Tag: vulnerabilities

  • The Register: CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands

    Source URL: https://www.theregister.com/2025/07/07/citrixbleed_2_exploits/ Source: The Register Title: CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands Feedly Summary: NetScaler vendor issued a patch but otherwise, stony silence Multiple exploits are circulating for CVE-2025-5777, a critical bug in Citrix NetScaler ADC and NetScaler Gateway dubbed CitrixBleed 2, and security analysts…

  • The Register: Ingram Micro confirms ransomware behind multi-day outage

    Source URL: https://www.theregister.com/2025/07/06/ingram_micro_confirms_ransomware_behind/ Source: The Register Title: Ingram Micro confirms ransomware behind multi-day outage Feedly Summary: SafePay crew claims responsibility for intrusion at one of world’s largest tech distributors Ingram Micro, one of the world’s largest distributors, has confirmed it is trying to restore systems following a ransomware attack.… AI Summary and Description: Yes Summary:…

  • Simon Willison’s Weblog: Supabase MCP can leak your entire SQL database

    Source URL: https://simonwillison.net/2025/Jul/6/supabase-mcp-lethal-trifecta/#atom-everything Source: Simon Willison’s Weblog Title: Supabase MCP can leak your entire SQL database Feedly Summary: Supabase MCP can leak your entire SQL database Here’s yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data…

  • Slashdot: Microsoft Open Sources Copilot Chat for VS Code on GitHub

    Source URL: https://developers.slashdot.org/story/25/07/05/1935203/microsoft-open-sources-copilot-chat-for-vs-code-on-github Source: Slashdot Title: Microsoft Open Sources Copilot Chat for VS Code on GitHub Feedly Summary: AI Summary and Description: Yes Summary: Microsoft has open-sourced the GitHub Copilot Chat extension for VS Code, allowing developers to access its internal workings, including data handling and telemetry. This transparency is significant for security, as it…