A sprawling academic cheating network turbocharged by Google Ads that has generated nearly $25 million in revenue has curious ties to a Kremlin-connected oligarch whose Russian university builds …
**
Dec 12, 2025 **
Ravie Lakshmanan
Vulnerability / Server Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo …
Unveiling what it describes as the most capable model series yet for professional knowledge work, OpenAI launched GPT-5.2 today. The model was trained and deployed on NVIDIA infrastructure, including …
The rise of artificial intelligence (AI) agents marks a change in software development and how applications make decisions and interact with users. While traditional systems follow predictable paths, …
Today we’re announcing Amazon SageMaker AI with MLflow, now including a serverless capability that dynamically manages infrastructure provisioning, scaling, and operations for artificial intelligence …
This post was written with Arun Sittampalam and Maxime Darcot from Swisscom.
As we navigate the constantly shifting AI ecosystem, enterprises face challenges in translating AI’s potential into …
This post was written with Bryan Woolgar-O’Neil, Jamie Cockrill and Adrian Cunliffe from Harmonic Security
Organizations face increasing challenges protecting sensitive data while supporting …
AIs Exploiting Smart Contracts I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature.
Here’s some interesting research on training AIs to …
**
Dec 11, 2025 **
Ravie Lakshmanan
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software …
**
Dec 11, 2025 **
The Hacker News
Automation / Compliance
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool …
**
Dec 11, 2025 **
Ravie Lakshmanan
Cyber Espionage / Windows Security
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google …
MIT researchers have developed a new fabrication method that could enable the production of more energy efficient electronics by stacking multiple functional components on top of one existing circuit. …
As the scale and complexity of AI infrastructure grows, data center operators need continuous visibility into factors including performance, temperature and power usage. These insights enable data …
**
Dec 11, 2025 **
Ravie Lakshmanan
Cyberwarfare / Threat Intelligence
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities …
**
Dec 11, 2025 **
Ravie Lakshmanan
Vulnerability / Cloud Security
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances …
**
Dec 11, 2025 **
Ravie Lakshmanan
Zero-Day / Vulnerability
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under …
**
Dec 11, 2025 **
Ravie Lakshmanan
Vulnerability / Encryption
Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use …
The NVIDIA accelerated computing platform is leading supercomputing benchmarks once dominated by CPUs, enabling AI, science, business and computing efficiency worldwide.
Moore’s Law has run its …
The world’s top-performing system for graph processing at scale was built on a commercially available cluster.
NVIDIA last month announced a record-breaking benchmark result of 410 trillion traversed …
Automated smoke testing using Amazon Nova Act headless mode helps development teams validate core functionality in continuous integration and continuous delivery (CI/CD) pipelines. Development teams …
**
Dec 10, 2025 **
Ravie Lakshmanan
Hardware Security / Vulnerability
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data …
FBI Warns of Fake Video Scams The FBI is warning of AI-assisted fake kidnapping scams:
Criminal actors typically will contact their victims through text message claiming they have kidnapped their …
**
Dec 10, 2025 **
Ravie Lakshmanan
Enterprise Security / Web Services
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade …
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of …
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution.
The Fortinet …