Tag: Sim

  • Simon Willison’s Weblog: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code

    Source URL: https://simonwillison.net/2024/Nov/1/from-naptime-to-big-sleep/#atom-everything Source: Simon Willison’s Weblog Title: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Feedly Summary: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Google’s Project Zero security team used a system based around Gemini 1.5 Pro to find…

  • Simon Willison’s Weblog: Claude API: PDF support (beta)

    Source URL: https://simonwillison.net/2024/Nov/1/claude-api-pdf-support-beta/#atom-everything Source: Simon Willison’s Weblog Title: Claude API: PDF support (beta) Feedly Summary: Claude API: PDF support (beta) Claude 3.5 Sonnet now accepts PDFs as attachments: The new Claude 3.5 Sonnet (claude-3-5-sonnet-20241022) model now supports PDF input and understands both text and visual content within documents. I just released llm-claude-3 0.7 with support…

  • Hacker News: Using Large Language Models to Catch Vulnerabilities

    Source URL: https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html Source: Hacker News Title: Using Large Language Models to Catch Vulnerabilities Feedly Summary: Comments AI Summary and Description: Yes Summary: The Big Sleep project, a collaboration between Google Project Zero and Google DeepMind, has successfully discovered a previously unknown exploitable memory-safety vulnerability in SQLite through AI-assisted analysis, marking a significant advancement in…

  • Cloud Blog: FEDRAMP High Development in the Cloud: Code with Cloud Workstations

    Source URL: https://cloud.google.com/blog/topics/public-sector/fedramp-high-development-in-the-cloud-code-with-cloud-workstations/ Source: Cloud Blog Title: FEDRAMP High Development in the Cloud: Code with Cloud Workstations Feedly Summary: In the demanding world of federal software development, teams are constantly challenged to deliver innovative solutions while upholding the highest security standards. The complexity of scaling teams, managing infrastructure, and ensuring consistent development environments can quickly…

  • Cloud Blog: How AlloyDB unifies OLTP and OLAP workloads for Tricent

    Source URL: https://cloud.google.com/blog/products/databases/tricent-standardizes-on-alloydb-for-olap-and-oltp-workloads/ Source: Cloud Blog Title: How AlloyDB unifies OLTP and OLAP workloads for Tricent Feedly Summary: Editor’s Note: Tricent Security Group A/S, a leader in file-sharing security, faced efficiency and performance challenges with their PostgreSQL database infrastructure. Their OLTP workloads needed to process millions of real-time updates efficiently, while their OLAP workloads needed…

  • Microsoft Security Blog: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/ Source: Microsoft Security Blog Title: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files Feedly Summary: Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is…

  • Simon Willison’s Weblog: Quoting Question for Department for Science, Innovation and Technology

    Source URL: https://simonwillison.net/2024/Nov/1/prompt-injection/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Question for Department for Science, Innovation and Technology Feedly Summary: Lord Clement-Jones: To ask His Majesty’s Government what assessment they have made of the cybersecurity risks posed by prompt injection attacks to the processing by generative artificial intelligence of material provided from outside government, and whether…

  • CSA: How Are Security Leaders Addressing Data Sprawl?

    Source URL: https://cloudsecurityalliance.org/articles/empowering-snowflake-users-securely Source: CSA Title: How Are Security Leaders Addressing Data Sprawl? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses strategies for managing data security within the Snowflake platform, focusing on controlling data access, ensuring compliance, and addressing challenges like data sprawl. Insights shared by industry leaders highlight the importance of…

  • Scott Logic: Testing GenerativeAI Chatbot Models

    Source URL: https://blog.scottlogic.com/2024/11/01/Testing-GenerativeAI-Chatbots.html Source: Scott Logic Title: Testing GenerativeAI Chatbot Models Feedly Summary: In the fast-changing world of digital technology, GenAI systems have emerged as revolutionary tools for businesses and individuals. As these intelligent systems become a bigger part of our lives, it is important to understand their functionality and to ensure their effectiveness. In…