Blog

  • Ikegami Introduces Wireless Version of its UHK-X700 Television Camera

    Ikegami Introduces Wireless Version of its UHK-X700 Television Camera

    Continue Reading

  • Google says ‘Big Sleep’ AI tool found bug hackers planned to use

    Google says ‘Big Sleep’ AI tool found bug hackers planned to use

    Google said a large language model it developed to find vulnerabilities recently discovered a bug that hackers were preparing to use.

    Late last year, Google announced an AI agent called Big Sleep — a project that evolved out of work on vulnerability research assisted by large language models done by  Google Project Zero and Google DeepMind. The tool actively searches and finds unknown security vulnerabilities in software.

    On Tuesday, Google said Big Sleep managed to discover CVE-2025-6965 — a critical security flaw that Google said was “only known to threat actors and was at risk of being exploited.”

    The vulnerability impacts SQLite, an open-source database engine popular among developers. Google claims it was “able to actually predict that a vulnerability was imminently going to be used” and was able to cut it off beforehand. 

    “We believe this is the first time an AI agent has been used to directly foil efforts to exploit a vulnerability in the wild,” the company said. 

    A Google spokesperson told Recorded Future News that the company’s threat intelligence group was “able to identify artifacts indicating the threat actors were staging a zero day but could not immediately identify the vulnerability.” 

    “The limited indicators were passed along to other Google team members at the zero day initiative who leveraged Big Sleep to isolate the vulnerability the adversary was preparing to exploit in their operations,” they said.

    The company declined to elaborate on who the threat actors were or what indicators were discovered. 

    In a blog post touting a variety of AI developments, Google said since Big Sleep debuted in November, it has discovered multiple real-world vulnerabilities, “exceeding” the company’s expectations. 

    Google said they are now using Big Sleep to help secure open-source projects and called AI agents a “game changer” because they “can free up security teams to focus on high-complexity threats, dramatically scaling their impact and reach.”

    The tech giant published a white paper on how they built their own AI agents in a way that allegedly safeguards privacy, limits potential “rogue actions” and operates with transparency. 

    Dozens of companies and U.S. government bodies are hard at work developing AI tools built to quickly search for and discover vulnerabilities in code. 

    Next month, the U.S. Defense Department will announce the winners of a years-long competition to use AI to create systems that can automatically secure the critical code that undergirds prominent systems used across the globe.

    Get more insights with the

    Recorded Future

    Intelligence Cloud.

    Learn more.

    Continue Reading

  • Cooper Koch, Jason Isaacs, Carrie Coon Talk Emmy Nominations

    Cooper Koch, Jason Isaacs, Carrie Coon Talk Emmy Nominations

    Lead Limited or Anthology Series Actor Actor

    Were you watching the nominations being announced? 

    I am jet lagged because I was in London yesterday at Wimbledon, which was the best weekend of my life. I was in Europe for a week, so I went to bed at 8:30 a.m. and then woke up at 3 a.m. and then never went back to sleep. I watched the nominations with my brother and my mom and my partner. It was the first [category] out the gate. It was intense. And then being the last one read, I was like, “Oh, god.” 

    Let’s go back to your first day on set. Did you think your journey would include an Emmy nomination?  

    Because “Dahmer” did so well, I was like, “OK, there’s a shot here.” But you never know. It feels so amazing and validating to be recognized like this. But just doing the show and having the experience, and working with Ryan and Ari and Nicholas and Javier and Chloe and the whole cast and crew and everybody, that’s really the true gift of it all.  

    How will you celebrate tonight?  

    It’s my birthday tomorrow so this was a great birthday present. My grandparents are taking us [Koch and his twin brother Peyton] to Nobu tonight.  

    Have you spoken to Erik and Lyle Menendez recently?  

    I was messaging them in the last couple of days because we saw that there was news on the habeas corpus. Wait, I’m literally getting a call right now from R.J. Donovan [Correctional Facility]. Can I call you back? 


