Tag: web

  • Simon Willison’s Weblog: Gemini 2.5 Pro Preview pricing

    Source URL: https://simonwillison.net/2025/Apr/4/gemini-25-pro-pricing/ Source: Simon Willison’s Weblog Title: Gemini 2.5 Pro Preview pricing Feedly Summary: Gemini 2.5 Pro Preview pricing Google’s Gemini 2.5 Pro is currently the top model on LM Arena and, from my own testing, a superb model for OCR, audio transcription and long-context coding. You can now pay for it! The new…

  • Simon Willison’s Weblog: smartfunc

    Source URL: https://simonwillison.net/2025/Apr/3/smartfunc/ Source: Simon Willison’s Weblog Title: smartfunc Feedly Summary: smartfunc Vincent D. Warmerdam built this ingenious wrapper around my LLM Python library which lets you build LLM wrapper functions using a decorator and a docstring: from smartfunc import backend @backend(“gpt-4o") def generate_summary(text: str): """Generate a summary of the following text: """ pass summary…

  • Cloud Blog: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ Source: Cloud Blog Title: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) Feedly Summary: Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and…

  • Schneier on Security: Web 3.0 Requires Data Integrity

    Source URL: https://www.schneier.com/blog/archives/2025/04/web-3-0-requires-data-integrity.html Source: Schneier on Security Title: Web 3.0 Requires Data Integrity Feedly Summary: If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known as the CIA triad. When we talk about a system being secure, that’s what we’re referring to. All are important, but…

  • Simon Willison’s Weblog: Quoting Nolan Lawson

    Source URL: https://simonwillison.net/2025/Apr/3/nolan-lawson/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Nolan Lawson Feedly Summary: I started using Claude and Claude Code a bit in my regular workflow. I’ll skip the suspense and just say that the tool is way more capable than I would ever have expected. The way I can use it to interrogate a…

  • Simon Willison’s Weblog: Half Stack Data Science: Programming with AI, with Simon Willison

    Source URL: https://simonwillison.net/2025/Apr/1/half-stack-data-science/ Source: Simon Willison’s Weblog Title: Half Stack Data Science: Programming with AI, with Simon Willison Feedly Summary: Half Stack Data Science: Programming with AI, with Simon Willison I participated in this wide-ranging 50 minute conversation with David Asboth and Shaun McGirr. Topics we covered included applications of LLMs to data journalism, the…

  • Unit 42: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon

    Source URL: https://unit42.paloaltonetworks.com/qr-code-phishing/ Source: Unit 42 Title: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon Feedly Summary: Phishing with QR codes: New tactics described here include concealing links with redirects and using Cloudflare Turnstile to evade security crawlers. The post Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon appeared first on Unit 42.…