Tag: vulnerabilities

  • Simon Willison’s Weblog: Quoting Ai2

    Source URL: https://simonwillison.net/2025/Mar/13/ai2/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Ai2 Feedly Summary: Today we release OLMo 2 32B, the most capable and largest model in the OLMo 2 family, scaling up the OLMo 2 training recipe used for our 7B and 13B models released in November. It is trained up to 6T tokens and post-trained…

  • Simon Willison’s Weblog: Anthropic API: Text editor tool

    Source URL: https://simonwillison.net/2025/Mar/13/anthropic-api-text-editor-tool/ Source: Simon Willison’s Weblog Title: Anthropic API: Text editor tool Feedly Summary: Anthropic API: Text editor tool Anthropic released a new “tool" today for text editing. It looks similar to the tool they offered as part of their computer use beta API, and the trick they’ve been using for a while in…

  • Simon Willison’s Weblog: Introducing Command A: Max performance, minimal compute

    Source URL: https://simonwillison.net/2025/Mar/13/command-a/#atom-everything Source: Simon Willison’s Weblog Title: Introducing Command A: Max performance, minimal compute Feedly Summary: Introducing Command A: Max performance, minimal compute New LLM release from Cohere. It’s interesting to see which aspects of the model they’re highlighting, as an indicator of what their commercial customers value the most (highlight mine): Command A…

  • Rekt: 1Inch – Rekt

    Source URL: https://www.rekt.news/1inch-rekt Source: Rekt Title: 1Inch – Rekt Feedly Summary: One hacker transformed 1inch resolver contracts into a $5 million ATM through an integer underflow exploit – all with a negative 512 value. Attacker pocketed $450K as a “bounty" for exposing two years of an undetected vulnerability. AI Summary and Description: Yes Summary: This…

  • Cisco Talos Blog: Patch it up: Old vulnerabilities are everyone’s problems

    Source URL: https://blog.talosintelligence.com/patch-it-up-old-vulnerabilities-are-everyones-problems/ Source: Cisco Talos Blog Title: Patch it up: Old vulnerabilities are everyone’s problems Feedly Summary: Thorsten picks apart some headlines, highlights Talos’ report on an unknown attacker predominantly targeting Japan, and asks, “Where is the victim, and does it matter?” AI Summary and Description: Yes Summary: The text highlights critical security concerns…

  • Microsoft Security Blog: How MSRC coordinates vulnerability research and disclosure while building community

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/13/how-msrc-coordinates-vulnerability-research-and-disclosure-while-building-community/ Source: Microsoft Security Blog Title: How MSRC coordinates vulnerability research and disclosure while building community Feedly Summary: Learn about the Microsoft Security Response Center, which investigates vulnerabilities and releases security updates to help protect customers from cyberthreats. The post How MSRC coordinates vulnerability research and disclosure while building community appeared first on…

  • Microsoft Security Blog: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/ Source: Microsoft Security Blog Title: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware Feedly Summary: Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24201 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability CVE-2025-21590 Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability These types of vulnerabilities are…

  • Wired: Researchers Propose a Better Way to Report Dangerous AI Flaws

    Source URL: https://www.wired.com/story/ai-researchers-new-system-report-bugs/ Source: Wired Title: Researchers Propose a Better Way to Report Dangerous AI Flaws Feedly Summary: After identifying major flaws in popular AI models, researchers are pushing for a new system to identify and report bugs. AI Summary and Description: Yes Summary: The text discusses a critical security flaw discovered in OpenAI’s GPT-3.5…

  • The Register: CISA: We didn’t fire our red team, we just unhired a bunch of them

    Source URL: https://www.theregister.com/2025/03/13/cisa_red_team_layoffs/ Source: The Register Title: CISA: We didn’t fire our red team, we just unhired a bunch of them Feedly Summary: Agency tries to save face as it also pulls essential funding for election security initiatives The US cybersecurity agency is trying to save face by seeking to clear up what it’s calling…