Tech + AI + Science NewsTech + AI + Science News
11 item(s)
Enterprises power agentic workflows in Cloudflare Agent Cloud with OpenAI
OpenAI Blog · 2026-04-13
Cloudflare brings OpenAI’s GPT-5.4 and Codex to Agent Cloud, enabling enterprises to build, deploy, and scale AI agents for real-world tasks with speed and security.
Want to understand the current state of AI? Check out these charts. | MIT Technology Review new
Brave News
According to Stanford’s 2026 AI Index, AI is sprinting, and we’re struggling to keep up.
Global Digital Policy Roundup: March 2026 | TechPolicy.Press new
Brave News
AI regulation, including Russia's draft law on artificial intelligence, the UK government's report on copyright and AI proposals, and Brazil's enforcement case against Meta's update to the WhatsApp business terms. Competition policy, including the UK Competition and Markets Authority's strategic ...
Approvals for Nvidia and AMD AI chip exports to China stall under government bottleneck — 20% staff turnover hobbles Bureau of Industry and Security | Tom's Hardware new
Brave News
Under Secretary Jeffrey Kessler is personally signing off on nearly every license.
Microsoft is working on yet another OpenClaw-like agent | TechCrunch new
Brave News
The new features would be geared toward enterprise customers, with better security controls than the famously risky open source OpenClaw agent.
Ransomware Is Growing Three Times Faster Than the Spending Meant to Stop It new
Hacker News · 2026-04-14
Comments
An AI Vibe Coding Horror Story new
Hacker News · 2026-04-14
Comments
Backblaze has stopped backing up your data new
Hacker News · 2026-04-14
Comments
Introspective Diffusion Language Models new
Hacker News · 2026-04-14
Comments
GitHub for Beginners: Getting started with GitHub Pages
GitHub Blog · 2026-04-13
Learn how to create a free website for any repository on GitHub Pages. The post GitHub for Beginners: Getting started with GitHub Pages appeared first on The GitHub Blog .
“Giant superatoms” could finally solve quantum computing’s biggest problem
ScienceDaily — Artificial Intelligence · 2026-04-13
In the pursuit of powerful and stable quantum computers, researchers at Chalmers University of Technology, Sweden, have developed the theory for an entirely new quantum system – based on the novel concept of ‘giant superatoms’. This breakthrough enables quantum information to be protected, controlled, and distributed in new ways and could be a key step towards building quantum computers at scale.
Security (NVD + CISA KEV)Security (NVD + CISA KEV)
14 item(s)
CVE-2022-36323· CVSS 9.1 CRITICAL new
NVD · 2022-08-10
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
CVE-2022-31765· CVSS 8.8 HIGH new
NVD · 2022-10-11
Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges.
CVE-2023-21529· CVSS 8.8 HIGH
NVD · 2023-02-15
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2020-9715· CVSS 7.8 HIGH
NVD · 2020-08-19
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2022-3786· CVSS 7.5 HIGH new
NVD · 2022-11-01
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
CVE-2022-3602· CVSS 7.5 HIGH new
NVD · 2022-11-01
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigat
CVE-2022-38767· CVSS 7.5 HIGH new
NVD · 2022-11-25
An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.
CVE-2022-0778· CVSS 7.5 HIGH new
NVD · 2022-03-15
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates
CVE-2022-36324· CVSS 7.5 HIGH new
NVD · 2022-08-10
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.
CVE-2021-3712· CVSS 7.4 HIGH new
NVD · 2021-08-24
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL function
CVE-2022-36325· CVSS 6.8 MEDIUM new
NVD · 2022-08-10
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.
CVE-2020-26144· CVSS 6.5 MEDIUM new
NVD · 2021-05-12
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
CVE-2020-26145· CVSS 6.5 MEDIUM new
NVD · 2021-05-12
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
CVE-2020-26143· CVSS 6.5 MEDIUM new
NVD · 2021-05-12
An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Projects + Resources (Discovery)Projects + Resources (Discovery)
10 item(s)
HackadayU: Reverse Engineering with Ghidra Class 1 - YouTube new
Brave Search
This is Class 1 in Reverse Engineering with Ghidra taught by Matthew Alt.Learn with us: https://www.hackaday.io/uPlaylist for the Reverse Engineering with Gh
Reverse Engineering Made EASY with Ghidra! 🔍 | Beginner Tutorial - YouTube new
Brave Search
Want to learn reverse engineering but don’t know where to start? In this short, I’ll show you how to use Ghidra, the free reverse engineering tool developed ...
JavaScript 标准参考教程(alpha) -- JavaScript 标准参考教程(alpha) new
Brave Search
英文标题:JavaScript Standards Reference Guide · 授权方式:创意共享“署名-非商业性使用”许可证
liao-xuefeng-java-jiaocheng · PyPI new
Brave Search
Python :: 3.7 · Topic · Documentation · Internet :: WWW/HTTP · Software Development :: Documentation · Text Processing :: Markup :: HTML · Text Processing :: Markup :: Markdown · This version · 2024.3.5.0 · Mar 5, 2024 · Download the file for your platform. If you're not sure which to choose, learn more about installing packages. liao-xuefeng-java-jiaocheng-2024.3.5.0.tar.gz (1.4 MB view details) Uploaded Mar 5, 2024 Source ·
你是如何自学 Python 的? - 知乎 new
Brave Search
知乎,让每一次点击都充满意义 —— 欢迎来到知乎,发现问题背后的世界。
JavaScript - 布布教程-jiaocheng.bubufx.com new
Brave Search
JavaScript一种直译式脚本语言,是一种动态类型、弱类型、基于原型的语言,内置支持类型。它的解释器被称为JavaScript引擎,为浏览器的一部分,广泛用于客户端的脚本语言,最早是在HTML(标准通用标记语言下的一个应用)网页上使用,用来给HTML网页增加动态功能。
xiandai-javascript-jiaocheng new
Brave Search
JavaScript is disabled in your browser · Please enable JavaScript to proceed · A required part of this site couldn’t load. This may be due to a browser extension, network issues, or browser settings. Please check your connection, disable any ad blockers, or try using a different browser
Jiacheng Lin’s Homepage new
Brave Search
My research focuses on foundation models (e.g., large language models (LLMs), multi-modal models), reinforcement learning (RL), and agents, with their applications in healthcare, biomedicine, and recommendation systems.
GitHub - iNCML/MachineLearningBook: The companion repository for the book "Machine Learning Fundamentals". new
Brave Search
The companion repository for the book Machine Learning Fundamentals ©Hui Jiang 2021, published by Cambridge University Press.
GitHub - Everfighting/python-tutorial-by-liaoxuefeng: 廖雪峰python教程笔记 new
Brave Search
廖雪峰python教程笔记. Contribute to Everfighting/python-tutorial-by-liaoxuefeng development by creating an account on GitHub.