Links

Tuesday 2024-10-22 Assorted Links
Assorted Links links
Published: 2024-10-22
Tuesday 2024-10-22 Assorted Links

Assorted links for Tuesday, October 22:

  1. What’s new in System.Text.Json in .NET 9

    The 9.0 release of System.Text.Json includes many features, primarily with a focus on JSON schema and intelligent application support. It also includes highly requested enhancements such as nullable reference type support, customizing enum member names, out-of-order metadata deserialization and customizing serialization indentation.

  2. A quick introduction to return address protection technologies
  3. North Korean hackers use newly discovered Linux malware to raid ATMs

    The malware, tracked under the name FASTCash, is a remote access tool that gets installed on payment switches inside compromised networks that handle payment card transactions.

    The purpose of FASTCash is to compromise a key switch inside the complex networks that broker payment transactions among merchants and their banks on the one hand and, on the other, the payment card issuers who must approve a transaction… When a compromised card is used to make a fraudulent translation, FASTCash tampers with the messages the switch receives from issuers before relaying it back to the merchant bank. As a result, issuer messages denying the transaction are changed to approvals.

  4. Building Knowledge Graphs at Production Scale for GenAI
  5. Docker Best Practices: Using ARG and ENV in Your Dockerfiles

    If you need to access a variable during the build process but not at runtime, use ARG. If you need to access the variable both during the build and at runtime, or only at runtime, use ENV.

Monday 2024-10-21 Assorted Links
Assorted Links links
Published: 2024-10-21
Monday 2024-10-21 Assorted Links

Assorted links for Monday, October 21:

  1. Thousands of Linux systems infected by stealthy malware since 2021
  2. Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing.

    The invisible characters, the result of a quirk in the Unicode text encoding standard, create an ideal covert channel that can make it easier for attackers to conceal malicious payloads fed into an LLM. The hidden text can similarly obfuscate the exfiltration of passwords, financial information, or other secrets out of the same AI-powered bots. Because the hidden text can be combined with normal text, users can unwittingly paste it into prompts.

  3. Investigation of a Workbench UI Latency Issue: Resolving a UI latency investigation requires from the UI all the way down to the Linux kernel.
  4. Web Browser Engineering by Pavel Panchekha & Chris Harrelson
  5. Drasi: Drasi is a data processing platform that simplifies detecting changes in data and taking immediate action. It is a comprehensive solution that provides built-in capabilities to track system logs and change feeds for specific events, evaluate them for relevance, and automatically initiate appropriate reactions.
Thursday 2024-10-17 Assorted Links
Assorted Links links
Published: 2024-10-17
Thursday 2024-10-17 Assorted Links

Assorted links for Thursday, October 17:

  1. China Possibly Hacking US “Lawful Access” Backdoor

    The Wall Street Journal is reporting that Chinese hackers (Salt Typhoon) penetrated the networks of US broadband providers, and might have accessed the backdoors that the federal government uses to execute court-authorized wiretap requests. Those backdoors have been mandated by law—CALEA—since 1994.

  2. The second half of software supply chain security on GitHub
  3. For the first time since 1882, UK will have no coal-fired power plants
  4. Introducing Netflix’s TimeSeries Data Abstraction Layer
  5. Two never-before-seen tools, from same group, infect air-gapped devices
Thursday 2024-10-17 Assorted Links
Assorted Links links
Published: 2024-10-17
Thursday 2024-10-17 Assorted Links

Assorted links for Thursday, October 17:

  1. China Possibly Hacking US “Lawful Access” Backdoor

    The Wall Street Journal is reporting that Chinese hackers (Salt Typhoon) penetrated the networks of US broadband providers, and might have accessed the backdoors that the federal government uses to execute court-authorized wiretap requests. Those backdoors have been mandated by law—CALEA—since 1994.

  2. The second half of software supply chain security on GitHub
  3. For the first time since 1882, UK will have no coal-fired power plants
  4. Introducing Netflix’s TimeSeries Data Abstraction Layer
  5. Two never-before-seen tools, from same group, infect air-gapped devices
Wednesday 2024-10-16 Assorted Links
Assorted Links links
Published: 2024-10-16
Wednesday 2024-10-16 Assorted Links

Assorted links for Wednesday, October 16:

  1. Code referencing now generally available in GitHub Copilot and with Microsoft Azure AI
  2. Announcing the stable release of the Azure OpenAI library for .NET
  3. Microsoft Just Dropped a Bunch of New Copilot Features
  4. Faster Integer Programming: A new analysis proves that all integer programs theoretically could be solved much faster than previously guaranteed.
  5. Confidential Container Groups: Implementing confidential computing on Azure container instances.
Monday 2024-10-14 Assorted Links
Assorted Links links
Published: 2024-10-14
Monday 2024-10-14 Assorted Links

Assorted links for Monday, October 14:

  1. Attackers exploit critical Zimbra vulnerability using cc’d email addresses
  2. Leveraging Graph Databases for Fraud Detection in Financial Systems

    Graph databases reveal patterns and relationships that would otherwise be hidden, allowing financial institutions to detect fraud faster and more efficiently.

  3. Microsoft’s new “Copilot Vision” AI experiment can see what you browse
  4. The more sophisticated AI models get, the more likely they are to lie
  5. How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
Tuesday 2024-10-01 Assorted Links
Assorted Links links
Published: 2024-10-01
Tuesday 2024-10-01 Assorted Links

Assorted links for Tuesday, October 1:

  1. Hacker plants false memories in ChatGPT to steal user data in perpetuity
  2. Getting started with testing and .NET Aspire
  3. The 10 best tools to green your software
  4. Introducing NotebookLM

    An AI-first notebook, grounded in your own documents, designed to help you gain insights faster.

  5. NotebookLM now lets you listen to a conversation about your sources

    Our new Audio Overview feature can turn documents, slides, charts and more into engaging discussions with one click.

Monday 2024-09-30 Assorted Links
Assorted Links links
Published: 2024-09-30
Monday 2024-09-30 Assorted Links

Assorted links for Monday, September 30:

  1. Changes coming in PostgreSQL 17
  2. Eliminating Memory Safety Vulnerabilities at the Source
  3. Unauthenticated RCE Flaw With CVSS 9.9 Rating For Linux Systems Affects CUPS

    A remote unauthenticated attacker can silently replace existing printers' (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started (from that computer)."

  4. NIST Recommends Some Common-Sense Password Rules
  5. Microsoft details security/privacy overhaul for Windows Recall ahead of relaunch