A Discussion of ‘Adversarial Examples Are Not Bugs, They Are Features’: Robust Feature Leakage

Ilyas et al. report a surprising result: a model trained on adversarial examples is effective on clean data. They suggest this transfer is driven by adverserial examples containing geuinely useful non-robust cues. But an alternate mechanism for the transfer could be a kind of “robust feature leakage” where the model picks up on faint robust […]

8 mins read

Ukrainian hackers say they compromised a major Russian drone company, destroying data, backups, and systems

A pair of Ukraine-supporting hacktivist groups have reportedly claimed responsibility for a cyberattack on a major supplier of drones to Russia’s military called Gaskar Group. TechCrunch reported that BO Team—the “BO” stands for “Black Owl,” not “Body Odor,” in case you’re wondering—announced the operation with a Telegram post on July 14. The group stated that […]

3 mins read

California Proposed A Law Making Broadband Affordable For Poor People. Telecom Lobbyists Have Already Destroyed It.

from the this-is-why-we-can’t-have-nice-things dept Last January, Democratic California Assemblymember Tasha Boerner introduced the California Affordable Home Internet Act (AB 353), which mandated that large ISPs in the state needed to provide broadband service at speeds of 100 Mbps down, 20 Mbps up for $15 a month to California residents who qualify for existing low-income assistance programs. […]

4 mins read

Shaping the future with adaptive production

As efforts to revive and modernize local manufacturing accelerate in regions around the world, including North America and Europe, adaptive production could help manufacturers overcome some of their biggest obstacles—firstly, attracting and retaining talent. Nearly 60% of manufacturers cited this as their top challenge in a 2024 US-based survey. Highly automated, technology-led adaptive production methods […]

1 min read

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

Jul 15, 2025Ravie LakshmananMalware / Web Security The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks. The packages, per Socket, have attracted more than 17,000 downloads, […]

3 mins read

California is set to become the first US state to manage power outages with AI

In April, the PJM Interconnection—the nation’s largest grid system, spanning 13 states along the densely populated mid-Atlantic and Eastern Seaboard—took a big step toward embracing AI by inking a deal with Google to use its Tapestry software to improve regional planning and speed up grid connections for new power generators.  ERCOT, the Texas grid system, […]

2 mins read