Intel has added a new capability to its Core Ultra systems which echoes an earlier move from AMD.
The feature, known as "Shared GPU Memory Override," allows users to allocate additional system RAM for use by integrated graphics.
This development is targeted at machines that rely on integrated solutions rather than discrete GPUs, a category that includes many compact laptops and mobile workstation models.
Memory allocation and gaming performanceBob Duffy, who leads Graphics and AI Evangelism at Intel, confirmed the update and advised that the latest Intel Arc drivers are required to enable the function.
The change is presented as a way of enhancing system flexibility, particularly for users interested in AI tools and workloads that depend on memory availability.
The introduction of extra shared memory is not automatically a benefit for every application, as testing has shown that some games may load larger textures if more memory is available, which can actually cause performance to dip rather than improve.
AMD’s earlier "Variable Graphics Memory" was framed largely as a gaming enhancement, especially when combined with AFMF.
That combination allowed more game assets to be stored directly in memory, which sometimes produced measurable gains.
Although the impact was not universal, results varied depending on the software in question.
Intel’s adoption of a comparable system suggests it is keen to remain competitive, although skepticism remains over how broadly it will benefit everyday users.
While gamers may see mixed outcomes, those working with local models could stand to gain more from Intel’s approach.
Running large language models locally is becoming increasingly common, and these workloads are often limited by available memory.
By extending the pool of RAM available to integrated graphics, Intel is positioning its systems to handle larger models that would otherwise be constrained.
This may allow users to offload more of the model onto VRAM, reducing bottlenecks and improving stability when running AI tools.
For researchers and developers without access to a discrete GPU, this could offer a modest but useful improvement.
You might also likeThe military vehicle, which is designed to withstand explosive attacks, collided with a "civilian vehicle" just after 6 a.m. on Wednesday in the Capitol Hill neighborhood of Washington, D.C.
(Image credit: Andrew Caballero-Reynolds)
Cybercriminals have been found using Skype messenger to deliver Remote Access Trojans (RAT) malware, compromising victim's computers and opening the doors for devastating stage-two attacks.
Cybersecurity researchers at Kaspersky recently uncovered a previously unseen malware variant called GodRAT being distributed via malicious screensaver files, disguised as financial documents.
Unusually, the miscreants were delivering the malware to their victims via Skype messenger until March 2025, when they pivoted to other channels.
GodRAT malware being spreadFirst off, the hackers would share fake financial data in an image file. By using steganography, they would hide shellcode in the files which, when activated, downloads the GodRAT malware from a third-party server.
The RAT harvests operating system details, local hostname, malware process name and process ID, the user account associated with the malware process, installed antivirus software, and the presence of a capture driver.
After that, GodRAT can receive additional plugins, depending on the initial information shared with the attackers. These plugins can be file explorers, or password stealers.
In some cases, the crooks used GodRAT to deploy AsyncRAT, a secondary implant that granted them prolonged, if not permanent, access.
“GodRAT appears to be an evolution of AwesomePuppet, which was reported by Kaspersky in 2023 and is likely linked to the Winnti APT. Its distribution methods, rare command-line parameters, code similarities with Gh0st RAT, and shared artifacts - such as a distinctive fingerprint header - suggest a common origin,” said Saurabh Sharma, Security Researcher at Kaspersky GReAT.
“The discovery of GodRAT demonstrates how such long-known tools can remain relevant in today’s cybersecurity landscape,”
Kaspersky did not discuss the number of victims, or potential success rate of the campaign, but it did stress that the victims were mostly small and medium-sized businesses (SMB) in UAE, Hong Kong, Jordan, and Lebanon.
You might also likeThe White House said that after the administration eliminates "woke" culture from the Smithsonian, it would expand to other museums around the country. Would that be possible?
(Image credit: Andrew Harnik)
Health innovations are everywhere. From a cancer vaccine to an Alzheimer's blood test to a life-changing exoskeleton, we take you on a tour of the economics of health technology.