Scientists have built a prototype neuromorphic computer that thinks like a human brain and is faster than AI at learning new things.
A video is circulating on social media in which a leopard enters the backyard of a house where a child is playing, and a cat confronts the leopard and scares it away, protecting the child. The video has garnered over a million “likes” and has been shared more than 15,000 times.
Another series of videos shows bears or deer jumping on a trampoline in a backyard. In another, three raccoons float down a river riding on three crocodiles. All of these videos are created by artificial intelligence, and thanks to their high degree of realism, appear to be real.
Given the proliferation of these types of videos and the lack of research on this topic in scientific literature, researchers from the GESBIO group at the University of Cordoba—José Guerrero, Francisco Sánchez, Antonio Carpio, Rocío Serrano, and Tamara Murillo—have spotlighted this issue, analyzing the different consequences that these AI-generated videos have on the knowledge and conservation of wild species.
Among other things, Harishankar discovered that the IRL weaponized roomba was sending logs, configuration files, and even unencrypted Wi-Fi credentials to the manufacturer’s servers. It was also running Google Cartographer, enabling the device to create a detailed 3D map of his home.
Most worryingly of all, the programmer found out that the command that shut down the vacuum was issued remotely – suggesting the manufacturer had root access via pre-installed rtty software, which allowed them to run any command or install any script on the device – meaning ILIFE/Zhiyi either manually bricked the vacuum in response to Harishankar blocking data transmission, or had automated scripts that did so.
Most people accept aging as inevitable. Aubrey de Grey refuses to.
In this episode, the world’s most recognized longevity scientist breaks down why aging is a solvable engineering problem — not a mystery of biology.
Aubrey shares the moments that shaped his mission to defeat death, the science behind “longevity escape velocity”, and how AI breakthroughs like AlphaFold are accelerating humanity’s fight against aging.
He also reveals what he actually does to stay biologically younger at 62 — from cutting-edge diagnostics to his take on rapamycin, plasma exchange, GLP-1s, and Brian Johnson’s Blueprint.
If you’re a founder, technologist, or anyone fascinated by the future of the human body — this conversation will completely reframe how you think about aging, biology, and time itself.
Follow Super Human Podcast:
As the use of AI spreads through every industry and becomes more of a part of our lives every day, researchers are also looking into ways it can be used to solve some of the world’s biggest problems. One of these problems is the world’s reliance on plastics for making everything from clothing to medical supplies to food wrappers, which is creating a massive amount of non-biodegradable waste—with more and more piling on every day. Much of this ends up wreaking havoc on various ecosystems and creating an overabundance of microplastics that end up in our food and water supplies.
Clearly, there is a need for recycling these materials. However, plastics remain one of the most difficult materials to recycle efficiently. But now, a team of researchers might have found a way to facilitate the process with the help of AI. Their study, published in Science, details how a neural network helped them find enzymes that can break down plastics faster and more efficiently than any they’ve found on their own.
Microsoft security researchers have discovered a new backdoor malware that uses the OpenAI Assistants API as a covert command-and-control channel.
The company’s Detection and Response Team (DART) discovered the new malware, named SesameOp, during an investigation into a July 2025 cyberattack, which revealed that the malware allowed attackers to gain persistent access to the compromised environment.
Deploying this malware also enabled the threat actors to remotely manage backdoored devices for several months by leveraging legitimate cloud services, rather than relying on dedicated malicious infrastructure that could alert victims to an attack and be taken down during subsequent incident response.