Hackers scan for vulnerabilities within 15 minutes of disclosure

System administrators have even less time to patch disclosed security vulnerabilities than previously thought, as a…

Luca Stealer malware spreads after code appears on GitHub

Cool, another Rust project … Oh wait… Read more…

Experts Uncover New ‘CosmicStrand’ UEFI Firmware Rootkit Used by Chinese Hackers

Researchers have discovered a new UEFI firmware rootkit malware, dubbed “CosmicStrand,” that Chinese hackers have been…

MegaPortraits: High-Res Deepfakes Created From a Single Photo

Researchers from Samsung Labs have developed a way to create high-resolution avatars, or deepfakes, from a…

Pinball Fantastic: ESP32 Runs DOS Emulator, Hits Jackpot

it’s running an X86 emulator powerful enough to set Digital Illusions’ 1992 DOS classic Pinball Fantasies…

Hardcoded password in Confluence app has been leaked on Twitter

Advisory had already warned hardcoded password was “trivial to obtain.” Read more at Ars Technica…

New Linux Malware Framework Lets Attackers Install Rootkit on Targeted Systems

Researchers uncover “Lightning Framework,” a new Swiss Army Knife-like Linux malware that has modular plugins and…

Will AI Steal Submarines’ Stealth?

That may bode ill for nuclear deterrence and the peace of the world. Read more at…

AI system creates realistic images and art from a textual description

“An astronaut riding a horse as pencil drawing”. This and many more images can be easily…

This adorable 1-inch HDMI monitor doesn’t need a power supply

As small as an HDMI monitor gets. Read more at Ars Technica…

C isn’t a programming language anymore

‘It has completely distorted the way we speak to each other,’ Read more…

Pruning for Deep Neural Networks — Techniques to Prune Image and Language Models

In this blog post, we will go over two techniques for pruning deep neural networks. One…

Implementing a Transformer From Scratch

7 Things You Didn’t Know About the Transformer Read more at Medium…

My elaborate study notes on reinforcement learning

In this article we would like to share what we have learned about Reinforcement Learning. Read…

Lottery ticket hypothesis in deep learning

In this article, we cover what the lottery ticket hypothesis in deep learning is and its…

Researchers From Idiap Research Institute Propose ‘HyperMixer’: An MLP-Based Green AI Alternative To Transformers

Researchers From Idiap Research Institute Propose ‘HyperMixer’: An MLP-Based Green AI Alternative To Transformers Read more…

New GPT-3 Capabilities: Edit & Insert

We’ve released new versions of GPT-3 and Codex which can edit or insert content into existing…

Neural Networks Intuitions: 13.Out-of-Distribution Detection and HOD Loss — Paper Explanation

The term “unseen” can mean two or more things here: inputs that do not correspond to…

Training a 1 Trillion Parameter Model With PyTorch Fully Sharded Data Parallel on AWS

Linear scaling efficiency is observed when the number of GPUs is increased from 8 GPUs to…

Make Extra Money on the Side with Data Science

Monetize your machine learning models using FastAPI, Docker, GCP Cloud Run, and Rapid API in 5…