{"id":59372,"date":"2025-09-19T02:00:40","date_gmt":"2025-09-19T02:00:40","guid":{"rendered":"http:\/\/342869d2-ea0b-442f-9d4a-5461c31b03ce"},"modified":"2025-09-19T02:00:40","modified_gmt":"2025-09-19T02:00:40","slug":"luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/","title":{"rendered":"Luma AI created an AI video model that &#8216;reasons&#8217; &#8211; what it does differently"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b4e5c82329d703e5edc53adc6d51bcb0e0ee7c03\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=768\" alt=\"gettyimages-2179177944\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/95965a0b2663d7b676816a959fd96b11c4697716\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1024\" alt=\"gettyimages-2179177944\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\" alt=\"gettyimages-2179177944\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\" alt=\"gettyimages-2179177944\" width=\"1280\" height=\"719.199272065514\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Aleksandra Konoplia\/Moment via Getty Images<\/span><\/figcaption><\/figure>\n<p><em>Follow ZDNET:&nbsp;<\/em><span class=\"c-commerceLink\"><a href=\"https:\/\/cc.zdnet.com\/v1\/otc\/00hQi47eqnEWQ6T9d4QLBUc?element=BODY&amp;element_label=Add+us+as+a+preferred+source&amp;module=LINK&amp;object_type=text-link&amp;object_uuid=fe21ff0d-75f0-4b9e-86db-1e4192ff0ca2&amp;position=1&amp;split_test_identifier=deals_module&amp;split_test_variant=test2&amp;template=article&amp;track_code=__COM_CLICK_ID__&amp;url=https%3A%2F%2Fcc.zdnet.com%2Fv1%2Fotc%2F00hQi47eqnEWQ6T9d4QLBUc%3Felement%3DBODY%26element_label%3DAdd%2Bus%2Bas%2Ba%2Bpreferred%2BGoogle%2Bsource%26module%3DLINK%26object_type%3Dtext-link%26object_uuid%3D5e5d2e64-4b30-43e6-8555-26eac7e449f3%26position%3D1%26template%3Darticle%26track_code%3D__COM_CLICK_ID__%26url%3Dhttps%253A%252F%252Fwww.google.com%252Fpreferences%252Fsource%253Fq%253Dzdnet.com%26view_instance_uuid%3D379e95d2-6b56-476b-a90b-043a8dd63bd3&amp;view_instance_uuid=ccc173fa-6df3-4e69-b7c7-e45ca03c26b8\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>Add us as a preferred source<\/span><!----><\/a><\/span><em>&nbsp;on Google.<\/em><\/p>\n<hr>\n<h3>ZDNET&#8217;s key takeaways<\/h3>\n<ul>\n<li>Ray3 has multimodal reasoning abilities, according to Luma AI.<\/li>\n<li>AI developers are pushing video models onto creative industries.<\/li>\n<li>Some tools are positioned as automated creative partners.<\/li>\n<\/ul>\n<hr>\n<p>Just a few years ago, AI-generated video clips were a laughing stock on the internet &#8212; anyone remember the nightmarish video of AI-generated <span class=\"c-commerceLink\"><a href=\"https:\/\/www.youtube.com\/shorts\/lMz9_YNg1Wk\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>Will Smith wolfing down spaghetti<\/span><!----><\/a><\/span>? The technology has come a long way since then: Today, tech startups are competing to deliver generative AI tools which, at least in their vision of the future, aim to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/google-flow-is-a-new-ai-video-generator-meant-for-filmmakers-how-to-try-it-today\/\">rival the quality of Hollywood production studios<\/a> &#8212; at a tiny fraction of the cost.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/this-new-ai-video-editor-is-an-all-in-one-production-service-for-filmmakers-how-to-try-it\/\">This new AI video editor is an all-in-one production service for filmmakers &#8211; how to try it<\/a><\/strong><\/p>\n<p>In the latest development in that competition, AI startup <span class=\"c-commerceLink\"><a href=\"https:\/\/lumalabs.ai\/\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>Luma AI<\/span><!----><\/a><\/span> announced its new video-generating model, Ray3, on Thursday. Its other product, <a href=\"https:\/\/www.zdnet.com\/article\/how-to-create-ai-generated-videos-with-luma-dream-machine\/\">Luma Dream Machine<\/a>, lets users create videos from just their photos.&nbsp;<\/p>\n<p>The model is available now through <span class=\"c-commerceLink\"><a href=\"https:\/\/lumalabs.ai\/dream-machine\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>Dream Machine<\/span><!----><\/a><\/span>. It&#8217;s also accessible to paying customers of Adobe&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/adobe-firefly-can-now-generate-ai-sound-effects-for-videos-and-im-seriously-impressed\/\">Firefly<\/a> and Creative Cloud Pro, who can generate unlimited videos through the model until Oct. 1.<\/p>\n<h2>A &#8220;reasoning&#8221; AI video model<\/h2>\n<p>You&#8217;ve heard of so-called reasoning models like <a href=\"https:\/\/www.zdnet.com\/article\/openai-just-dropped-new-o3-and-o4-mini-reasoning-ai-models-and-a-surprise-agent\/\">OpenAI&#8217;s o3<\/a>, which are thought to consider a query, especially complex ones, for more time than standard generative AI models in order to return a more helpful and thorough answer. But thus far, those models haven&#8217;t had video-generating capabilities.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/ais-not-reasoning-at-all-how-this-team-debunked-the-industry-hype\/\">AI&#8217;s not &#8216;reasoning&#8217; at all &#8211; how this team debunked the industry hype<\/a><\/strong><\/p>\n<p>Ray3, according to Luma AI, stands apart from competing tools from companies like <a href=\"https:\/\/www.zdnet.com\/article\/googles-veo-3-ai-video-generator-is-now-available-to-everyone-heres-how-to-try-it\/\">Google<\/a>, <a href=\"https:\/\/www.pcmag.com\/news\/runway-ais-new-tool-will-let-you-make-video-games\">Runway<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/meta-says-its-movie-gen-marks-real-advance-in-ai-video-generation\/\">Meta<\/a>, and <a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-openais-sora-to-create-stunning-ai-generated-videos\/\">OpenAI<\/a> primarily due to its ability to &#8220;reason&#8221; while generating video clips.