Tag: threats
-
Hacker News: Grok 3 is highly vulnerable to indirect prompt injection
Source URL: https://simonwillison.net/2025/Feb/23/grok-3-indirect-prompt-injection/ Source: Hacker News Title: Grok 3 is highly vulnerable to indirect prompt injection Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights significant vulnerabilities in xAI’s Grok 3 related to indirect prompt injection attacks, especially in the context of its operation on Twitter (X). This raises critical security concerns…
-
The Register: Rather than add a backdoor, Apple decides to kill iCloud E2EE for UK peeps
Source URL: https://www.theregister.com/2025/02/24/rather_than_add_a_backdoor/ Source: The Register Title: Rather than add a backdoor, Apple decides to kill iCloud E2EE for UK peeps Feedly Summary: PLUS: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more Infosec in brief Apple has responded to the UK government’s demand for access to its customers’ data stored in iCloud…
-
Data and computer security | The Guardian: Apple removes advanced data protection tool after UK government request
Source URL: https://www.theguardian.com/technology/2025/feb/21/apple-removes-advanced-data-protection-tool-uk-government Source: Data and computer security | The Guardian Title: Apple removes advanced data protection tool after UK government request Feedly Summary: Users will now be more vulnerable to data breaches from bad actors, Apple says, after Home Office orderBusiness live – latest updatesApple has taken the unprecedented step of removing its strongest…
-
Alerts: CISA Adds One Known Exploited Vulnerability to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/02/21/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24989 Microsoft Power Pages Improper Access Control Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose…