Vulnerability
-
Anthropic’s New AI Model Kept Private After Discovering Thousands of External Vulnerabilities
Anthropic has kept its advanced AI model private due to discovering thousands of external vulnerabilities during testing. This decision emphasizes responsible AI development, prioritizing security over rapid release. The discovery highlights the complexity and potential risks of next-generation AI, underscoring the need for rigorous, continuous security measures to ensure AI trustworthiness and safety.
-
The AI Cybersecurity Crisis Driving Anthropic’s Project Glasswing
Anthropic’s Claude Mythos Preview, an advanced AI, excels at identifying cybersecurity vulnerabilities. Instead of public release, Anthropic uses “Project Glasswing” for controlled distribution to industry leaders and critical organizations. The initiative includes significant funding for open-source security. This strategy aims to bolster global digital defenses while managing the AI’s dual-use potential, acknowledging the severe risks of widespread, uncontrolled access to such powerful capabilities.
-
Microsoft Boosts .NET Bug Bounty Program: Rewards Up to $45,000
Microsoft has expanded its .NET bug bounty program, increasing the top reward to $40,000 for critical vulnerabilities in .NET and ASP.NET Core. The program now encompasses a wider range of technologies and offers tiered rewards based on the severity of the vulnerability, incentivizing researchers to focus on the most damaging flaws, like Remote Code Execution (RCE) and Elevation of Privilege (EoP). This move reflects Microsoft’s commitment to proactive security and leveraging external talent to identify weaknesses.
-
Your Headphones Are Spying On You: 20+ Audio Devices, Including Sony, Bose, and JBL, Vulnerable
A critical security flaw affects over twenty popular audio devices, including brands like Sony, Bose, and JBL. Discovered in a widely used Bluetooth chip, the vulnerability could allow hackers to eavesdrop or steal data. Researchers demonstrated an exploit to extract media playback information and potentially hijack connections. While technically challenging, the issue is being addressed with updated software from the chip manufacturer and patches from device makers.