Tech + AI + Science NewsTech + AI + Science News
14 item(s)

Tech + AI + Science News
Running Codex safely at OpenAI
OpenAI News
Running Codex safely at OpenAI
OpenAI News · 2026-05-08
How OpenAI runs Codex securely with sandboxing, approvals, network policies, and agent-native telemetry to support safe and compliant coding agent adoption.

Tech + AI + Science News
Scaling Trusted Access for Cyber with GPT-5.5
OpenAI News
Scaling Trusted Access for Cyber with GPT-5.5 and GPT-5.5-Cyber
OpenAI News · 2026-05-07
OpenAI expands Trusted Access for Cyber with GPT-5.5 and GPT-5.5-Cyber, helping verified defenders accelerate vulnerability research and protect critical infrastructure.

Tech + AI + Science News
Parloa builds service agents customers want to
OpenAI News
Parloa builds service agents customers want to talk to
OpenAI News · 2026-05-07
Parloa leverages OpenAI models to power scalable, voice-driven AI customer service agents, enabling enterprises to design, simulate, and deploy reliable, real-time interactions.

Tech + AI + Science News
Advancing voice intelligence with new models in
OpenAI News
Advancing voice intelligence with new models in the API
OpenAI News · 2026-05-07
Explore new realtime voice models in the OpenAI API that can reason, translate, and transcribe speech, enabling more natural and intelligent voice experiences.

Tech + AI + Science News
Hardware Attestation as Monopoly Enabler
Hacker News
Hardware Attestation as Monopoly Enabler new
Hacker News · 2026-05-10
Comments

Tech + AI + Science News
Incident Report: CVE-2024-YIKES
Hacker News
Incident Report: CVE-2024-YIKES new
Hacker News · 2026-05-10
Comments
Tech + AI + Science News
Ask HN: What are you working on?
Hacker News
Ask HN: What are you working on? (May 2026) new
Hacker News · 2026-05-10
Comments
Tech + AI + Science News
Local AI needs to be the norm
Hacker News
Local AI needs to be the norm new
Hacker News · 2026-05-10
Comments

Tech + AI + Science News
Coinbase Impacted By 7-Hr Outage After AWS
Brave News
Coinbase Impacted By 7-Hr Outage After AWS Data Center Cooling Failure | Crowdfund Insider
Brave News
Coinbase (NASDAQ:COIN) faced a major disruption when its services went offline for approximately seven hours. The incident, which occurred overnight, left users unable to access the exchange for buying, selling, or managing digital assets during a critical window.

Tech + AI + Science News
LLM Leaderboard 2026: Best AI Models Benchmark
Brave News
LLM Leaderboard 2026: Best AI Models Benchmark & Ranking new
Brave News
The definitive LLM leaderboard. See which AI model leads on reasoning, coding, speed & cost from $0.02 to $25/M tokens across 356+ models.

Tech + AI + Science News
White House distances itself from tighter AI
Brave News
White House distances itself from tighter AI regulation - POLITICO new
Brave News
The White House is looking for “partnership” with companies rather than pursuing “government regulation,” a senior White House official said.

Tech + AI + Science News
AMD announces MI350P PCIe AI accelerator card
Brave News
AMD announces MI350P PCIe AI accelerator card with 144GB of HBM3E — roughly 40% faster in FP16 and FP8 theoretical compute compared to Nvidia's H200 NVL competitor | Tom's Hardware new
Brave News
Nvidia has not announced a PCIe version of its latest B200 Blackwell GPUs running HBM memory, so for now, AMD will have the most bleeding-edge AI accelerator that fits in a PCIe form factor. It remains to be seen how widely adopted AMD's new card will be, given Nvidia's hold on the market with CUDA. But AMD is working to improve its competing ROCm software stack, as the GPU maker explained to us at CES 2026. Follow Tom's Hardware ...

Tech + AI + Science News
Why age assurance laws matter for developers
GitHub Blog
Why age assurance laws matter for developers
GitHub Blog · 2026-05-08
Youth safety requirements are moving down the tech stack to operating systems and app stores—raising new questions for open source developers. The post Why age assurance laws matter for developers appeared first on The GitHub Blog .

