MAKING SAM MORE PRACTICAL WITH POST-TRAINING QUANTIZATION (GITHUB REPO)
about 20 hours ago
PTQ4SAM is a new framework designed to reduce the memory and computation demands of the large-scale Segment Anything Model (SAM).
OPENSTREETVIEW-5M: A GLOBAL DATASET FOR LOCALIZING IMAGES (GITHUB REPO)
about 20 hours ago
OpenStreetView-5M is a significant open-access dataset with over 5 million geo-tagged street images from 225 countries designed to push the limits of computer vision by testing image localization capabilities.
HOW BIG TECH IS SWALLOWING THE AI INDUSTRY (3 MINUTE READ)
about 20 hours ago
Amazon has hired most of Adept's team, another aspiring OpenAI competitor, and licensed its technology, following a pattern that mirrors Microsoft's acquisition approach with Inflection. This move reflects a trend where big tech companies absorb AI talent and innovations without formal acquisitions
INTEL SHOWS OFF FIRST FULLY INTEGRATED OPTICAL COMPUTE INTERCONNECT, DESIGNED TO SCALE UP AI WORKLOADS (4 MINUTE READ)
about 20 hours ago
Intel has presented the industry's first fully integrated optical compute interconnect (OCI) chiplet designed to significantly boost high-bandwidth data interconnect performance. Essential for growing AI demands, the milestone represents a step forward in silicon photonics, combining integrated circ
LLM101N: LET'S BUILD A STORYTELLER (2 MINUTE READ)
about 20 hours ago
Andrej Karpathy announced a new course that guides learners in building a Storyteller AI Large Language Model from scratch. It covers the fundamentals of web app implementation using Python, C, and CUDA. The content spans language modeling, deep learning frameworks, and AI deployment including multi
MAGIC INSERT (4 MINUTE READ)
about 20 hours ago
Method from Google to insert semantic objects into images with diffusion. Dataset and demo available.
CTR PREDICTIONS WITH A NEW TOKENIZATION (4 MINUTE READ)
about 20 hours ago
UIST is a novel approach that drastically improves click-through rate predictions by converting dense embeddings into compact, discrete tokens for user and item representations.
ENHANCED CAUSALITY UNDERSTANDING (16 MINUTE READ)
about 20 hours ago
CELLO is a new dataset with 14,094 causal questions to improve AI's grasp of causality beyond commonsense reasoning.
CAMERA TRACKING WITH MULTI-SESSION SLAM (14 MINUTE READ)
about 20 hours ago
Multi-Session SLAM is a new system that innovatively tracks camera movements across several unconnected video sequences under one universal frame of reference.
CONTRA ACEMOGLU ON AI (6 MINUTE READ)
about 20 hours ago
Economist Daron Acemoglu's working paper on AI suggests a modest 0.06% annual increase in TFP growth, challenging more optimistic forecasts. He distinguishes AI's productivity impact through four channels but discounts deepening of automation and creation of new labor-intensive products, arguably un
BOOSTING SMARTPHONE CAMERA CLARITY (GITHUB REPO)
about 20 hours ago
This project introduces a method for enhancing image resolution on smartphones using a self-supervised learning model that improves reference-based super-resolution (RefSR).
SPEECH ENHANCEMENT WITH SEMAMBA (8 MINUTE READ)
about 20 hours ago
SEMamba is a new speech enhancement system that leverages the Mamba state-space model to improve the clarity of speech signals.
FILELESS-ELF-EXEC (GITHUB REPO)
about 20 hours ago
fileless-elf-exec is a Python script that generates interpreted code which creates the supplied ELF as a file in memory and executes it. This makes it possible to execute binaries without leaving traces on the disk.
