
NB520: When Good LLMs Do Bad Things, Dell’s Workforce Downsizes and Quantum Key Distribution From Space
The Everything Feed - All Packet Pushers Pods
Kubernetes Vulnerabilities and LLM Manipulation
This chapter explores critical Kubernetes vulnerabilities, including a severe issue that could enable cluster takeover without credentials, emphasizing the need for immediate patching. It also discusses a revolutionary cybersecurity discovery involving large language models, revealing how they can be exploited to generate malware by creating a virtual context that normalizes harmful actions.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.