Sat.Dec 15, 2018

article thumbnail

Magellan RCE flaw in SQLite potentially affects billions of apps

Security Affairs

Security experts at Tencent’s Blade security team discovered the Magellan RCE flaw in SQLite database software that exposes billions of vulnerable apps. Security experts at Tencent’s Blade security team have discovered a critical vulnerability in SQLite database software that exposes billions of vulnerable apps to hackers. The vulnerability tracked as ‘ Magellan ‘ could allow remote attackers to execute arbitrary on vulnerable devices, leak program memory or cause dos con

IoT 85
article thumbnail

Weekly Update 117

Troy Hunt

I'm in Whistler! And as I say at the start of this video, I did seriously consider having a week off these videos, but I found a comfy spot by the fire and a cold beer and all was good in the world again. This week has some updates on my Canada travels, a couple of data breaches I loaded during the week, new HIBP stickers and some really screwy password practices at HSBC.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taylor Swift's Facial Recognition, the Year's Worst Passwords, and More Security News This Week

WIRED Threat Level

Chinese hackers targeting the Navy, charity scammers, and more security news this week.

article thumbnail

Which are the worst passwords for 2018?

Security Affairs

Which are the worst passwords for 2018? SplashData report confirms that 123456 is the most used password for the 5th year in a row. Bad habits are hard to die, 123456 is the most used password for the 5th year in a row followed by “password” Even if security experts continue to make awareness campaign, people continue to use bad habits exposing their data to the risk of hack.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.