    [10 minutes later] 

    Was that Erik? 

    No, it was Lyle to congratulate me, which was very very sweet. 

    Is that surreal for you?  

    Kind of, but also it’s not, because I know them now. I feel like they’re my friends, like my brothers. So it does kind of feel normal. It’ll feel way better when they’re out of there.  

    What did Lyle say? 

    He was just like, “Congratulations, I’m so excited for you. I saw you were at Wimbledon. I was so jealous.” I said, “Well, I’ve been back in tennis lessons, so I’m getting ready to play you and beat you when you’re out.”  

    I’m sure you’ll talk to Erik later.  

    Exactly. I’ll hear from him later. 

    You were just cast in Luca Guadagnino’s AI film “Artificial” with Andrew Garfield. How did that come about? Did you have to audition? 

    I was flying home from Paris Fashion Week and the second I landed, I got a call from my team saying that Luca offered me a part in the film. The offer just came in. It was so shocking, but also felt amazing. I’ve been having a lot of self-doubt and questioning things and wondering where the next part is going to be, so for it to come in so randomly… I’m blessed. 

    It’s being called a comedic drama about artificial intelligence. Is there anything funny about AI anymore?  

    I don’t know if I can say anything. I’m not sure what I can say. My lips are sealed. Sorry. 

    You’ve probably seen some interesting AI depictions of you on the internet. 

    I haven’t seen any of me, but I’ve seen animals doing the Olympics diving on TikTok.

    On a serious note, a lot of people in Hollywood are worried about losing jobs to AI or unauthorized use of their likeness. Does it make you nervous?  

    It doesn’t really make me nervous because I just don’t think like my soul and my person can be truly replicated by a computer. I think I’m too special for that. 

    Continue Reading

  • Facing the future: Protecting utilities’ supply chains against AI’s evolving threats

    Facing the future: Protecting utilities’ supply chains against AI’s evolving threats

    The utilities sector is currently in a digital transformation, with AI-driven monitoring, smart grids, and automation bringing unprecedented change to the industry, according to the UK Utilities Risk Report 2025.

    The benefits of these advancements are well documented, improving efficiency and enabling increasingly complex and interconnected supply chains to work more easily together. But alongside the benefits, they also introduce new and ever-evolving risks.

    For cyber-attackers the utilities sector is a high-value target. Rather than simply stealing data, they can disrupt critical infrastructure, bringing chaos to services crucial to businesses and individuals.

    With new technologies introducing unknown dangers, leaders are now under pressure to understand their own vulnerabilities and those within their supply chains, prepare for potential cyberattacks, and build digital assets that are fit for the future.

    Disruption to utilities in the AI era

    While traditional disruptions such as port closures, extreme weather, and geopolitical tensions still pose challenges, AI is emerging as one of the key threats to the utilities sector.

    The digitisation of supply chains has given rise to a greater risk of cyber breaches, with threat actors weaponising AI to launch bigger, more comprehensive attacks.

    Threat actors use AI to:

    • Scan for vulnerabilities — they might typically focus on warehouse or transportation systems.
    • Automate phishing campaigns — emails could be sent en masse to logistics staff to trick them into revealing sensitive information.
    • Disrupt inventory systems — a move that could lead to supply chain chaos.

    Not just data theft: Why supply chains are attackers’ latest target

    The interconnected nature of utilities means attackers can now bring down essential infrastructure such as power and water supplies. Our global supply chains are becoming increasingly vulnerable to this sort of security breach.

    • Florida water treatment facility: In 2021, a hacker was able to use a dormant remote access software platform to infiltrate a water treatment plant’s system with the intention of poisoning a Florida city’s water supply.
    • Synnovis pathology services: Synnovis, a provider of pathology services to the NHS, was hit by an attack in the summer of 2024 that cost an estimated £32.7 million and resulted in thousands of missed patient appointments.
    • Hypothetical attack: The Government claims that a hypothetical cyberattack focused on key energy services in the South East of England could wipe over £49 billion from the wider UK economy.

