NEWSWIRE
ARCHIVE SUNDAY, APRIL 12 · 22 STORIESGoogle's Gemma 4 E2B Model Adds Audio Processing Capabilities via MLX
Google's Gemma 4 E2B model now supports audio transcription on Apple Silicon through MLX, enabling local speech-to-text processing without cloud dependencies. ...
Debate Intensifies Over Anthropic's Decision to Keep Claude Mythos Private
Anthropic is not releasing its new most capable model, Claude Mythos, to the public. The company announced the model as part of its Claude for the Enterprise st...
Linux 7.0 adds support for dedicated AI keyboard keys
The Linux 7.0 kernel has merged support for three new keycodes designed for dedicated AI agent keys on upcoming laptops. The addition signals a hardware standar...
OpenAI Accuses Elon Musk of Pre-Trial Legal Maneuver
OpenAI has filed court documents accusing Elon Musk of attempting a last-minute legal maneuver ahead of the companies' scheduled trial, escalating the ongoing d...
Linux Kernel Maintainers Establish Policy on AI-Generated Code Contributions
Linux kernel maintainers have established a formal policy on AI-generated code contributions after months of debate among developers. The new guidelines permit ...
Apple Tests Four AI Glasses Designs With Premium Materials and Camera Systems
Apple is currently testing four distinct AI glasses designs, according to sources familiar with the matter. The prototypes include both rectangular and oval fra...
Claude Code Dominates HumanX Discussions as Industry Tracks China's Open-Weight Lead
Anthropic's Claude Code emerged as the dominant topic at HumanX, a San Francisco AI conference drawing 6,500 executives, founders, and investors this week. Mul...
UC Berkeley Researchers Break Top AI Agent Benchmarks
A team of researchers at the University of California, Berkeley has demonstrated critical vulnerabilities in eight major AI agent benchmarks, showing that near-...
X Cuts Payments to Clickbait and News Aggregation Accounts
X is reducing payments to accounts that are flooding the timeline with clickbait and rapid-fire news aggregation, according to head of product Nikita Bier. The ...
South Korea Declares Internet Access a Basic Right, Mandates Universal Data
South Korea's three largest telecommunications carriers will provide more than seven million mobile subscribers with unmetered 400 Kbps data after their monthly...
CFTC Halts Arizona Criminal Case Against Kalshi with Restraining Order
The Commodity Futures Trading Commission won a temporary restraining order preventing Arizona from pursuing a criminal case against Kalshi, the prediction marke...
White House accelerates AI safety response following Anthropic security concerns
WASHINGTON. The Biden administration is accelerating its response to emerging artificial intelligence security risks following reports of vulnerabilities in Ant...
Beehive Industries Wins $30 Million USAF Contract for 3D-Printed Jet Engines
Beehive Industries has secured a $30 million contract with the U.S. Air Force to develop and test 3D-printed jet engines for drones and long-range weapons, the ...
Y Combinator warns of AI funding concentration among large players
Y Combinator's Startup School has raised concerns about funding inequality in artificial intelligence, noting that seed-stage capital is insufficient while larg...
Illinois Community College Hosts Startup Funding Panel
Illinois Valley Community College announced plans to host a panel discussion connecting entrepreneurs with potential lenders, expanding support infrastructure f...
Salesforce Data Breach and AI Team Reductions Reshape Risk Profile
Salesforce is contending with overlapping security and workforce challenges following a data breach disclosure and continued artificial intelligence team restru...
Rockstar Games Hit With Ransom Demand After Third-Party Data Breach
Rockstar Games confirmed on Saturday that some of its data was compromised in a breach of a third-party provider. The group ShinyHunters claimed responsibility,...
Rockstar Games Targeted by ShinyHunters in Ransom Attack
Rockstar Games has been hit by another security breach, with hacking group ShinyHunters claiming responsibility and demanding ransom. The attackers warned the c...
Critical Marimo RCE Vulnerability Under Active Exploitation
A critical pre-authentication remote code execution vulnerability in Marimo is now under active exploitation, according to security reports. The flaw allows att...
CPUID Website Compromised to Distribute STX RAT Malware via Hardware Tools
Unknown threat actors compromised the website of CPUID, a prominent hardware monitoring software vendor, to distribute malware through popular tools including C...
Apple Testing Four Smart Glasses Designs to Rival Meta Ray-Bans
Apple is reportedly testing four different styles for its upcoming smart glasses, according to Bloomberg's Mark Gurman. The designs include: a large rectangular...
EU SaaS Infrastructure Guide Documents Vendor Stack Compliance
A comprehensive guide to building software-as-a-service products using exclusively European Union-based infrastructure has been released, offering developers a ...