Tech + AI + Science News
How researchers are using GitHub Innovation Graph
GitHub Blog
How researchers are using GitHub Innovation Graph data to reveal the “digital complexity” of nations
GitHub Blog · 2026-05-08
Researchers share in an interview how they used GitHub data to predict GDP, inequality, and emissions in ways that traditional economic data misses, along with our Q4 2025 data release. The post How researchers are using GitHub Innovation Graph data to reveal the “digital complexity” of nations appeared first on The GitHub Blog .
Research (arXiv)Research (arXiv)
10 item(s)
Research (arXiv)
ActCam: Zero-Shot Joint Camera and 3D Motion
arXiv
ActCam: Zero-Shot Joint Camera and 3D Motion Control for Video Generation
arXiv · 2026-05-07
For artistic applications, video generation requires fine-grained control over both performance and cinematography, i.e., the actor's motion and the camera trajectory. We present ActCam, a zero-shot method for video generation that jointly transfers character motion from a driving video into a new scene and enables per-frame control of intrinsic and extrinsic camera parameters. ActCam builds on any pretrained image-to-video diffusion model that accepts conditioning in terms of scene depth and character pose. Given a source video with a moving character and a target camera motion, ActCam generates pose and depth conditions that remain geometrically consistent across frames. We then run a single sampling process with a two-phase conditioning schedule: early denoising steps condition on both pose and sparse depth to enforce scene structure, after which depth is dropped and pose-only guidanc
Research (arXiv)
The Kubo-Thermalization Correspondence
arXiv
The Kubo-Thermalization Correspondence
arXiv · 2026-05-07
Quantum thermalization describes how interacting quantum systems relax toward thermal equilibrium, a central problem in modern physics. Yet most experimental information on many-body systems comes from short-time transition spectroscopy, typically interpreted within Kubo's linear-response framework. These perspectives - long-time equilibration versus short-time response - seem fundamentally disconnected. Here we establish an exact link between them: the Kubo-Thermalization correspondence, which connects long-time thermalized magnetization under weak driving to short-time linear-response spectra for a spin coupled to a thermal bath. The correspondence holds even when the steady state differs substantially from the initial state and when each regime is individually difficult to describe theoretically. We experimentally confirm the correspondence using effective spin-1/2 impurities realized
Research (arXiv)
UniPool: A Globally Shared Expert Pool for
arXiv
UniPool: A Globally Shared Expert Pool for Mixture-of-Experts
arXiv · 2026-05-07
Modern Mixture-of-Experts (MoE) architectures allocate expert capacity through a rigid per-layer rule: each transformer layer owns a separate expert set. This convention couples depth scaling with linear expert-parameter growth and assumes that every layer needs isolated expert capacity. However, recent analyses and our routing probe challenge this allocation rule: replacing a deeper layer's learned top-k router with uniform random routing drops downstream accuracy by only 1.0-1.6 points across multiple production MoE models. Motivated by this redundancy, we propose UniPool, an MoE architecture that treats expert capacity as a global architectural budget by replacing per-layer expert ownership with a single shared pool accessed by independent per-layer routers. To enable stable and balanced training under sharing, we introduce a pool-level auxiliary loss that balances expert utilization
Research (arXiv)
BAMI: Training-Free Bias Mitigation in GUI Grounding
arXiv
BAMI: Training-Free Bias Mitigation in GUI Grounding
arXiv · 2026-05-07
GUI grounding is a critical capability for enabling GUI agents to execute tasks such as clicking and dragging. However, in complex scenarios like the ScreenSpot-Pro benchmark, existing models often suffer from suboptimal performance. Utilizing the proposed \textbf{Masked Prediction Distribution (MPD)} attribution method, we identify that the primary sources of errors are twofold: high image resolution (leading to precision bias) and intricate interface elements (resulting in ambiguity bias). To address these challenges, we introduce \textbf{Bias-Aware Manipulation Inference (BAMI)}, which incorporates two key manipulations, coarse-to-fine focus and candidate selection, to effectively mitigate these biases. Our extensive experimental results demonstrate that BAMI significantly enhances the accuracy of various GUI grounding models in a training-free setting. For instance, applying our meth
Research (arXiv)
EMO: Pretraining Mixture of Experts for Emergent
arXiv
EMO: Pretraining Mixture of Experts for Emergent Modularity
arXiv · 2026-05-07
