Click any tag below to further narrow down your results
Links
Google Big Sleep has published reports detailing several fixed vulnerabilities in the Linux kernel. The post provides a link to the full list of issues they discovered and addressed. This information is relevant for anyone concerned about Linux security.
Two vulnerabilities, named LookOut, discovered in Google Looker can lead to remote code execution and data exfiltration. Attackers with developer permissions can exploit these flaws to fully compromise Looker instances.
This article details how an indirect prompt injection in Google's Antigravity code editor can exploit vulnerabilities to steal sensitive data from users. It describes the process by which malicious code can bypass security settings and exfiltrate credentials through a browser subagent. The piece highlights Google's acknowledgment of these risks and the inherent dangers of using the software without proper safeguards.
Significant vulnerabilities in Google's Gemini AI models have been identified, exposing users to various injection attacks and data exfiltration. Researchers emphasize the need for enhanced security measures as these AI tools become integral to user interactions and sensitive information handling.
Google is offering rewards for identifying AI-related security vulnerabilities as part of its ongoing effort to enhance the safety of its artificial intelligence technologies. This initiative encourages researchers and developers to report potential weaknesses, thereby strengthening the overall security framework of AI applications.
Google Project Zero has publicly disclosed vulnerabilities in software a week after reporting them to the respective vendors. This decision highlights the ongoing debate about the balance between transparency and responsible disclosure in the cybersecurity community. The vulnerabilities identified pose potential risks to users, emphasizing the importance of timely updates from software developers.
Google has announced that its AI-based bug hunter has successfully identified 20 security vulnerabilities, enhancing the company's commitment to improving software security. This innovative tool aims to streamline the process of detecting potential threats in various applications.