Author: user
Isotopes AI came out of stealth on Thursday with a $20 million seed round. Provides AI agents to solve problems that data analytics products have struggled for decades. Those who know how to run big data infrastructure are not those who actually need to use data. LLMS allows business managers to ask data questions in natural language. Aidnn, an Isotopes agent, can draft answers and complex planning documents, and collect data from stored locations, such as financial apps, ERP, CRM, and cloud storage. There are countless agent business analytics offerings there, but the co-founders of Isotopes have a unique pedigree.…
Researchers have changed standard adhesives to 3D to print bone-like materials directly on fractures, paving the way for use in the operating room.The devices that have been tested in rabbits so far are particularly useful in correcting irregularly shaped fractures during surgery, researchers say.”As far as I know, there is virtually no practical example of applying technology directly as a bone substitute,” Jung Seung Lee, a biomedical engineer at Sungkyunkwan University in South Korea, told Live Science in an email. “This makes this approach very unique and sets it apart from traditional methods.”Large bone fractures or other defects usually require…
Tesla shareholders will immediately vote whether the electric car maker will invest in Elon Musk’s AI startup Xai. This has been proposed as a way to enhance Tesla’s ambitions in AI, robotics and energy. Along with a company-supported push to raise Musk’s 10-year salary package to $1 trillion, the proposal, listed in Tesla’s representation statement, acquires a shares with $2,000 in common stock from Florida shareholder Stephen Hawk. His supportive statements include: Tesla’s integration of Grok into the vehicle demonstrates the specific benefits of collaboration with Xai. As Tesla pivots towards AI-driven technologies such as fully autonomous driving and robotics,…
The Malware-as-a-Service (MAAS) framework and the threat actor behind the loader known as CastleLoader have also developed a remote access trojan known as Castlerat. “The core features of Castlerat available in both Python and C variants consist of collecting system information, downloading and running additional payloads, and running commands via CMD and Powershell,” says a future Insikt Group. Cybersecurity companies are tracking the threat actors behind the malware family as TAG-150s. Castleloader et al, considered active since at least March 2025, is considered the initial access vector for a wide range of secondary payloads, including remote access trojans, information stolen…
Europe officially entered the global league’s high-performance computing with the inauguration of Jupiter Supercomputer in Forschungsentrum Jülich, Germany. Started by EU Commissioner Zaharieva and German Prime Minister Friedrich Merz, Jupiter is the first European system to cross the Exuscar threshold, which allows operations to exceed one kintyrion (10ε) per second. This milestone amounts to the power of a million modern smartphone combinations that solidifies Jupiter’s location as Europe’s most powerful supercomputer and the fourth fastest in the world. Henna Wilkunen, vice-president of technology sovereignty, security and democracy, stressed the importance of its achievements. “Jupin the planet Jupiter has the gravitational…
Global food systems require fundamental transformations for food and nutritional security. Based on decades of research and behavior, the new call to action recommends pathways to unlock the benefits of Agrobiodiversity for nutrition, ecosystems and communities. Behind this challenge is the lack of equitable access to food production and distribution, food waste, and healthy diets. Our food systems have significant environmental externalities, such as loss of biodiversity, land degradation, and greenhouse gas emissions. Ecosystem degradation exacerbates the lack of adequate food and nutrition, threatens future food security and genetic benefits. Poverty, inequality in food access and proper diet, and low…
Simple factsName: Narusawa Hioketsu Ice CaveLocation: Fuji 5 Lakes Area, JapanCoordinates: 35.475766342241734, 138.6658965143265Why it’s unbelievable: The cave was created by the lava of Mt. Fuji and now has a huge ice pillar.Narusawa’s Ice Cave is a lava tube filled with icicles and ice pillars at the foot of Mt. Fuji in Japan.Lava tubes are natural tunnels that form under lava flows that solidify after a volcanic eruption. Lava hardens faster in the top layer of lava flow where molten rocks come into contact with cold air, and maintains liquid at high red temperatures in layers colder than the middle layer.…
Tesla has proposed a new 10-year compensation plan for CEO Elon Musk, despite the stumbling blocks of the EV maker’s automotive business and focusing on humanoid robotics and AI. The company has tied its compensation to many benchmarks, one of which involves increasing Tesla’s overall valuation from around $1 trillion to over $8 trillion. The plan grants the company more than 423 million additional shares to Musk, increasing his level of control to about 25%. Musk previously threatened to leave Tesla if Tesla didn’t receive more voting rights. The proposal will be voted by shareholders at Tesla’s annual meeting scheduled…
Astronomers have made groundbreaking discoveries that shed new light on star formation in some of the galaxy’s most remote areas. Using a massive millimeter/sub-millimeter array (ALMA) of Chilean powerful Atacama, scientists took the first spatially resolved images of the Protosterer runoff and jet on an external disk in the Milky Way. The observations focused on the Protostellar Source SH 2-283-1A SMM1, located approximately 26,000 light years from Earth and over 51,000 light years from the galaxy center. This area contains only a third of the heavy elements near the Sun, making it a rare natural laboratory for studying how stars…
September 5th, 2025Ravi LakshmananVulnerability/Enterprise Security Critical security vulnerabilities affecting SAP S/4HANA, the Enterprise Resource Planning (ERP) software, are subject to active exploitation in the wild. Tracked Command Injection Vulnerability CVE-2025-42957 (CVSS score: 9.9) was revised by SAP as part of last month’s monthly update. “SAP S/4HANA allows user privileged attackers to take advantage of vulnerabilities in function modules exposed via RFCs” as described in the NIST National Ulnerability Database (NVD) flaws. “This flaw allows any ABAP code to be injected into the system, allowing essential approval checks to be bypassed. A successful investigation of the defect can result in a…