AMD Confirms RDNA 4 GPUs and Zen 5 CPUs Launch Amidst Rising AI Focus

In a significant announcement made during their third-quarter earnings call, AMD’s CEO Lisa Su confirmed the upcoming release of the RDNA 4 GPUs, set to hit the market in early 2025. This next-generation technology promises to significantly enhance gaming and ray tracing performance, addressing a major shortcoming of the RDNA 3 line. AMD is also expected to incorporate new AI capabilities in these GPUs, likely aimed at improving AI-assisted upscaling technologies, reflecting AMD’s ambition to be recognized as an "AI company" akin to its rival Nvidia. AMD’s renewed focus on AI places it strategically to compete more aggressively in the graphics and computing sectors, aiming to capture a larger market share by leveraging these advanced capabilities.

Expanding CPU Lineup

AMD’s roadmap does not stop with GPUs; the company also plans to unveil a range of new CPUs soon, enhancing both its mobile and desktop offerings. Among the key anticipated releases are the high-end Strix Halo mobile CPU and the Zen 5 X3D CPUs, which will be available in 16-core and 12-core configurations. In addition to these, AMD is set to release mobile Zen 5 CPUs, dubbed Fire Range, and affordable Zen 5 mobile CPUs, named Kraken Point. These launches are strategically timed, likely to coincide with the CES trade show in January 2025, providing AMD with a high-profile platform to showcase its latest innovations to a global audience. The introduction of these CPUs is expected to bolster AMD’s position in both the high-performance and budget-friendly segments of the market.

Competitive Landscape and Market Position

AMD’s intensified focus on AI positions it to compete more effectively in the graphics and computing markets. By leveraging these advanced capabilities, AMD aims to capture a larger market share. With the RDNA 4 series, AMD hopes to make significant strides in both performance and AI integration, reflecting the company’s broader strategy to innovate and maintain a competitive edge in an increasingly AI-driven industry. The new GPUs are anticipated to set a new standard in the industry, elevating AMD’s standing as a leader in technology.

Explore more

SAP Patches Critical Code Injection Flaw in S/4HANA

A single vulnerability hidden within a core enterprise application can unravel an organization’s entire security posture, and SAP’s latest security bulletin underscores this reality with alarming clarity. This is not just another monthly cycle of software maintenance; the February 2026 Security Patch Day is a critical call to action for enterprises worldwide. With 26 new Security Notes, the bulletin addresses

Why Are Microsoft 365 Admins Locked Out in NA?

With us today is Dominic Jainy, an IT professional whose expertise in AI and blockchain offers a unique perspective on the intricate systems powering today’s enterprises. We’re diving into the recent Microsoft 365 admin center outage that impacted thousands of administrators across North America, exploring its cascading effects, the specific challenges it posed for businesses of all sizes, and what

ILOVEPOOP Toolkit Exploits React2Shell Vulnerability

The window between the disclosure of a critical software vulnerability and its widespread exploitation has collapsed to mere hours, a reality starkly illustrated by the recent React2Shell crisis. This research summary analyzes the “ILOVEPOOP” toolkit, a sophisticated framework that rapidly began exploiting the critical React2Shell vulnerability (CVE-2025-55182). The following sections address the toolkit’s operational mechanics, its underlying infrastructure, and its

Ivanti EPM Vulnerabilities – Review

The widespread deployment of comprehensive IT management platforms has created a centralized point of control for enterprises, but it has also introduced a highly attractive target for malicious actors seeking to compromise entire networks. Ivanti’s Endpoint Manager (EPM) represents a significant component in enterprise IT infrastructure management. This review will explore two recently disclosed, critical vulnerabilities, their technical specifications, potential

Fake 7-Zip Installer Turns PCs Into Proxy Nodes

A seemingly harmless download of a widely trusted utility has become the entry point for a sophisticated campaign that quietly transforms personal computers into unwitting accomplices for cybercriminals. The threat exploits the reputation of the popular 7-Zip file archiver, luring unsuspecting individuals into installing a trojanized version that enlists their machines into a residential proxy network. This guide breaks down