home.social

#vulnerabilities — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #vulnerabilities, aggregated by home.social.

  1. How Dangerous Is Anthropic’s Mythos AI?

    Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not... schneier.com/blog/archives/202

    #vulnerabilities #Uncategorized #regulation #patching #hacking #laws #LLM #AI

  2. OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities

    The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Myth... schneier.com/blog/archives/202

    #vulnerabilities #Uncategorized #AI

  3. @renardboy A tangential #phrase comes to mind:

    "Having too many hammers..." might mean:

    1- if you sell more #hammers then they get used more and do more damage

    2- if you give #intelligent people lots of hammers it wouldn't make a difference because they just won't use them / leave them alone in storage.

    (so coming back to your post - intelligent society wouldn't attack things so much / at all even if #vulnerabilities existed (and having hammers).

    Writing in short is hard - I tried !

  4. Huawei Cloud and GAPP Forge Strategic Alliance to Accelerate AI-Driven Cloud Solutions in Saudi Arabia Huawei Cloud and GAPP Forge Strategic Alliance to Accelerate AI-Driven Cloud Solutions in Saud...

    #Features #Cyber #Warriors #Risk #& #Policy #threat #landscape #Vulnerabilities

    Origin | Interest | Match
  5. Dangerous New #Linux #Exploit Gives Attackers #Root Access to Countless Computers

    The exploit, dubbed #CopyFail and tracked as CVE-2026-31431, allows #hackers to take over PCs and data center #servers. The Linux #vulnerabilities have been patched—but many machines remain at risk.
    #security #cve202631431

    wired.com/story/dangerous-new-

  6. Lawmakers open inquiry into cybersecurity risks posed by PRC-origin AI models deployed in critical infrastructure systems The U.S. House Committee on Homeland Security and the House Select Committe...

    #AI #Attacks #and #Vulnerabilities #Critical #infrastructure #Malware, #Phishing #& #Ransomware #News

    Origin | Interest | Match
  7. 🚨 Breaking: #NIST throws in the towel on enriching CVEs! 🎉 Because, why bother making #vulnerabilities understandable when we can just drown 'em in alphabet soup? 🍜💻 Clearly, "keep it simple" is a foreign concept. 🙄
    risky.biz/risky-bulletin-nist- #CVE #simplification #tech #news #cybersecurity #humor #HackerNews #ngated

  8. #Cal is moving its flagship #opensource programme to a #proprietary model due to the increasing threat of #AIhacking. The company believes that open-source code, while transparent, is now #vulnerable to #AI tools that can easily find #vulnerabilities. Despite this move, Cal remains committed to open source and has released Cal.diy, a fully open-source version for hobbyists. zdnet.com/article/ai-security- #AIagent #AI #ML #NLP #LLM #GenAI

  9. The pentest professionals at #usdHeroLab identified a vulnerability in #EntraID during a cloud #pentest that allows the circumvention of conditional access policies for privileged identities.

    Two additional vulnerabilities were identified during a web application pentest of #Tenable Nessus Manager, which allow low-privileged users to read arbitrary files at the operating system level.

    All #vulnerabilities were reported to the vendors as part of our Responsible Disclosure policy.

    🔎 You can find detailed information on the #SecurityAdvisories here: usd.de/en/security-advisories-

    #SecurityResearch #SecurityAdvisory #moresecurity #NessusManager #Pentesting #Hacking #CVE_2026_3493 #AppSec #InfoSec #CyberSecurity

  10. DOE allocates $160 million to secure energy systems as cyber threats converge with grid modernization

    The U.S. Department of Energy’s FY 2027 budget frames cybersecurity as a core pillar of national energy security,…
    #Energy #AI #ceser #cyberattacks #cyberthreats #Cybersecurity #cybersecurityprotocol #Datacenters #DOE #energyinfrastructure #energysystems #FERC #gridmodernization #manufacturing #supplychain #vulnerabilities #zerotrust
    europesays.com/2906733/

  11. "The Big Bang: A.I. Has Created a #Code #Overload"

    '... The sheer amount of code being delivered, and the increase in #vulnerabilities, is something they can’t keep up with ...'

    #AI #VibeCoding #Security #AISlop

    nytimes.com/2026/04/06/technol

  12. Booz Allen warns AI‑driven cyberattacks outpace human-driven defenses across critical infrastructure A new report from Booz Allen Hamilton warns that cybersecurity is entering a ‘machine-speed...

    #AI #Attacks #and #Vulnerabilities #Control #device #security #Critical #infrastructure #Industrial #Cyber

    Origin | Interest | Match
  13. #Tesla exec tells Congress 'no one has ever' taken control of its vehicles — but that's not true
    In 2017, security researcher #JasonHughes (aka #WK057) discovered #vulnerabilities that gave him access to “Mothership”, Tesla’s central server used to communicate with entire fleet.
    Hughes was able to authenticate as any vehicle in Tesla’s fleet using just a #VIN. He had access to location data, vehicle info, and critically, the ability to send commands to any Tesla on road.
    electrek.co/2026/02/06/tesla-e