Tag: systems

  • The Register: Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign

    Source URL: https://www.theregister.com/2025/09/27/rednovember_chinese_espionage/ Source: The Register Title: Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign Feedly Summary: Not to be confused with all the other reports of Chinese intruders on US networks that came to light this week RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the…

  • Slashdot: xAI Offers Grok To Federal Government For 42 Cents

    Source URL: https://yro.slashdot.org/story/25/09/26/197223/xai-offers-grok-to-federal-government-for-42-cents?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: xAI Offers Grok To Federal Government For 42 Cents Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a deal between xAI and the U.S. General Services Administration (GSA) to supply the Grok chatbot to federal agencies at a significantly reduced price, showcasing competition among AI companies.…

  • Slashdot: Chinese Hackers Breach US Software and Law Firms Amid Trade Fight

    Source URL: https://yro.slashdot.org/story/25/09/26/1836203/chinese-hackers-breach-us-software-and-law-firms-amid-trade-fight?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chinese Hackers Breach US Software and Law Firms Amid Trade Fight Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated hacking campaign by suspected Chinese hackers targeting US software developers and law firms, as reported by cybersecurity firm Mandiant. The implications for cloud computing security…

  • Simon Willison’s Weblog: How to stop AI’s “lethal trifecta”

    Source URL: https://simonwillison.net/2025/Sep/26/how-to-stop-ais-lethal-trifecta/ Source: Simon Willison’s Weblog Title: How to stop AI’s “lethal trifecta” Feedly Summary: How to stop AI’s “lethal trifecta” This is the second mention of the lethal trifecta in the Economist in just the last week! Their earlier coverage was Why AI systems may never be secure on September 22nd – I…

  • The Cloudflare Blog: Code Mode: the better way to use MCP

    Source URL: https://blog.cloudflare.com/code-mode/ Source: The Cloudflare Blog Title: Code Mode: the better way to use MCP Feedly Summary: It turns out we’ve all been using MCP wrong. Most agents today use MCP by exposing the “tools" directly to the LLM. AI Summary and Description: Yes Summary: The text discusses a novel implementation of the Model…

  • Slashdot: Meta Launches Vibes, an Endless Feed of AI Slop for Your Viewing Displeasure

    Source URL: https://tech.slashdot.org/story/25/09/26/1344237/meta-launches-vibes-an-endless-feed-of-ai-slop-for-your-viewing-displeasure?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Meta Launches Vibes, an Endless Feed of AI Slop for Your Viewing Displeasure Feedly Summary: AI Summary and Description: Yes Summary: Meta’s launch of Vibes signifies a step forward in the market of AI-generated content, focusing on user interactivity and personalization within its platform. This development is particularly relevant…

  • The Register: LockBit’s new variant is ‘most dangerous yet,’ hitting Windows, Linux and VMware ESXi

    Source URL: https://www.theregister.com/2025/09/26/lockbits_new_variant_is_most/ Source: The Register Title: LockBit’s new variant is ‘most dangerous yet,’ hitting Windows, Linux and VMware ESXi Feedly Summary: Operation Cronos didn’t kill LockBit – it just came back meaner Trend Micro has sounded the alarm over the new LockBit 5.0 ransomware strain, which it warns is “significantly more dangerous" than past…

  • The Register: ‘An attacker’s playground:’ Crims exploit GoAnywhere perfect-10 bug

    Source URL: https://www.theregister.com/2025/09/26/an_apts_playground_goanywhere_perfect10/ Source: The Register Title: ‘An attacker’s playground:’ Crims exploit GoAnywhere perfect-10 bug Feedly Summary: Researchers say tens of thousands of instances remain publicly reachable Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra’s GoAnywhere managed file transfer (MFT), and chastised the vendor for a lack of transparency.……

  • Docker: The Trust Paradox: When Your AI Gets Catfished

    Source URL: https://www.docker.com/blog/mcp-prompt-injection-trust-paradox/ Source: Docker Title: The Trust Paradox: When Your AI Gets Catfished Feedly Summary: The fundamental challenge with MCP-enabled attacks isn’t technical sophistication. It’s that hackers have figured out how to catfish your AI. These attacks work because they exploit the same trust relationships that make your development team actually functional. When your…

  • The Register: Prompt injection – and a $5 domain – trick Salesforce Agentforce into leaking sales

    Source URL: https://www.theregister.com/2025/09/26/salesforce_agentforce_forceleak_attack/ Source: The Register Title: Prompt injection – and a $5 domain – trick Salesforce Agentforce into leaking sales Feedly Summary: More fun with AI agents and their security holes A now-fixed flaw in Salesforce’s Agentforce could have allowed external attackers to steal sensitive customer data via prompt injection, according to security researchers…