Uzbekistan’s first unicorn, Uzum, leaps to a $1.5B valuation

Uzbekistan’s Uzum has raised $65.5 million in a new funding round co-led by China’s Tencent and the New York- and London-based VR Capital, with participation from U.S.-based FinSight Capital.Uzbekistan’s Uzum has raised $65.5 million in a new funding round co-led by China’s Tencent and the New York- and London-based VR Capital, with participation from U.S.-based FinSight Capital.[#item_full_content]

A top designer was banned from Dribbble. Now he’s building his own competitor.

Dribbble is enforcing its terms of service that lets it take a cut of designers’ work, and kicking out those who don’t comply. One top designer has had enough, and is building his own startup instead.Dribbble is enforcing its terms of service that lets it take a cut of designers’ work, and kicking out those who don’t comply. One top designer has had enough, and is building his own startup instead.[#item_full_content]

A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.[#item_full_content]

New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Researchers at Los Alamos National Laboratory have put forward a novel framework that identifies adversarial threats to foundation models—artificial intelligence approaches that seamlessly integrate and process text and image data. This work empowers system developers and security experts to better understand model vulnerabilities and reinforce resilience against ever more sophisticated attacks.New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Researchers at Los Alamos National Laboratory have put forward a novel framework that identifies adversarial threats to foundation models—artificial intelligence approaches that seamlessly integrate and process text and image data. This work empowers system developers and security experts to better understand model vulnerabilities and reinforce resilience against ever more sophisticated attacks.Security[#item_full_content]

Not long ago, planning a trip meant juggling guidebooks and hours of searching the web for the best restaurants and must-see sights. Now, travelers are turning to artificial intelligence tools to do the heavy lifting.Not long ago, planning a trip meant juggling guidebooks and hours of searching the web for the best restaurants and must-see sights. Now, travelers are turning to artificial intelligence tools to do the heavy lifting.Consumer & Gadgets[#item_full_content]

A POSTECH research team has developed a thin, flexible robotic actuator inspired by human muscle proteins. As thin as paper, yet capable of generating strong forces, this robot can maneuver through tight spaces and manipulate objects, making it suitable for a wide range of applications—from surgical robots to industrial equipment. The study has been published in Nature Communications.A POSTECH research team has developed a thin, flexible robotic actuator inspired by human muscle proteins. As thin as paper, yet capable of generating strong forces, this robot can maneuver through tight spaces and manipulate objects, making it suitable for a wide range of applications—from surgical robots to industrial equipment. The study has been published in Nature Communications.[#item_full_content]

LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.Computer Sciences[#item_full_content]

LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.[#item_full_content]

Hirebucket

FREE
VIEW