Author: user
Humans&, a startup whose philosophy is that AI should empower humans rather than replace them, has raised $480 million in seed funding at a valuation of $4.48 billion, The New York Times reported. Investors in the round include chipmaker Nvidia, Amazon founder Jeff Bezos, venture capital firms SV Angel, GV and Laurene Powell Jobs’ company Emerson Collective. The three-month-old company’s mega deal follows a trend of investors pouring money into startups founded by independents of major AI labs. Humans& founders include Andi Peng, a former human researcher who worked on reinforcement learning and post-training for Claude 3.5-4.5. Georges Halik, Google’s…
The Occupational Safety and Health Administration says SpaceX failed to properly inspect a hydraulic crane that was recently repaired before it collapsed at the company’s Starbase, Texas, facility last June. As a result, the Federal Safety Agency charged SpaceX with seven “serious” violations related to the investigation, which began the day after the crane collapse. OSHA imposed the maximum fines available for six of these “serious” violations, totaling $115,850 in fines for Elon Musk’s spaceflight company. OSHA’s investigation is still ongoing, according to the agency’s website. It is still unclear whether any workers were injured in the accident. SpaceX can…
To enhance the interests of Warner Bros. Discovery (WBD) shareholders, Netflix is now offering cash for the company’s stock, amending its previous cash and stock deal with the WBD board. However, the streaming giant is still offering WBD’s movie studio and streaming assets the same $27.75 the companies agreed to, leaving the deal valuing the company at $82.7 billion. The companies said in a statement Tuesday that the new proposal would simplify the deal structure, “increase value certainty” and shorten the timeline for shareholder votes. Netflix said it would finance the deal with cash, debt and “committed financing.” The changes…
Archaeologists have discovered a huge medieval shipwreck at the bottom of a strait off the coast of Denmark.The 600-year-old ship was the Cogwheel, a ship with round square sails, one of the most advanced ships of the Middle Ages. Researchers at Denmark’s Viking Ship Museum say the newly discovered ship is about 28 meters long and 9 meters wide, making it the largest cog ever discovered.Researchers discovered the ship off the coast of Copenhagen in Øresund, or “The Sound” in English, a strait between Denmark and Sweden. They described it as a “supership” that could transport hundreds of tons of…
Rabi LakshmananJanuary 20, 2026Vulnerability / Artificial Intelligence A series of three security vulnerabilities have been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic. This can be exploited to read or delete arbitrary files and execute code under certain conditions. “These flaws can be exploited through prompt injection, meaning that an attacker who can influence what the AI assistant reads (a malicious README, a tainted problem description, a compromised web page) could weaponize these vulnerabilities without having direct access to the victim’s system,” Cyata researcher Yarden Porat said in a report shared with The Hacker…
In a sign of the demand, or hype, for AI startups, Emergent, an Indian startup building an AI “vibecoding” platform, has raised $70 million less than four months after raising $23 million in Series A funding. The Series B round was co-led by SoftBank’s Vision Fund 2 and Khosla Ventures, valuing the startup at $300 million post-money, sources familiar with the deal told TechCrunch. Another source told TechCrunch that the startup was previously valued at $100 million post-money. Prosus, Lightspeed Venture Partners, Together, and Y Combinator also participated. Emergent has now raised $100 million within seven months of launching. The…
Ravi LakshmananJanuary 20, 2026Malware/Threat Intelligence Cybersecurity researchers have discovered a new phishing campaign that exploits private social media messages to propagate malicious payloads. This is likely intended to deploy a remote access trojan (RAT). ReliaQuest said in a report shared with The Hacker News that the activity delivers “weaponized files via dynamic link library (DLL) sideloading combined with legitimate open source Python penetration testing scripts.” The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and tricking them into downloading a malicious WinRAR self-extracting archive (SFX). When the archive is launched, four different components are extracted. Legitimate…
The project, funded to the tune of €17 million through Horizon Europe, aims to demonstrate how hydrogen-based fuel cells and climate-neutral fuels can transform deep-sea shipping and enable zero-emission operations for large ocean-going vessels. The five-year initiative is led by Icelandic engineering company Verkís and includes a consortium of European innovators including ANT Topic, Fraunhofer, Aurelia, Sea Green Engineering, Energy Cluster Denmark, SINTEF and Politecnico di Milano. Richard Berkling, CEO of PowerCell Group, commented: “This project represents exactly the kind of industrial learning that the maritime sector currently needs. “GAMMA allows us to go beyond theoretical research and demonstrate how…
Quantum effects in Kondo lattices determine whether a system behaves magnetically or non-magnetically, opening new avenues for designing future quantum materials and technologies. The Kondo effect, the interaction between localized spins and conduction electrons, plays a central role in many quantum phenomena. However, the presence of additional charge and orbital degrees of freedom in real materials makes it difficult to isolate the important quantum mechanisms behind the Kondo effect. In these materials, electrons not only have spin; They may also move around and occupy different orbits. All of these extra motions mixed together make it difficult to focus solely on…
hacker newsJanuary 20, 2026Enterprise Security / AI Security The problem: residual identity As organizations grow and evolve, employees, contractors, services, and systems come and go, but often those accounts remain. These abandoned or “orphaned” accounts lie dormant across applications, platforms, assets, and cloud consoles. They persist not because of neglect but because of fragmentation. Traditional IAM and IGA systems are primarily designed for human users and rely on manual onboarding and integration of each application, such as connectors, schema mapping, entitlement catalogs, and role modeling. Many applications don’t get that far. On the other hand, non-human identities (NHIs)—service accounts, bots,…