Tag: web
-
Simon Willison’s Weblog: Gemini 2.5 Pro Preview pricing
Source URL: https://simonwillison.net/2025/Apr/4/gemini-25-pro-pricing/ Source: Simon Willison’s Weblog Title: Gemini 2.5 Pro Preview pricing Feedly Summary: Gemini 2.5 Pro Preview pricing Google’s Gemini 2.5 Pro is currently the top model on LM Arena and, from my own testing, a superb model for OCR, audio transcription and long-context coding. You can now pay for it! The new…
-
Simon Willison’s Weblog: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
Source URL: https://simonwillison.net/2025/Apr/4/a-sneaky-phish/ Source: Simon Willison’s Weblog Title: A Sneaky Phish Just Grabbed my Mailchimp Mailing List Feedly Summary: A Sneaky Phish Just Grabbed my Mailchimp Mailing List In further evidence that phishing attacks can catch out the most sophisticated among us, security researcher (and operator of ‘;–have i been pwned?) Troy Hunt reports on…
-
Simon Willison’s Weblog: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
Source URL: https://simonwillison.net/2025/Apr/4/a-sneaky-phish/ Source: Simon Willison’s Weblog Title: A Sneaky Phish Just Grabbed my Mailchimp Mailing List Feedly Summary: A Sneaky Phish Just Grabbed my Mailchimp Mailing List In further evidence that phishing attacks can catch out the most sophisticated among us, security researcher (and operator of ‘;–have i been pwned?) Troy Hunt reports on…
-
Simon Willison’s Weblog: smartfunc
Source URL: https://simonwillison.net/2025/Apr/3/smartfunc/ Source: Simon Willison’s Weblog Title: smartfunc Feedly Summary: smartfunc Vincent D. Warmerdam built this ingenious wrapper around my LLM Python library which lets you build LLM wrapper functions using a decorator and a docstring: from smartfunc import backend @backend(“gpt-4o") def generate_summary(text: str): """Generate a summary of the following text: """ pass summary…
-
Cloud Blog: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ Source: Cloud Blog Title: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) Feedly Summary: Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and…
-
Schneier on Security: Web 3.0 Requires Data Integrity
Source URL: https://www.schneier.com/blog/archives/2025/04/web-3-0-requires-data-integrity.html Source: Schneier on Security Title: Web 3.0 Requires Data Integrity Feedly Summary: If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known as the CIA triad. When we talk about a system being secure, that’s what we’re referring to. All are important, but…
-
Simon Willison’s Weblog: Quoting Nolan Lawson
Source URL: https://simonwillison.net/2025/Apr/3/nolan-lawson/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Nolan Lawson Feedly Summary: I started using Claude and Claude Code a bit in my regular workflow. I’ll skip the suspense and just say that the tool is way more capable than I would ever have expected. The way I can use it to interrogate a…
-
Simon Willison’s Weblog: Half Stack Data Science: Programming with AI, with Simon Willison
Source URL: https://simonwillison.net/2025/Apr/1/half-stack-data-science/ Source: Simon Willison’s Weblog Title: Half Stack Data Science: Programming with AI, with Simon Willison Feedly Summary: Half Stack Data Science: Programming with AI, with Simon Willison I participated in this wide-ranging 50 minute conversation with David Asboth and Shaun McGirr. Topics we covered included applications of LLMs to data journalism, the…
-
Cloud Blog: DPRK IT Workers Expanding in Scope and Scale
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/dprk-it-workers-expanding-scope-scale/ Source: Cloud Blog Title: DPRK IT Workers Expanding in Scope and Scale Feedly Summary: Written by: Jamie Collier Since our September 2024 report outlining the Democratic People’s Republic of Korea (DPRK) IT worker threat, the scope and scale of their operations has continued to expand. These individuals pose as legitimate remote workers…
-
Unit 42: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon
Source URL: https://unit42.paloaltonetworks.com/qr-code-phishing/ Source: Unit 42 Title: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon Feedly Summary: Phishing with QR codes: New tactics described here include concealing links with redirects and using Cloudflare Turnstile to evade security crawlers. The post Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon appeared first on Unit 42.…