    The Government’s Cyber Security and Resilience Bill, which will be introduced to Parliament later this year, sets out new laws to boost supply chain protection and improve critical service cyber defences. It also includes tough penalties for those managed service providers failing to patch vulnerabilities.

    This new legislation is in addition to the laws and regulations already in place, with penalties of up to £17 million for those who fail to implement proper cybersecurity measures.

    Protecting against supply chain risks

    The utilities sector’s supply chains typically include digital third-party suppliers. However, with each external connection to a utility’s network providing a gateway through which cyberattackers can gain access, the hidden security risks of these chains are intensifying.

    It takes just one compromised vendor to infiltrate an entire service, enabling hackers to access sensitive data, introduce malware, or cause widespread disruption.

    How to strengthen supply chain security

    • Carry out risk assessments: Conduct thorough risk assessments on a vendor’s cybersecurity protocols before allowing system access.
    • Restrict access permissions: Ensure all suppliers’ access permissions are restricted to essential levels only.
    • Introduce cyber clauses: Embed cyber resilience clauses in supplier contracts to ensure each vendor is held accountable for their own cybersecurity.

    Balancing progress with risk management

    With digital transformation across utilities gathering pace, the challenge of leaders is to ensure their organisation keeps up with the changes while retaining the highest level of cybersecurity.

    Mitigating risk:

    • Implement continuous risk assessments, as rolling risk assessments are crucial to keep pace with emerging threats and hacker capabilities.
    • Don’t forget human error, as human error will remain a significant threat, so prioritise regular staff training to keep them aware of issues around cybersecurity.
    • Keep regulatory knowledge up to date, as failing to do so can lead to financial penalties, exclusion from contracts, and reputational damage. Non-compliance can lead to a whole host of problems.

    Future-proof your business

    Cybersecurity is no longer a case of protecting a single organisation — robust defence strategies are vital to protect critical infrastructure as a whole. By designing mitigations, leaders can take proactive measures to strengthen supply chain security — and build a business that’s fit for the future.

    Strategic support for cybersecurity-savvy utilities

    Marsh McLennan offers comprehensive support to help utilities address cybersecurity and build long-term resilience. Services include:

    • A consultative strategy, ensuring cybersecurity is integrated into business resilience planning.
    • Tailored solutions based on industry-specific risks and regulatory requirements.
    • Cyber risk assessments to identify and fix vulnerabilities.
    • Cyber insurance solutions to mitigate financial exposure.
    • Operational resilience strategies to protect critical systems from cyber-physical threats.
    • Incident response planning to ensure rapid recovery from cyberattacks.
    • Compliance advisory services to help utilities meet evolving regulatory requirements.
    • Supply chain risk monitoring to track vulnerabilities across digital vendors.
    • Conduct risk assessments to prepare for emerging threats and hacker capabilities.

    If you would like to discuss any topic raised in this article, please contact us.

    Continue Reading

  • Tara Moore: British tennis player banned for four years for doping offence

    Tara Moore: British tennis player banned for four years for doping offence

    The British player said she had suffered “19 months of lost time and emotional distress”, and that her reputation had been damaged as a result of the case.

    She returned to the tour in April 2024 and has played mostly on the ITF World Tour since.

    Earnings for doubles players are meagre, although Moore did make it into the main draw for Wimbledon and the US Open last year, as well as for the Australian Open this January.

    But following a hearing in March, this ruling from Cas means she will not be free to play again until the start of the 2028 season.

    “After reviewing the scientific and legal evidence, the majority of the Cas panel considered that the player did not succeed in proving that the concentration of nandrolone in her sample was consistent with the ingestion of contaminated meat,” Cas said in a media release.

    “The panel concluded that Ms Moore failed to establish that the ADRV (Anti-Doping Rule Violation) was not intentional. The appeal by the ITIA is therefore upheld and the decision rendered by the Independent Tribunal is set aside.”

