Tag: injection

  • Hacker News: Listen to the whispers: web timing attacks that work

    Source URL: https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work Source: Hacker News Title: Listen to the whispers: web timing attacks that work Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text introduces novel web timing attack techniques capable of breaching server security by exposing hidden vulnerabilities, misconfigurations, and attack surfaces more effectively than previous methods. It emphasizes the practical…

  • Simon Willison’s Weblog: Notes from Bing Chat—Our First Encounter With Manipulative AI

    Source URL: https://simonwillison.net/2024/Nov/19/notes-from-bing-chat/#atom-everything Source: Simon Willison’s Weblog Title: Notes from Bing Chat—Our First Encounter With Manipulative AI Feedly Summary: A participated in an Ars Live conversation with Benj Edwards of Ars Technica today, talking about that wild period of LLM history last year when Microsoft launched Bing Chat and it instantly started misbehaving, gaslighting and…

  • Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/18/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability CVE-2024-9474 Palo Alto Networks PAN-OS…

  • Hacker News: Teen serial swatter-for-hire busted, pleads guilty, could face 20 years

    Source URL: https://www.theregister.com/2024/11/18/teenage_serial_swatterforhire_busted/ Source: Hacker News Title: Teen serial swatter-for-hire busted, pleads guilty, could face 20 years Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses various significant incidents in cybersecurity, including a teenager convicted of swatting, critical vulnerabilities in software, an ongoing debate regarding protections for cybersecurity researchers in international law,…

  • Hacker News: Garak, LLM Vulnerability Scanner

    Source URL: https://github.com/NVIDIA/garak Source: Hacker News Title: Garak, LLM Vulnerability Scanner Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text describes “garak,” a command-line vulnerability scanner specifically designed for large language models (LLMs). This tool aims to uncover various weaknesses in LLMs, such as hallucination, prompt injection attacks, and data leakage. Its development…

  • The Register: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit

    Source URL: https://www.theregister.com/2024/11/15/palo_alto_networks_firewall_zeroday/ Source: The Register Title: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit Feedly Summary: Yank access to management interface, stat A critical zero-day vulnerability in Palo Alto Networks’ firewall management interface that can allow an unauthenticated attacker to remotely execute code is now officially under active exploitation.… AI Summary and…

  • Blog | 0din.ai: Inyección de Prompts, el Camino a una Shell: Entorno de Contenedores de ChatGPT de OpenAI

    Source URL: https://0din.ai/blog/inyeccion-de-prompts-el-camino-a-una-shell-entorno-de-contenedores-de-chatgpt-de-openai Source: Blog | 0din.ai Title: Inyección de Prompts, el Camino a una Shell: Entorno de Contenedores de ChatGPT de OpenAI Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses a blog exploring the boundaries of OpenAI’s ChatGPT container environment. It reveals unexpected capabilities allowing users to interact with the model’s…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/14/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability CVE-2024-9465 Palo Alto Networks Expedition SQL Injection Vulnerability These types of vulnerabilities are frequent…

  • The Register: Kids’ shoemaker Start-Rite trips over security again, spilling customer card info

    Source URL: https://www.theregister.com/2024/11/14/smartrite_breach/ Source: The Register Title: Kids’ shoemaker Start-Rite trips over security again, spilling customer card info Feedly Summary: Full details exposed, putting shoppers at serious risk of fraud Children’s shoemaker Start-Rite is dealing with a nasty “security incident" involving customer payment card details, its second significant lapse during the past eight years.… AI…

  • The Register: Five Eyes infosec agencies list 2024’s most exploited software flaws

    Source URL: https://www.theregister.com/2024/11/14/five_eyes_2024_top_vulnerabilities/ Source: The Register Title: Five Eyes infosec agencies list 2024’s most exploited software flaws Feedly Summary: Slack patching remains a problem – which is worrying as crooks increasingly target zero-day vulns The cyber security agencies of the UK, US, Canada, Australia, and New Zealand have issued their annual list of the 15…