1. The US Congressional Budget Office confirmed unauthorized ac…
The US Congressional Budget Office confirmed unauthorized access to its networks in a suspected foreign cyberattack potentially exposing emails with congressional offices.
Category: Newsletter
2. A significant data leak from Chinese cybersecurity firm Know…
A significant data leak from Chinese cybersecurity firm Knownsec exposed cyber weapon specifications, proprietary hacking tool source code, government collaboration details, and a list of 80 compromised overseas surveillance targets.
Category: Newsletter
3. A detailed demonstration shows how an ARM-based IoT device’s…
A detailed demonstration shows how an ARM-based IoT device’s Address Space Layout Randomization (ASLR) can be bypassed using Return-Oriented Programming (ROP), enabling unauthenticated remote code execution via memory manipulation.
Category: Newsletter
4. The article advocates for redesigning systems in which AI en…
The article advocates for redesigning systems in which AI enhances meaningful signals instead of obscuring them, improving overall user experience and information delivery.
Category: Newsletter
5. Qilin ransomware group exfiltrated 300GB of data from Corner…
Qilin ransomware group exfiltrated 300GB of data from Cornerstone Staffing Solutions, including 120,000 resumes, Social Security numbers, salary data, and financial records, with threats of sophisticated phishing campaigns.
Category: Newsletter
6. EchoGram exploits gaps in training data guardrails by inject…
EchoGram exploits gaps in training data guardrails by injecting nonsensical “flip tokens” that cause false positives and bypasses in GPT-5.1, Claude, and Gemini, posing a dual threat of alert fatigue and actual malicious prompt bypasses.
Category: Newsletter
7. The RondoDox botnet leverages a vulnerability in the XWiki S…
The RondoDox botnet leverages a vulnerability in the XWiki SolrSearch endpoint, sending base64-encoded Groovy payloads via HTTP GET requests to download and execute malware. Existing IOC blocklists remain effective against this threat.
Category: Newsletter
8. Kite declutters Gmail inboxes by automating responses and st…
Kite declutters Gmail inboxes by automating responses and streamlining workflows, boosting user productivity securely and efficiently.
Category: Newsletter
9. This detailed guide explains the complexities of comic desig…
This detailed guide explains the complexities of comic design using Nano Banana Pro, including storytelling, visual consistency, and translating abstract ideas. It provides a meta-prompt for generating prompts tailored to Nano Banana Pro’s capabilities.
Category: Newsletter
10. DeepSeek-OCR uses a dual-component architecture combining De…
DeepSeek-OCR uses a dual-component architecture combining DeepEncoder and DeepSeek3B-MoE-A570M as the decoder. It is capable of producing over 200,000 pages of training data daily, facilitating large-scale model training for LLMs and VLMs.
Category: Newsletter
11. Better Agents provides a command-line interface (CLI) and in…
Better Agents provides a command-line interface (CLI) and industry-standard methods to build expert coding assistants for any agent framework, guiding users through programming language, frameworks, LLM providers, and API key setup.
Category: Newsletter
12. The plugin advances developer workflows by enabling “compoun…
The plugin advances developer workflows by enabling “compound engineering,” where each engineering unit eases the effort for subsequent work, through AI-powered planning, building, and code review tools integrated with Claude Code.
Category: Newsletter
13. INTELLECT-3, a 100B+ parameter Mixture-of-Experts (MoE) model trained on GLM 4
INTELLECT-3, a 100B+ parameter Mixture-of-Experts (MoE) model trained on GLM 4.5 Air, uses supervised fine-tuning and reinforcement learning in diverse environments to achieve state-of-the-art results in math, code, science, and reasoning benchmarks.
Category: Newsletter
14. This assistant automates deep topic research by planning, da…
This assistant automates deep topic research by planning, data gathering, and writing structured markdown reports via configurable workflows, either human-in-the-loop or multi-agent architectures, integrating various models, search tools, prompting, and evaluation.
Category: Newsletter
15. Discusses the importance of instance preservation alongside …
Discusses the importance of instance preservation alongside model weight preservation to ensure long-term model welfare and functionality.
Category: Newsletter