    Continue Reading

  • Vast river landscapes discovered beneath Antarctica’s thick ice

    Vast river landscapes discovered beneath Antarctica’s thick ice

    Hidden beneath East Antarctica’s thick ice lie secrets from a warmer, ancient world. For decades, scientists have speculated about what lies under this frozen continent. 

    Researchers have uncovered remnants of vast prehistoric river landscapes buried beneath East Antarctica. These hidden features could help refine predictions about the future of our planet’s ice and oceans.

    Plains found under East Antarctica’s ice


    A team led by researchers from Durham University studied radar data across a 3,500 km (2,175 mile) stretch of Antarctica, from Princess Elizabeth Land to George V Land.

    They discovered 31 flat surfaces beneath the East Antarctic Ice Sheet (EAIS). These surfaces, preserved under ice as thick as 2,500 meters (8,200 feet), appear as coherent, low-relief plains.

    The study showed that they were once part of a single fluvial landscape that formed after East Antarctica separated from Australia.

    The researchers used data from four major airborne surveys. Their detailed analysis revealed gently sloping surfaces with consistent elevations, now separated by deep glacial troughs.

    These plains dip coastward and cluster around 200 to 450 meters (656 to 1,476 feet) above present sea level, once adjusted for ice unloading.

    Origins in ancient river systems

    The scientists interpret the surfaces as remnants of ancient river plains. After the continents split, rivers eroded the land to a base level, creating a vast, seaward-sloping plain.

    These features closely resemble those along the Australian coast, which formed through similar processes.

    According to the team, the plains likely developed between 80 and 34 million years ago, after the breakup and before widespread glaciation.

    “Information such as the shape and geology of the newly mapped surfaces will help improve our understanding of how ice flows at the edge of East Antarctica,” said Dr. Guy Paxman.

    “This, in turn, will help make it easier to predict how the East Antarctic Ice Sheet could affect sea levels under different levels of climate warming in the future.”

    Surfaces in East Antarctica survived ice

    Remarkably, these river-carved surfaces have survived beneath the ice for over 30 million years.

    They were not destroyed by glacial erosion. Instead, fast-moving ice carved deep troughs between them, leaving the flat surfaces mostly intact. These areas likely remained frozen at the base, which reduced erosion.

    The topography beneath the Antarctic Ice Sheet. Credit: Open-access s-ink.org repository
    The topography beneath the Antarctic Ice Sheet. Click image to enlarge. Credit: Open-access s-ink.org repository

    Research shows that today’s fast-flowing glaciers, such as Totten and Denman, move through these deeper troughs.

    Meanwhile, the ice above the flat surfaces is slow-moving and cold-based, further preserving the landscape.

    Bedrock confirms river, not ice origins

    The researchers found that the surfaces cross different geological provinces, including crystalline gneisses and sedimentary rocks.

    This confirms that the surfaces did not form due to rock boundaries. They formed from river erosion, not through ice or marine processes. Their consistency in elevation and slope supports this.

    Some of these surfaces now align with exposed regions like the Bunger and Vestfold Hills. These exposed features show signs of glacial scouring, but not enough to erase the original fluvial structure.

    The research suggests limited modification by ice, mostly during the Oligocene or early Miocene periods.

    Influence on future ice sheet retreat

    These buried plains are not just ancient relics. They still shape the modern flow of the EAIS. Ice moves fastest through the troughs, not over the flat surfaces.

    The researchers argue that these plains could anchor ice during future warming events, potentially forming grounded ice rises.

    “This study brings the jigsaw pieces of data together, to reveal the big picture: how these ancient surfaces formed, their role in determining the present-day flow of the ice, and their possible influence on how the East Antarctic Ice Sheet will evolve in a warming world,” noted Professor Neil Ross.

    Slowing East Antarctica’s ice loss

    The presence of these elevated plains buried under the ice could slow the retreat of grounding lines.

