Meta’s Muse Spark takes AI a step closer to personal superintelligence

Meta Superintelligence Labs has introduced Muse Spark, a natively multimodal reasoning model with support for tool use, visual chain of thought, and multi-agent orchestration. The release includes a Contemplating mode, which is rolling out gradually an… Continue reading Meta’s Muse Spark takes AI a step closer to personal superintelligence

Iranian cyber activity hits US energy, water, and government networks

U.S. government agencies on Tuesday warned American organizations about ongoing cyber activity targeting OT and PLC devices, including those manufactured by Rockwell Automation and Allen-Bradley, across multiple critical infrastructure sectors. The act… Continue reading Iranian cyber activity hits US energy, water, and government networks

Flatpak 1.16.4 fixes sandbox escape and three other security flaws

Flatpak, a Linux application sandboxing and distribution framework, released version 1.16.4, patching four security vulnerabilities. The most severe fix addresses a complete sandbox escape that leads to host file access and code execution in the host c… Continue reading Flatpak 1.16.4 fixes sandbox escape and three other security flaws

Anthropic’s new AI model finds and exploits zero-days across every major OS and browser

Automated vulnerability discovery tools have existed for decades, and the gap between finding a bug and building a working exploit has always slowed attackers. That gap is now substantially narrower. Anthropic’s Claude Mythos Preview, a new gener… Continue reading Anthropic’s new AI model finds and exploits zero-days across every major OS and browser

AI-enabled device code phishing campaign exploits OAuth flow for account takeover

A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code Authentication flow to compromise organizational accounts at scale, has been observed by the Mic… Continue reading AI-enabled device code phishing campaign exploits OAuth flow for account takeover

GitHub Copilot CLI gets a second-opinion feature built on cross-model review

Coding agents make decisions in sequence: a plan is drafted, implemented, then tested. Any error introduced early compounds as subsequent steps build on the same flawed assumption. Self-reflection is a recognized mitigation technique, and one GitHub Co… Continue reading GitHub Copilot CLI gets a second-opinion feature built on cross-model review

Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR

Getting a startup through a SOC 2 audit has long meant months of manual evidence collection, policy writing, and repeated back-and-forth with auditors. A growing number of compliance platforms have moved to automate parts of that process, and Comp AI i… Continue reading Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR

Google study finds LLMs are embedded at every stage of abuse detection

Online platforms are running large language models at every stage of LLM content moderation, from generating training data to auditing their own systems for bias. Researchers at Google mapped how this is happening across what the authors call the Abuse… Continue reading Google study finds LLMs are embedded at every stage of abuse detection

Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app

Proton Authenticator is a free and open-source two-factor authentication (2FA) app that generates time-based one-time passwords (TOTP) to help secure online accounts. It is available on Windows, macOS, Linux, iOS, and Android, allowing users to access … Continue reading Product showcase: Proton Authenticator is an end-to-end encrypted, open source 2FA app