TWILIO CONFIRMS DATA BREACH AFTER HACKERS LEAK 33M AUTHY USER PHONE NUMBERS
about 20 hours ago
The ShinyHunters hackers announced that they will leak 33M random phone numbers associated with Authy. Twilio has confirmed the breach. It reported that the vulnerability was due to an unauthenticated endpoint and that no systems were compromised. Twilio has secured the endpoint and is encouraging u
LATEST INTEL CPUS IMPACTED BY NEW INDIRECTOR SIDE-CHANNEL ATTACK
about 20 hours ago
Researchers have discovered a new Branch Target Injection vulnerability in Intel CPUs that could be used to steal sensitive information. The attack has three components: the iBranch Locator uses eviction-based techniques to identify the indices and tags of victim branches and determine the Indirect
VULNERABILITIES IN COCOAPODS OPEN THE DOOR TO SUPPLY CHAIN ATTACKS AGAINST THOUSANDS OF IOS AND MACOS APPLICATIONS
about 20 hours ago
Researchers from Evasec have found vulnerabilities in CocoaPods that could let attackers insert malicious code into popular iOS and macOS apps by claiming ownership of unclaimed pods. Developers using CocoaPods should check their open source dependencies for security risks, as these vulnerabilities
AMAZON DOCUMENTDB ANNOUNCES IAM DATABASE AUTHENTICATION
about 20 hours ago
Amazon DocumentDB has added support for authentication using IAM users and role ARNs. Users and applications that connect to DocumentDB clusters can now use an IAM identity to authenticate, allowing for a passwordless experience. Clusters can also choose to allow both IAM and password authentication
THE RUNTIME SECRETS' SECURITY GAP
about 20 hours ago
This blog post discusses a new solution that introduces encrypted secret delivery directly into application memory to prevent exposure. Secrets can be securely stored, delivered, and accessed without compromising security using tools like tang, clevis, and latchy.
DECLARE YOUR AINDEPENDENCE: BLOCK AI BOTS, SCRAPERS, AND CRAWLERS WITH A SINGLE CLICK
about 20 hours ago
Cloudflare has launched the ability for all accounts (including free accounts) to block all AI bots, crawlers, and scrapers with a single toggle under the Security -> Bots section. Cloudflare uses its global bot detection ML model to categorize traffic as potentially bot related. Under the new heuri
DNSTwist lets you find lookalike domains that adversaries can use to attack your domain. This can let you detect typosquatters, phishing attacks, fraud, and brand impersonation. It can be useful as an additional source of targeted threat intelligence.
INTRODUCING DOCS IN PROTON DRIVE
about 20 hours ago
Proton is introducing end-to-end encrypted document editing and sharing to Proton Drive. The company states that all files, media, metadata, and keystrokes are completely encrypted and cannot be accessed by Proton or government surveillance (as it operates under Swiss privacy laws). Proton has begun
NEW GOLANG-BASED ZERGECA BOTNET CAPABLE OF POWERFUL DDOS ATTACKS
about 20 hours ago
A new botnet named Zergeca can launch powerful DDoS attacks and has advanced capabilities like proxying and reverse shell. It is written in Golang and uses DNS-over-HTTPS for communication with its command-and-control servers. The botnet has been actively targeting countries like Canada, Germany, an
MALLOX RANSOMWARE: LINUX VARIANT DECRYPTOR FOUND
about 20 hours ago
Mallox ransomware, which has been active since 2021, has evolved to target Linux systems using custom Python scripts for payload delivery and data exfiltration. The new variant employs AES-256 CBC encryption, appends .lmallox to encrypted files, and utilizes a Flask-based web panel for creating cust
EUROPOL ANNOUNCES CRACKDOWN ON COBALT STRIKE SERVERS USED BY CYBERCRIMINALS
about 20 hours ago
Europol took down almost 600 Cobalt Strike servers used by cybercriminals in a global crackdown.
OVHCLOUD BLAMES RECORD-BREAKING DDOS ATTACK ON MIKROTIK BOTNET
about 20 hours ago
OVHcloud has been able to track a massive DDoS attack in May, which reached 2.5 Tbps, to Mikrotik botnet.