    If ice shelves collapse during warming, some grounded ice might remain over these surfaces. This would reduce ice loss into the ocean. In regions like Law Dome, some surfaces already host ice rises, which help anchor and stabilize the inland ice.

    However, current large-scale ice sheet models often overlook these features. Their resolution is too low to capture how these plains affect grounding-line behavior.

    The authors urge more drilling and high-resolution modeling to better understand the role of these features.

    This could change sea level predictions

    East Antarctica holds about 90 percent of Antarctica’s ice. If this ice sheet melted, it would raise sea levels by 52 meters (171 feet). Improving how we model its behavior is essential.

    These hidden landscapes offer a new constraint on where ice will likely remain stable.

    The study’s detailed data on elevation, slope, and bedrock composition provide critical insights. They help scientists to project more accurately the responses of the EAIS to future climate change.

    The findings highlight the value of geophysical surveys in revealing what lies beneath the ice and how it might shape our future.

    The research appears in Nature Geoscience and is supported by institutions in the U.K., Germany, China, and Australia.

    —–

    Like what you read? Subscribe to our newsletter for engaging articles, exclusive content, and the latest updates. 

    Check us out on EarthSnap, a free app brought to you by Eric Ralls and Earth.com.

    —–


    Continue Reading

  • ‘Madam Secretary’ TV spouses Téa Leoni and Tim Daly marry

    ‘Madam Secretary’ TV spouses Téa Leoni and Tim Daly marry

    Téa Leoni and Tim Daly, I now pronounce you Mr. & Mrs. “Madam Secretary.”

    The pair of actors, who shared the screen on the CBS political drama, will now share a life together as husband and wife, making their TV romance a reality. Leoni, 59, and Daly, 69, tied the knot Sunday in a private ceremony, The Times confirmed Tuesday.

    Leoni and Daly began dating in the summer of 2014 and starred in “Madam Secretary” as United States Secretary of State Elizabeth McCord and her scholar husband Henry McCord. The series aired on CBS from September 2014 to December 2019.

    A representative for Leoni did not confirm additional details about the newlyweds’ ceremony, but People reported that the actors’ intimate nuptials took place in New York with only immediate family as attendees.

    Leoni and Daly began their romance just before the former finalized her divorce with “X Files” star David Duchovny. Leoni and Duchovny wed in 1997 after meeting on “The Tonight Show” and share two adult children, actor West Duchovny and Kyd Miller Duchovny. Before David Duchovny, Leoni was married to TV producer Neil Joseph Tardio Jr. from 1991 to 1995.

    Daly’s marriage to Leoni marks his second: He was previously married to theater actor Amy Van Nostrand. The exes share children Sam and Emelyn.

    Before crossing paths on “Madam Secretary,” both Leoni and Daly had established their screen careers with a variety of TV and film credits. Leoni came to the CBS series with films including “Bad Boys,” “Spanglish” and “Jurassic Park III” under her belt. She also appeared in the series “The Naked Truth” and “Flying Blind.” Daly’s resume includes the series “Wings” and “Private Practice,” and he voiced Superman in several animated projects.

    In a March 2024 interview with the “Really Famous With Kara Mayer Robinson” podcast, Daly spoke to its host about finding love on “Madam Secretary.” He said his views about starting a committed relationship later in his life changed once he met Leoni.

    “It’s the deepest, most fun, most truly intimate relationship I’ve ever had,” he said.

    Continue Reading

  • AirPods Pro 2 Hearing Aid and Hearing Test Features Expand to New Countries

    AirPods Pro 2 Hearing Aid and Hearing Test Features Expand to New Countries

    Apple is bringing the AirPods Pro 2 Hearing Tests and Hearing Aid functionality to multiple new countries in Europe, Asia, and South America.

    Hearing test options are now available in the following countries:

    • Argentina
    • Ecuador
    • Honduras
    • Indonesia
    • Israel
    • Kazakhstan
    • Moldova
    • Palestinian Territories
    • Serbia
    • Taiwan
    • Thailand
    • Ukraine
    • Vietnam

    Hearing tests can be conducted by connecting the ‌AirPods Pro‌ 2 to an iPhone running iOS 18.1 or later or an iPad running iPadOS 18.1 or later. The ‌AirPods Pro‌ 2 hearing test mimics the hearing tests one might encounter at a doctor’s office or when visiting an audiologist.

    Tones at different frequencies and sound levels play in each ear, with users instructed to tap the ‌iPhone‌’s display whenever a sound is heard. Apple tests four frequencies, including 500Hz, 1kHz, 2kHz, and 4kHz. Results up to 25 dBHL indicate little to no hearing loss. 26 to 40 dBHL is a sign of mild hearing loss, while results of 41 to 60 dBHL suggest moderate hearing loss. 61 to 80 dBHL is severe hearing loss, and a result above 80 dBHL is considered profound hearing loss.

    Tests that demonstrate mild to moderate hearing loss will give ‌iPhone‌ users the option to turn on the Hearing Aid feature of the ‌AirPods Pro‌ in countries where it is available. Hearing Aid functionality is expanding to these locations:

    • Cyprus
    • Ecuador
    • Honduras
    • Indonesia
    • Israel
    • Kazakhstan
    • Moldova
    • Palestinian Territories
    • Serbia
    • Taiwan
    • Thailand
    • Ukraine
    • Vietnam

    Cyprus already had hearing testing available, and while Argentina is new to the Hearing Aid test list, it does not yet support Hearing Aid features with ‌AirPods Pro‌ 2. In all other countries listed in this article, both the Hearing Tests and Hearing Aid are newly available.

    When Hearing Aid functionality is turned on, the ‌AirPods Pro‌ can use the data from a person’s hearing test to boost the frequencies that are lacking. The Hearing Aid features are meant to make it easier for users to hear voices and other sounds, with Apple also offering a Media Assist option that adjusts music, videos, and calls in response to a hearing test.

    Hearing Health options, including the Hearing Test and Hearing Aid features, are now available in over 150 countries around the world. A full list is available on Apple’s website.

    Continue Reading

  • Curation Picks: Zen Mechanics, Egorythmia – Shores of the Subconscious (E-Clip Remix)

    Curation Picks: Zen Mechanics, Egorythmia – Shores of the Subconscious (E-Clip Remix)

    E-Clip takes on Zen Mechanics & Egorythmia’s classic psy-trance tune “Shores of the Subconscious” and gives it a stunning new life – staying true to its roots while adding his unmistakable touch. Deep, rolling, and atmospheric, this remix is pure Progressive Psy done right, which lands as part of The First Vibration, E-Clip’s bold new album and the release on his own imprint, Sounds Of Akasha.

    Continue Reading

  • Sarah Jessica Parker turns down fans hopes about much awaited show

    Sarah Jessica Parker turns down fans hopes about much awaited show

    Photo: Sarah Jessica Parker clears the air about development of much awaited show

    Sarah Jessica Parker recently shared that she has been champing at the bit to receive greenlight about Hocus Pocus 3.

    While appearing on the latest episode of Watch What Happens Live! the actress weighed in on the development of the Hocus Pocus 3, which was teased by Disney + around two years ago, but has not materialized yet.

    “No more developments other than we would like to do it,” Sara shared and added, “We’ve been having some conversations.”

    For those unversed, Jen D’Angelo, the screenwriter of Hocus Pocus 2, confirmed to Entertainment Weekly in 2023 after the end the end of the WGA strike that magical series’ development will resume.

    At that time, he said, “We’re still in the story phase, we’re still working on it.”

    “We’ve been working on some ideas. It’s been fun to dive back into that world and we have so many directions in which to go and so many new characters to explore. We’ve only scratched the surface of Hannah Waddingham’s mother witch.”


    Continue Reading