Filmmakers experimented with Adobe's Firefly AI platform to make short films that screened Oct. 28 at the Adobe Max user gathering in downtown L.A.
Here are the coolest developmental features that Adobe showcased at Max.
It helps journalists verify hypotheses, reveal hidden insights, follow the money, scale investigations, and add credibility ...
Firefly audio is a brand-new AI model. But that's not your only option. Adobe has been steadily adding to its roster of third-party AI models this year, for both AI video and image. It's expanding ...
Adobe MAX - The Creativity Conference October 28, 2025 4:30 PM EDTCompany ParticipantsDoug ClarkShantanu Narayen - Chairman & ...
Hiring has rapidly changed since AI agents and interviewers came into the picture. Managers are using the tech to sift through thousands of applicants, and job candidates are leveraging the tools to ...
Adobe is finally bringing its Premiere app to iPhones as it fends off competition from a new age of mobile-based video editing apps. Adobe Premiere has been among the most widely used video editing ...
At the most recent NewFronts, TV manufacturers Samsung and LG and Fox-owned streaming service Tubi all talked about integrating QR codes into their ad offerings. The technology, which grew in ...
Last week, Adobe answered the longstanding question of when it was going to update its document technologies for today's AI-powered era of digital collaboration. The launch of Acrobat Studio combines ...
TL;DR: Get 3 years of Adobe Acrobat Classic + Microsoft Office Pro 2021 for Windows — all for $89.99 (MSRP $543.99). Why settle for flimsy PDF tools or sketchy Office alternatives when you can get the ...
PDFs have been around for 30 years but Adobe hopes to make them central to the AI-native workspace with new highly-interactive capabilities. Pause to think about it: The PDF is more than 30 years old.
Adobe Experience Manager <= 6.5.23 contains a misconfiguration vulnerability that allows attackers to bypass security mechanisms and execute arbitrary code, exploit requires no user interaction.