writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

336
active users

#cleo

0 posts0 participants0 posts today

❓Ich mag Rätsel und manche besonders…
Zu einem ganz besonderem haben @evawolfangel und ich zwei spannende Storyfolgen aufgenommen.
.
🧝‍♀️#Cleo - Das Mathemysterium… Eine geheimnisvolle Userin in einem Mathe-Forum die in kürzester Zeit, die schwersten Aufgaben zu lösen scheint.
.
🤔Wer dahinter steckt treibt die Mathecommunity mehr als zehn Jahre um. Heute gibt’s die Auflösung. Schreibt uns, wie es euch gefallen hat.

"Hiring a human money manager can easily cost a few thousand dollars, so more people, especially younger users, are turning to AI tools for advice. From Apple’s top charts of free finance apps, I decided to try two well-reviewed options offering up chatbots intended to fix money woes: Cleo AI and Bright.

Both Cleo AI and Bright encourage users to connect their bank account to the app through a third-party service called Plaid. This allows the chatbots to break down spending habits, help users pay off debt, and build credit. “Using the bank data and what you've said to us, Cleo will be your kind of confidant or coach,” says Barney Hussey-Yeo, the company’s CEO and founder. “She'll provide the right advice and the right products to help you make better financial decisions.”

Fair enough, but some of the guidance Cleo gave me veered from that path. While it had engaging moments, like an amicable roast highlighting where I overspent in unnecessary ways, the generative AI tool seemed mainly preoccupied with using my personal data for upselling opportunities. Bright was the same."

wired.com/story/ai-financial-a

WIRED · AI Financial Advisers Target Young People Living Paycheck to PaycheckBy Reece Rogers

Full Rapid7 analysis of #Cleo CVE-2024-55956 now available c/o @stephenfewer. It's neither a patch bypass of CVE-2024-50623 nor part of a chain after all — totally new bug, different exploitation strategies across the two issues (though the same endpoint gets used either way).

I'm not sure it's been mentioned much yet that Cleo evidently released IOCs related to CVE-2024-50623 in October 2024, implying the older bug's been exploited for a minute. Would sure be helpful to know more about who was doing that exploiting, particularly now that Cl0p has claimed credit for last week's attack.

attackerkb.com/topics/geR0H8dg

Continued thread

Had the threat actor gone more slowly and hit orgs prone to cover ups (ie large enterprises) that would have been a very different outcome.

The smaller Managed Detection and Response vendors have the window to do something very funny and talk about things rather than doing a CrowdStrike, MS etc and doing a cover up - it breaks the race to the bottom, and is one area where the market is getting healthier.

Continued thread

I think the Cleo thing shows the industry and community working very well, btw.

From zero day in an MFT product to approx 2/3rd of servers now offline or patched in days. As far as I know, since mass exploitation began (important caveat) none of the victims had follow on activity, ie ransomware.

That’s a really good outcome. The reason, I think, is openness and transparency - Huntress went public early and everybody leaped on it loudly in the community. Be more open.