Foundation model training has reached an inflection point where traditional checkpoint-based recovery methods are becoming a bottleneck to efficiency and cost-effectiveness. As models grow to …
Modern AI infrastructure serves multiple concurrent workloads on the same cluster, from foundation model (FM) pre-training and fine-tuning to production inference and evaluation. In this shared …
**
Dec 15, 2025 **
Ravie Lakshmanan
Vulnerability / Software Security
Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including …
In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser extensions on a massive scale.
A threat group dubbed ShadyPanda …
A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered …
During early development, tissues and organs begin to bloom through the shifting, splitting, and growing of many thousands of cells.
A team of MIT engineers has now developed a way to predict, minute …
Artificial intelligence can enhance decision-making and enable action with reduced risk and greater precision, making it a critical tool for national security. A new program offered jointly by the MIT …
What customers are saying Google Cloud customers are already using Gemini’s native audio capabilities to drive real business results, from mortgage processing to customer calls.
“Users often forget …
As language models (LMs) improve at tasks like image generation, trivia questions, and simple math, you might think that human-like reasoning is around the corner. In reality, they still trail us by a …
In Las Vegas’s T-Mobile Arena, fans of the Golden Knights are getting more than just hockey — they’re getting a taste of the future. ADAM, a robot developed with NVIDIA Isaac libraries , is pouring …
**
Dec 15, 2025 **
Ravie Lakshmanan
Ransomware / Cybercrime
The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering …
Against the Federal Moratorium on State-Level Regulation of AI Cast your mind back to May of this year: Congress was in the throes of debate over the massive budget bill . Amidst the many seismic …
Wireshark 4.6.2 Released Published 2025-12-14. Last Updated 2025-12-14 16:07:32 UTC by Didier Stevens (Version: 1)
0 comment(s)
Wireshark release 4.6.2 fixes 2 vulnerabilities and 5 bugs.
The Windows …
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to speak:
I’m speaking and signing books at the Chicago Public Library in Chicago, Illinois, USA, at 6:00 PM CT on …
Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious …
As cloud infrastructure becomes increasingly complex, the need for intuitive and efficient management interfaces has never been greater. Traditional command-line interfaces (CLI) and web consoles, …
Welcome to Import AI, a newsletter about AI research. Import AI runs on lattes, ramen, and feedback from readers. If you’d like to support this, please subscribe.
We’re very close to AI-based malware …
Welcome to Import AI, a newsletter about AI research. Import AI runs on lattes, ramen, and feedback from readers. If you’d like to support this, please subscribe.
Import A-Idea An occasional longer …
Welcome to Import AI, a newsletter about AI research. Import AI runs on lattes, ramen, and feedback from readers. If you’d like to support this, please subscribe. Shorter issue than usual this week as …
Introduction
Since as early as November 2025, the finger protocol has been used in ClickFix social engineering attacks. BleepingComputer posted a report of this activity on November 15th , and Didier …
**
Dec 13, 2025 **
Ravie Lakshmanan
Network Security / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless …
**
Dec 13, 2025 **
Ravie Lakshmanan
Zero-Day / Vulnerability
Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two …
Friday Squid Blogging: Giant Squid Eating a Diamondback Squid I have no context for this video —it’s from Reddit—but one of the commenters adds some context:
Hey everyone, squid biologist here! Wanted …
Introduction
Between July 2024 and February 2025, 6 suspicious image files were uploaded to VirusTotal. Thanks to a lead from Meta, these samples came to the attention of Google Threat Intelligence …