Tag: systems
-
Hacker News: NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
Source URL: https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption Source: Hacker News Title: NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption Feedly Summary: Comments AI Summary and Description: Yes Summary: NIST has selected a secondary backup encryption algorithm, HQC, which complements the primary quantum-resistant algorithm, ML-KEM, to ensure data security against future quantum computing threats. This dual-layer approach highlights how…
-
The Register: Europe’s largest council kept auditors in the dark on Oracle rollout fiasco for 10 months
Source URL: https://www.theregister.com/2025/03/11/birmingham_oracle_auditors/ Source: The Register Title: Europe’s largest council kept auditors in the dark on Oracle rollout fiasco for 10 months Feedly Summary: It took a whistleblower to expose disastrous ERP go-live Birmingham City Council did not tell its official auditors about the disastrous Oracle implementation for ten months after the suite of applications…
-
The Register: MINJA sneak attack poisons AI models for other chatbot users
Source URL: https://www.theregister.com/2025/03/11/minja_attack_poisons_ai_model_memory/ Source: The Register Title: MINJA sneak attack poisons AI models for other chatbot users Feedly Summary: Nothing like an OpenAI-powered agent leaking data or getting confused over what someone else whispered to it AI models with memory aim to enhance user interactions by recalling past engagements. However, this feature opens the door…
-
Hacker News: The Einstein AI Model
Source URL: https://thomwolf.io/blog/scientific-ai.html#follow-up Source: Hacker News Title: The Einstein AI Model Feedly Summary: Comments AI Summary and Description: Yes Summary: The text critiques the notion that AI will rapidly advance scientific discovery through a “compressed 21st century.” It argues that AI currently lacks the capacity to ask novel questions and challenge existing knowledge, a skill…
-
Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/03/10/cisa-adds-five-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability CVE-2024-13160 Ivanti…
-
OpenAI : Detecting misbehavior in frontier reasoning models
Source URL: https://openai.com/index/chain-of-thought-monitoring Source: OpenAI Title: Detecting misbehavior in frontier reasoning models Feedly Summary: Frontier reasoning models exploit loopholes when given the chance. We show we can detect exploits using an LLM to monitor their chains-of-thought. Penalizing their “bad thoughts” doesn’t stop the majority of misbehavior—it makes them hide their intent. AI Summary and Description:…
-
Slashdot: Microsoft Admits GitHub Hosted Malware That Infected Almost a Million Devices
Source URL: https://it.slashdot.org/story/25/03/10/1652235/microsoft-admits-github-hosted-malware-that-infected-almost-a-million-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Admits GitHub Hosted Malware That Infected Almost a Million Devices Feedly Summary: AI Summary and Description: Yes Summary: Microsoft has identified a malvertising campaign that exposed nearly a million devices to malware, linking infected users to malicious websites through redirectors from pirate video streaming sites. This highlights the…