What the hell is going on with Subnautica 2?

If I had to describe the status of Subnautica 2 in just three words, it would be these: messy, messy, messy. That’s not to say the game itself is in terrible shape — this is actually a pivotal claim in the whole situation — but the relationship between Subnautica series developer Unknown Worlds and its […]

11 mins read

A major AI training data set contains millions of examples of personal data

The bottom line, says William Agnew, a postdoctoral fellow in AI ethics at Carnegie Mellon University and one of the coauthors, is that “anything you put online can [be] and probably has been scraped.” The researchers found thousands of instances of validated identity documents—including images of credit cards, driver’s licenses, passports, and birth certificates—as well […]

3 mins read

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as part of a campaign observed in April 2025. “The MaaS [malware-as-a-service] operators used fake GitHub accounts to host payloads, tools, and Amadey plug-ins, likely as an attempt to bypass web filtering […]

6 mins read

Rust Async Web Framework Performance Breakthrough(4081)

GitHub Homepage As a junior computer science student, I have encountered various frameworks during my web development learning journey. From traditional Apache to modern Node.js, each framework has its unique advantages and limitations. Recently, I discovered an impressive Rust web framework whose performance made me reconsider the design philosophy of web servers. Performance Bottlenecks in […]

9 mins read

GitHub Availability Report: June 2025

In June, we experienced three incidents that resulted in degraded performance across GitHub services. June 5 17:47 UTC (lasting 1 hour and 33 minutes) On June 5, 2025, between 17:47 UTC and 19:20 UTC, the Actions service was degraded, leading to run start delays and intermittent job failures. During this period, 47.2% of runs had […]

2 mins read

A Discussion of ‘Adversarial Examples Are Not Bugs, They Are Features’: Robust Feature Leakage

Ilyas et al. report a surprising result: a model trained on adversarial examples is effective on clean data. They suggest this transfer is driven by adverserial examples containing geuinely useful non-robust cues. But an alternate mechanism for the transfer could be a kind of “robust feature leakage” where the model picks up on faint robust […]

8 mins read

Ukrainian hackers say they compromised a major Russian drone company, destroying data, backups, and systems

A pair of Ukraine-supporting hacktivist groups have reportedly claimed responsibility for a cyberattack on a major supplier of drones to Russia’s military called Gaskar Group. TechCrunch reported that BO Team—the “BO” stands for “Black Owl,” not “Body Odor,” in case you’re wondering—announced the operation with a Telegram post on July 14. The group stated that […]

3 mins read

California Proposed A Law Making Broadband Affordable For Poor People. Telecom Lobbyists Have Already Destroyed It.

from the this-is-why-we-can’t-have-nice-things dept Last January, Democratic California Assemblymember Tasha Boerner introduced the California Affordable Home Internet Act (AB 353), which mandated that large ISPs in the state needed to provide broadband service at speeds of 100 Mbps down, 20 Mbps up for $15 a month to California residents who qualify for existing low-income assistance programs. […]

4 mins read