Tag: systems

  • Schneier on Security: Subverting LLM Coders

    Source URL: https://www.schneier.com/blog/archives/2024/11/subverting-llm-coders.html Source: Schneier on Security Title: Subverting LLM Coders Feedly Summary: Really interesting research: “An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection“: Abstract: Large Language Models (LLMs) have transformed code com- pletion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often…

  • The Register: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

    Source URL: https://www.theregister.com/2024/11/07/cisco_uiws_flaw/ Source: The Register Title: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system Feedly Summary: Ultra-Reliable Wireless Backhaul doesn’t live up to its name Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert.… AI Summary and…

  • Hacker News: Evaluating the World Model Implicit in a Generative Model

    Source URL: https://arxiv.org/abs/2406.03689 Source: Hacker News Title: Evaluating the World Model Implicit in a Generative Model Feedly Summary: Comments AI Summary and Description: Yes Summary: This paper delves into the evaluation of world models implicitly learned by generative models, particularly large language models (LLMs). It highlights the potential limitations and fragilities of these models in…

  • Hacker News: Sysadmin shock as Windows Server 2025 installs itself after labeling error

    Source URL: https://www.theregister.com/2024/11/06/windows_server_2025_surprise/ Source: Hacker News Title: Sysadmin shock as Windows Server 2025 installs itself after labeling error Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant incident where a security update intended for Windows Server 2022 unexpectedly upgraded systems to Windows Server 2025, caused by a mislabeling in Microsoft’s…

  • Technologies | Sovereign Tech Agency: Reproducible Builds

    Source URL: https://www.sovereign.tech/tech/reproducible-builds Source: Technologies | Sovereign Tech Agency Title: Reproducible Builds Feedly Summary: AI Summary and Description: Yes Summary: The Reproducible Builds project plays a crucial role in enhancing the security of open source software supply chains by addressing vulnerabilities that arise from third-party dependencies. It aims to establish reproducible builds as a standard…

  • Wired: Perplexity Dove Into Real-Time Election Tracking While Other AI Companies Held Back

    Source URL: https://www.wired.com/story/perplexity-election-tracking/ Source: Wired Title: Perplexity Dove Into Real-Time Election Tracking While Other AI Companies Held Back Feedly Summary: The controversial AI search engine, accused of aggressively scraping content, went all in on providing AI-generated election information. AI Summary and Description: Yes Summary: The text discusses Perplexity, an AI search engine that recently launched…

  • The Register: Thanks Linus. Torvalds patch improves Linux performance by 2.6%

    Source URL: https://www.theregister.com/2024/11/06/torvalds_patch_linux_performance/ Source: The Register Title: Thanks Linus. Torvalds patch improves Linux performance by 2.6% Feedly Summary: 21 lines that show the big man still has what it takes A relatively tiny code change by penguin premier Linus Torvalds is making a measurable improvement to Linux’s multithreaded performance.… AI Summary and Description: Yes Summary:…

  • Slashdot: AI Workers Seek Whistleblower Cover To Expose Emerging Threats

    Source URL: https://slashdot.org/story/24/11/06/1513225/ai-workers-seek-whistleblower-cover-to-expose-emerging-threats?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Workers Seek Whistleblower Cover To Expose Emerging Threats Feedly Summary: AI Summary and Description: Yes Summary: Workers at AI companies are advocating for whistleblower protections, highlighting potential dangers such as deepfakes and algorithmic discrimination. Legal support argues for regulation rather than self-policing by tech firms, indicating a pressing…

  • Cloud Blog: (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/abusing-intune-permissions-entra-id-environments/ Source: Cloud Blog Title: (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments Feedly Summary: Written by: Thibault Van Geluwe de Berlaere, Karl Madden, Corné de Jong The Mandiant Red Team recently supported a client to visualize the possible impact of a compromise by…