Large language models are typically deployed as monolithic systems, requiring the full model even when applications need only a narrow subset of capabilities, e.g., code, math, or domain-specific knowledge. Mixture-of-Experts (MoEs) seemingly offer a potential alternative by activating only a subset of experts per input, but in practice, restricting inference to a subset of experts for a given domain leads to severe performance degradation. This limits their practicality in memory-constrained settings, especially as models grow larger and sparser. We introduce EMO, an MoE designed for modularity-the independent use and composition of expert subsets-without requiring human-defined priors. Our key idea is to encourage tokens from similar domains to rely on similar experts. Since tokens within a document often share a domain, EMO restricts them to select experts from a shared pool, while al
Research (arXiv)
Multi-Robot Coordination in V2X Environments
arXiv
Multi-Robot Coordination in V2X Environments
arXiv · 2026-05-07
This paper presents a Vehicle-to-Everything (V2X) communication framework that enables decentralized cooperation among social robots operating in complex urban traffic environments. Building on ETSI Cooperative Awareness and Maneuver Coordination services, the framework introduces two robot-centric facility-layer services: the Robot Awareness Service (RAS) and the Robot Maneuver Coordination Service (RMCS), realized through the Robot Awareness Message (RAM) and the Robot Maneuver Coordination Message (RMCM), respectively. RAS enables role-aware, task-oriented robot awareness while integrating externally detected Vulnerable Road Users (VRUs), including non-V2X pedestrians, into cooperative awareness. RMCS supports event-driven, low-latency coordination of robot maneuvers under explicitly established roles, without centralized infrastructure or prior pairing. A real-world proof of concept
Research (arXiv)
Verifier-Backed Hard Problem Generation for Mathematical Reason…
arXiv
Verifier-Backed Hard Problem Generation for Mathematical Reasoning
arXiv · 2026-05-07
Large Language Models (LLMs) demonstrate strong capabilities for solving scientific and mathematical problems, yet they struggle to produce valid, challenging, and novel problems - an essential component for advancing LLM training and enabling autonomous scientific research. Existing problem generation approaches either depend on expensive human expert involvement or adopt naive self-play paradigms, which frequently yield invalid problems due to reward hacking. This work introduces VHG, a verifier-enhanced hard problem generation framework built upon three-party self-play. By integrating an independent verifier into the conventional setter-solver duality, our design constrains the setter's reward to be jointly determined by problem validity (evaluated by the verifier) and difficulty (assessed by the solver). We instantiate two verifier variants: a Hard symbolic verifier and a Soft LLM-ba
Research (arXiv)
Relit-LiVE: Relight Video by Jointly Learning Environment
arXiv
Relit-LiVE: Relight Video by Jointly Learning Environment Video
arXiv · 2026-05-07
Recent advances have shown that large-scale video diffusion models can be repurposed as neural renderers by first decomposing videos into intrinsic scene representations and then performing forward rendering under novel illumination. While promising, this paradigm fundamentally relies on accurate intrinsic decomposition, which remains highly unreliable for real-world videos and often leads to distorted appearances, broken materials, and accumulated temporal artifacts during relighting. In this work, we present Relit-LiVE, a novel video relighting framework that produces physically consistent, temporally stable results without requiring prior knowledge of camera pose. Our key insight is to explicitly introduce raw reference images into the rendering process, enabling the model to recover critical scene cues that are inevitably lost or corrupted in intrinsic representations. Furthermore, w
Research (arXiv)
Why Global LLM Leaderboards Are Misleading: Small
arXiv
Why Global LLM Leaderboards Are Misleading: Small Portfolios for Heterogeneous Supervised ML
arXiv · 2026-05-07
Ranking LLMs via pairwise human feedback underpins current leaderboards for open-ended tasks, such as creative writing and problem-solving. We analyze ~89K comparisons in 116 languages from 52 LLMs from Arena, and show that the best-fit global Bradley-Terry (BT) ranking is misleading. Nearly 2/3 of the decisive votes cancel out, and even the top 50 models according to the global BT ranking are statistically indistinguishable (pairwise win probabilities are at most 0.53 within the top 50 models). We trace this failure to strong, structured heterogeneity of opinions across language, task, and time. Moreover, we find an important characteristic - *language* plays a key role. Grouping by language (and families) increases the agreement of votes massively, resulting in two orders of magnitude higher spread in the ELO scores (i.e., very consistent rankings). What appears as global noise is in f
Research (arXiv)
