Why do large companies sometimes lobby for regulation in their own industries? When major crypto exchanges advocate for licensing or tech companies urge regulation of artificial intelligence, the …
Homepage-Fragments
LLM-based chatbots’ capabilities have been advancing every month. These improvements are mostly measured by benchmarks like MMLU, HumanEval, and MATH (e.g. sonnet 3.5, gpt-4o). However, as these …
Shape, Symmetries, and Structure: The Changing Role of Mathematics in Machine Learning Research
What is the Role of Mathematics in Modern Machine Learning? The past decade has witnessed a shift in how progress is made in machine learning. Research involving carefully designed and mathematically …
“In projecting language back as the model for thought, we lose sight of the tacit embodied understanding that undergirds our intelligence.” –Terry Winograd The recent successes of …
Friday Squid Blogging: Do Squid Dream? An exploration of the interesting question. Tags: squid Posted on February 13, 2026 at 5:08 PM • 38 Comments
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, …
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. …
** The Hacker News ** Feb 13, 2026 Supply Chain Security / DevSecOps In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce …
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, …
UK newsstand. Picture: Shutterstock Print circulation figures for the Mirror, Express and Star newspapers will no longer be made public. Publisher Reach has decided to keep its national newspaper ABC …
We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a “temporary” API key for …
Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that’s designed to facilitate device takeover ( DTO ) attacks for financial theft. The malware, according …
Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST , likely targeting supporters of Iran’s ongoing protests to conduct information theft and long-term …
ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
** Ravie Lakshmanan ** Feb 19, 2026 Cybersecurity / Hacking News The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up …
** Ravie Lakshmanan ** Feb 19, 2026 Vulnerability / Network Security Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their …
** Ravie Lakshmanan ** Feb 19, 2026 Financial Crime / Cybercrime An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an …
Rep. Marjorie Taylor Greene of Georgia is in a penitent mood. “I would like to say, humbly, I’m sorry for taking part in the toxic politics,” she said in an interview Sunday on CNN, where all normal, …
What does a federal firearm prohibition and a hate crime have to do with the Commerce Clause? Sarah Isgur and David French look at the constitutionality of two cases and whether the Supreme Court will …
While NASA is a large, sprawling organization, with various objectives and programs, China’s National Space Administration (CNSA) —a civil-military agency of the Chinese government—has been narrowly …
Declassified Documents Detail the FBI's Surveillance of a Libertarian Sci-Fi Author
Vernor Vinge—the Hugo Award–winning science fiction author who passed away in March 2024—imagined a world where individuals, not governments, held the power. His 1981 novella True Names featured …
In the early months of 1927, the U.S. Supreme Court decided two cases that might not initially appear to share anything in common. In Tyson and Brother v. Banton , the Supreme Court struck down a New …
** Ravie Lakshmanan ** Feb 13, 2026 Cloud Security / Cyber Espionage A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its …
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
** Ravie Lakshmanan ** Feb 13, 2026 Malware / Critical Infrastructure Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained …
ISC Stormcast For Wednesday, February 11th, 2026 https://isc.sans.edu/podcastdetail/9804, (Wed, Feb 11th)
ISC Stormcast For Wednesday, February 11th, 2026 https://isc.sans.edu/podcastdetail/9804
** Ravie Lakshmanan ** Feb 13, 2026 Threat Intelligence / Malware A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL …