News — Pixelift
Latest Stories
57 articles
ResearchMar 19• MIT Tech Review
The Download: Quantum computing for health, and why the world doesn’t recycle more nuclear waste

SecurityMar 19
DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

SecurityMar 19
CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks

TechMar 19
GB1: The AI from the UK

StartupsMar 18
The leaderboard “you can’t game,” funded by the companies it ranks
IndustryMar 18
Bain Capital taps buyer interest for Bridge Data Centres, offering up to 70% stake, sources say

SecurityMar 18
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

SecurityMar 18
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

SecurityMar 18
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

SecurityMar 18
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

SecurityMar 18• The Hacker News
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

SecurityMar 17
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

StartupsMar 17
H&M wants to make clothing from CO2 using this startup’s tech

AIMar 17
Niv-AI exits stealth to wring more power performance out of GPUs

AIMar 17
How Invisalign Became the World’s Biggest User of 3D Printers

SecurityMar 17• The Hacker News
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

SecurityMar 14
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

ModelsMar 13
Beyond Semantic Similarity: Introducing NVIDIA NeMo Retriever’s Generalizable Agentic Retrieval Pipeline

ResearchMar 13
Why physical AI is becoming manufacturing’s next advantage

AIMar 13
Google's AI Search Results Love to Refer You Back to Google
ModelsMar 13• Hugging Face Blog
Build an Agent That Thinks Like a Data Scientist: How We Hit #1 on DABStep with Reusable Tool Generation

AIMar 12
Atlassian follows Block’s footsteps and cuts staff in the name of AI

SecurityMar 11
Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

SecurityMar 11