cybersecurity
Attackers called AWS console-only APIs after nabbing key to call Bedrock model, used "common jailbreak techniques to bypass model content filtering" says Permiso
"We're working closely with our wholesale partners to stabilise this business and have recently made changes aimed at improving our performance."
Cloudflare boasts that it automatically mitigated the attacks through September, but questions remain about...
“We have been working on fixes for the last three weeks and hope to have them available soon. We are removing support for the old CUPS browse protocol completely”
Some 300,000 endpoints may be publicly exposed to RCE, but these are likely to be largely desktops not servers.
An attacker would need to craft a malicious container and run it "either directly (for example in services allowing shared GPU resources) or indirectly through a supply chain or social engineering attack"
"The activity shows how Generative AI is accelerating attacks and lowering the bar for cybercriminals to infect endpoints."