Optimizer-Model Consistency: Full Finetuning with the Same
arXiv
Optimizer-Model Consistency: Full Finetuning with the Same Optimizer as Pretraining Forgets Less
arXiv · 2026-05-07
Optimizers play an important role in both pretraining and finetuning stages when training large language models (LLMs). In this paper, we present an observation that full finetuning with the same optimizer as in pretraining achieves a better learning-forgetting tradeoff, i.e., forgetting less while achieving the same or better performance on the new task, than other optimizers and, possibly surprisingly, LoRA, during the supervised finetuning (SFT) stage. We term this phenomenon optimizer-model consistency. To better understand it, through controlled experiments and theoretical analysis, we show that: 1) optimizers can shape the models by having regularization effects on the activations, leading to different landscapes around the pretrained checkpoints; 2) in response to this regularization effect, the weight update in SFT should follow some specific structures to lower forgetting of the
Security (NVD + CISA KEV)Security (NVD + CISA KEV)
14 item(s)
Security (NVD + CISA KEV)
CVE-2014-2206· CVSS 10.0 HIGH
NVD
CVE-2014-2206· CVSS 10.0 HIGH
NVD · 2014-03-05
Stack-based buffer overflow in GetGo Download Manager 4.9.0.1982, 4.8.2.1346, 4.4.5.502, and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long HTTP Response Header.
Security (NVD + CISA KEV)
CVE-2014-0683· CVSS 10.0 HIGH
NVD
CVE-2014-0683· CVSS 10.0 HIGH
NVD · 2014-03-06
The web management interface on the Cisco RV110W firewall with firmware 1.2.0.9 and earlier, RV215W router with firmware 1.1.0.5 and earlier, and CVR100W router with firmware 1.0.1.19 and earlier does not prevent replaying of modified authentication requests, which allows remote attackers to obtain administrative access by leveraging the ability to intercept requests, aka Bug IDs CSCul94527, CSCum86264, and CSCum86275.
Security (NVD + CISA KEV)
CVE-2014-0703· CVSS 10.0 HIGH
NVD
CVE-2014-0703· CVSS 10.0 HIGH
NVD · 2014-03-06
Cisco Wireless LAN Controller (WLC) devices 7.4 before 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote attackers to bypass intended access restrictions by connecting to an Aironet access point on which this server had been disabled ineffectively, aka Bug ID CSCuf66202.
Security (NVD + CISA KEV)
CVE-2013-6941· CVSS 10.0 HIGH
NVD
CVE-2013-6941· CVSS 10.0 HIGH
NVD · 2014-03-11
Unspecified vulnerability in Citrix NetScaler Application Delivery Controller (ADC) 9.3.x before 9.3-64.4, 10.0 before 10.0-77.5, and 10.1 before 10.1-118.7 allows users to "breakout" of the shell via unknown vectors.
Security (NVD + CISA KEV)
CVE-2014-2321· CVSS 10.0 HIGH
NVD
CVE-2014-2321· CVSS 10.0 HIGH
NVD · 2014-03-11
web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials.
Security (NVD + CISA KEV)
CVE-2014-0505· CVSS 10.0 HIGH
NVD
CVE-2014-0505· CVSS 10.0 HIGH
NVD · 2014-03-14
Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
Security (NVD + CISA KEV)
CVE-2014-1704· CVSS 10.0 HIGH
NVD
CVE-2014-1704· CVSS 10.0 HIGH
NVD · 2014-03-16
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Security (NVD + CISA KEV)
CVE-2014-1708· CVSS 10.0 HIGH
NVD
CVE-2014-1708· CVSS 10.0 HIGH
NVD · 2014-03-16
The boot implementation in Google Chrome OS before 33.0.1750.152 does not properly consider file persistence, which allows remote attackers to execute arbitrary code via unspecified vectors.
Security (NVD + CISA KEV)
CVE-2014-1512· CVSS 10.0 HIGH
NVD
CVE-2014-1512· CVSS 10.0 HIGH
NVD · 2014-03-19
Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
Security (NVD + CISA KEV)
CVE-2014-2523· CVSS 10.0 HIGH
NVD
CVE-2014-2523· CVSS 10.0 HIGH
NVD · 2014-03-24
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
Security (NVD + CISA KEV)
CVE-2012-4886· CVSS 10.0 HIGH
NVD
CVE-2012-4886· CVSS 10.0 HIGH
NVD · 2014-03-24
Stack-based buffer overflow in wpsio.dll in Kingsoft WPS Office 2012 possibly 8.1.0.3238 allows remote attackers to execute arbitrary code via a long BSTR string.
Security (NVD + CISA KEV)
CVE-2014-1300· CVSS 10.0 HIGH
NVD
CVE-2014-1300· CVSS 10.0 HIGH
NVD · 2014-03-26
Unspecified vulnerability in Apple Safari 7.0.2 on OS X allows remote attackers to execute arbitrary code with root privileges via unknown vectors, as demonstrated by Google during a Pwn4Fun competition at CanSecWest 2014.
Security (NVD + CISA KEV)
CVE-2014-1303· CVSS 10.0 HIGH
NVD
CVE-2014-1303· CVSS 10.0 HIGH
NVD · 2014-03-26
Heap-based buffer overflow in Apple Safari 7.0.2 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by Liang Chen during a Pwn2Own competition at CanSecWest 2014.
Security (NVD + CISA KEV)
CVE-2014-0506· CVSS 10.0 HIGH
NVD
CVE-2014-0506· CVSS 10.0 HIGH
NVD · 2014-03-27
Use-after-free vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows remote attackers to execute arbitrary code, and possibly bypass an Internet Explorer sandbox protection mechanism, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
Projects + Resources (Discovery)Projects + Resources (Discovery)
10 item(s)

