Tag: systems
-
Embrace The Red: Google Jules is Vulnerable To Invisible Prompt Injection
Source URL: https://embracethered.com/blog/posts/2025/google-jules-invisible-prompt-injection/ Source: Embrace The Red Title: Google Jules is Vulnerable To Invisible Prompt Injection Feedly Summary: The latest Gemini models quite reliably interpret hidden Unicode Tag characters as instructions. This vulnerability, first reported to Google over a year ago, has not been mitigated at the model or API level, hence now affects all…
-
Cisco Talos Blog: UAT-7237 targets Taiwanese web hosting infrastructure
Source URL: https://blog.talosintelligence.com/uat-7237-targets-web-hosting-infra/ Source: Cisco Talos Blog Title: UAT-7237 targets Taiwanese web hosting infrastructure Feedly Summary: Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918. AI Summary and Description: Yes Summary: The text discusses the activities of UAT-7237, a Chinese-speaking advanced persistent…
-
The Register: Telco giant Colt suffers attack, takes systems offline
Source URL: https://www.theregister.com/2025/08/15/london_telco_colts_services_disrupted/ Source: The Register Title: Telco giant Colt suffers attack, takes systems offline Feedly Summary: London-based multinational takes customer portal and Voice API platform offline as ‘protective measure’ following breach Multinational telco Colt Technology Services says a “cyber incident" is to blame for its customer portal and other services being down for a…
-
The Register: LLM chatbots trivial to weaponise for data theft, say boffins
Source URL: https://www.theregister.com/2025/08/15/llm_chatbots_trivial_to_weaponise/ Source: The Register Title: LLM chatbots trivial to weaponise for data theft, say boffins Feedly Summary: System prompt engineering turns benign AI assistants into ‘investigator’ and ‘detective’ roles that bypass privacy guardrails A team of boffins is warning that AI chatbots built on large language models (LLM) can be tuned into malicious…
-
The Cloudflare Blog: MadeYouReset: An HTTP/2 vulnerability thwarted by Rapid Reset mitigations
Source URL: https://blog.cloudflare.com/madeyoureset-an-http-2-vulnerability-thwarted-by-rapid-reset-mitigations/ Source: The Cloudflare Blog Title: MadeYouReset: An HTTP/2 vulnerability thwarted by Rapid Reset mitigations Feedly Summary: A new HTTP/2 denial-of-service (DoS) vulnerability called MadeYouReset was recently disclosed by security researchers. Cloudflare HTTP DDoS mitigation, already protects from MadeYouReset. AI Summary and Description: Yes Summary: The text discusses a newly identified HTTP/2 DoS…
-
The Register: Forget Foxconn the iPhone factory. AI’s made it a server-slinger first and foremost
Source URL: https://www.theregister.com/2025/08/15/foxconn_q2_2025/ Source: The Register Title: Forget Foxconn the iPhone factory. AI’s made it a server-slinger first and foremost Feedly Summary: Next: Modular datacenters ready to host rack-scale systems, to meet endless demand Manufacturer to the stars Foxconn is building so many AI servers that they’re now bringing in more cash than consumer electronics…
-
Slashdot: Russian Hackers Seized Control of Norwegian Dam, Spy Chief Says
Source URL: https://it.slashdot.org/story/25/08/14/232228/russian-hackers-seized-control-of-norwegian-dam-spy-chief-says?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Russian Hackers Seized Control of Norwegian Dam, Spy Chief Says Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a recent cyber-attack attributed to Russian hackers, who gained control over a Norwegian hydropower dam. This incident highlights increasing cybersecurity threats from pro-Russian actors aimed at instilling fear…
-
The Register: Ransomware crews don’t care about your endpoint security – they’ve already killed it
Source URL: https://www.theregister.com/2025/08/14/edr_killers_ransomware/ Source: The Register Title: Ransomware crews don’t care about your endpoint security – they’ve already killed it Feedly Summary: Some custom malware, some legit software tools At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on…
-
The Register: Dodgy Huawei chips nearly sunk DeepSeek’s next-gen R2 model
Source URL: https://www.theregister.com/2025/08/14/dodgy_huawei_deepseek/ Source: The Register Title: Dodgy Huawei chips nearly sunk DeepSeek’s next-gen R2 model Feedly Summary: Chinese AI model dev still plans to use homegrown silicon for inferencing Unhelpful Huawei AI chips are reportedly why Chinese model dev DeepSeek’s next-gen LLMs are taking so long.… AI Summary and Description: Yes Summary: The text…