Exposed LLM Servers: A Shodan Case Study on Ollama Feedly Summary: We uncovered 1,100+ exposed Ollama LLM servers—20% with open models—revealing critical security gaps and the need for better LLM threat monitoring. AI Summary and Description: Yes Summary: The text highlights the discovery of over 1,100…

  • Slashdot: OpenAI Is Scanning Users’ ChatGPT Conversations and Reporting Content To Police

    Source URL: https://yro.slashdot.org/story/25/08/31/2311231/openai-is-scanning-users-chatgpt-conversations-and-reporting-content-to-police Source: Slashdot Title: OpenAI Is Scanning Users’ ChatGPT Conversations and Reporting Content To Police Feedly Summary: AI Summary and Description: Yes Summary: The text highlights OpenAI’s controversial practice of monitoring user conversations in ChatGPT for threats, revealing significant security and privacy implications. This admission raises questions about the balance between safety and…