Projects + Resources (Discovery)
TinyML: Getting Started with TensorFlow Lite for
Brave Search
TinyML: Getting Started with TensorFlow Lite for Microcontrollers | Digi-Key Electronics - YouTube new
Brave Search
In this tutorial, Shawn shows you how to use the TensorFlow Lite for Microcontrollers library to perform machine learning tasks on embedded systems. Specific...

Projects + Resources (Discovery)
TinyML Book Screencast #3 - Introduction to
Brave Search
TinyML Book Screencast #3 - Introduction to TensorFlow Lite for Microcontrollers - YouTube new
Brave Search
Overview of the TensorFlow Lite Micro framework for embedded machine learning, including a discussion of the design tradeoffs around choosing a machine learn...
Projects + Resources (Discovery)
Jiacheng Lin’s Homepage
Brave Search
Jiacheng Lin’s Homepage new
Brave Search
My research focuses on foundation models (e.g., large language models (LLMs), multi-modal models), reinforcement learning (RL), and agents, with their applications in healthcare, biomedicine, and recommendation systems.

Projects + Resources (Discovery)
GitHub - iNCML/MachineLearningBook: The companion repository for
Brave Search
GitHub - iNCML/MachineLearningBook: The companion repository for the book "Machine Learning Fundamentals". new
Brave Search
The companion repository for the book Machine Learning Fundamentals ©Hui Jiang 2021, published by Cambridge University Press.

Projects + Resources (Discovery)
Characteristics and mechanism of Jiaocheng ground fissure
Brave Search
Characteristics and mechanism of Jiaocheng ground fissure in Taiyuan Basin, China | Environmental Earth Sciences | Springer Nature Link new
Brave Search
Discover the latest articles, books and news in related subjects, suggested using machine learning.
Projects + Resources (Discovery)
piwheels - w3school-python-jiaocheng-fix1
Brave Search
piwheels - w3school-python-jiaocheng-fix1 new
Brave Search
The piwheels project page for w3school-python-jiaocheng-fix1: W3School Python 教程
Projects + Resources (Discovery)
你是如何自学 Python 的? - 知乎
Brave Search
你是如何自学 Python 的? - 知乎 new
Brave Search
知乎,让每一次点击都充满意义 —— 欢迎来到知乎,发现问题背后的世界。

Projects + Resources (Discovery)
GitHub - Everfighting/python-tutorial-by-liaoxuefeng: 廖雪峰python…
Brave Search
GitHub - Everfighting/python-tutorial-by-liaoxuefeng: 廖雪峰python教程笔记 new
Brave Search
廖雪峰python教程笔记. Contribute to Everfighting/python-tutorial-by-liaoxuefeng development by creating an account on GitHub.
Projects + Resources (Discovery)
JavaScript 标准参考教程(alpha) -- JavaScript 标准参考教程(alpha)
Brave Search
JavaScript 标准参考教程(alpha) -- JavaScript 标准参考教程(alpha) new
Brave Search
英文标题:JavaScript Standards Reference Guide · 授权方式:创意共享“署名-非商业性使用”许可证
Projects + Resources (Discovery)
jQuery 教程_JavaScript_教程_教程_JSON在线解析及格式化验证 - JSON.cn
Brave Search
jQuery 教程_JavaScript_教程_教程_JSON在线解析及格式化验证 - JSON.cn new
Brave Search
在本教程中,您将通过教程以及许多在线实例,学到如何通过使用 jQuery 应用 JavaScript 效果。