&nbsp;<\/p>\n<p>This is a vaguely defined and ontologically debatable term that&#8217;s thrown around a lot these days in how AI systems are marketed, a bit like &#8220;understanding,&#8221; &#8220;creativity,&#8221; and &#8220;agency.&#8221; In simple terms, it refers to a model&#8217;s ability to break problems down into multiple steps, reflect on the quality of its outputs, and iteratively improve upon them over time.<\/p>\n<p>Rather than just generating video from a text prompt, Ray3 breaks the production process down into multiple steps, just as a creative team would. It has multimodal reasoning capabilities, meaning it can generate text along with visual assets to help users sketch out the concepts for the final video.&nbsp;<\/p>\n<p>Filmmakers could, for example, prompt the system to annotate images or suggest camera angles for sequences of shots. The model is also the first of its kind, according to Luma AI, to be able to deliver video outputs in 4K high dynamic range, which means it offers a much broader visual spectrum of light and shadow.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/will-ai-damage-ai-human-creativity-most-americans-say-yes\/\">Will AI damage human creativity? Most Americans say yes<\/a><\/strong><\/p>\n<p>&#8220;The result is videos that feel more coherent, with characters that look consistent, scenes that unfold naturally over time, and physics that behave as they should,&#8221; Luma AI wrote in a&nbsp;<span class=\"c-commerceLink\"><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250918470219\/en\/Luma-AI-Launches-Ray3-The-Worlds-First-Reasoning-Video-Model-and-the-First-to-Generate-High-fidelity-16-Bit-HDR\" rel=\"noopener nofollow sponsored\" target=\"_blank\"><span>press release<\/span><!----><\/a><\/span>.<\/p>\n<p>Luma AI has not publicly disclosed any limits on the length of videos that Ray3 can generate, and the company did not immediately respond to ZDNET&#8217;s request for comment on this subject.<\/p>\n<h2>Automated creative partners<\/h2>\n<p>Luma AI is positioning Ray3 as an automated creative partner for filmmakers, video game designers, and advertisers.&nbsp;<\/p>\n<p>A new &#8220;draft mode,&#8221; for example, enables Ray3 to quickly generate a variety of test clips, each with subtle variations, providing creative teams with a range of options and saving them time on the ideation process.&nbsp;<\/p>\n<p>&#8220;This lets creators enter a state of flow, experimenting freely without worrying about time or compute costs,&#8221; Luma AI wrote.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/ai-models-know-when-theyre-being-tested-and-change-their-behavior-research-shows\/\">AI models know when they&#8217;re being tested &#8211; and change their behavior, research shows<\/a><\/strong><\/p>\n<p>Other AI developers have been selling their own tools on the premise that they can serve as automated creative partners, onto which humans can offload time-intensive and routine tasks, saving them money in the process. Earlier this week, for example, Amazon <a href=\"https:\/\/www.zdnet.com\/article\/amazons-new-ai-agent-can-make-an-ad-from-start-to-finish-how-to-try-it\/\">unveiled an AI agent<\/a> that can help brands with virtually every step of the process of creating a short video ad.<\/p>\n<div id=\"pinbox-342869d2-ea0b-442f-9d4a-5461c31b03ce\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Artificial Intelligence<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The company is setting high expectations for this latest AI-powered creator tool.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-59372","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Luma AI created an AI video model that &#039;reasons&#039; - what it does differently 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Luma AI created an AI video model that &#039;reasons&#039; - what it does differently 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-19T02:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Luma AI created an AI video model that &#8216;reasons&#8217; &#8211; what it does differently\",\"datePublished\":\"2025-09-19T02:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/\"},\"wordCount\":727,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\\\/2025\\\/09\\\/18\\\/82c2e379-2c93-4db0-bc01-38f34211aff6\\\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/\",\"name\":\"Luma AI created an AI video model that 'reasons' - what it does differently 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\\\/2025\\\/09\\\/18\\\/82c2e379-2c93-4db0-bc01-38f34211aff6\\\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\",\"datePublished\":\"2025-09-19T02:00:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\\\/2025\\\/09\\\/18\\\/82c2e379-2c93-4db0-bc01-38f34211aff6\\\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\\\/2025\\\/09\\\/18\\\/82c2e379-2c93-4db0-bc01-38f34211aff6\\\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Luma AI created an AI video model that &#8216;reasons&#8217; &#8211; what it does differently\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Luma AI created an AI video model that 'reasons' - what it does differently 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/","og_locale":"en_US","og_type":"article","og_title":"Luma AI created an AI video model that 'reasons' - what it does differently 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-09-19T02:00:40+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Luma AI created an AI video model that &#8216;reasons&#8217; &#8211; what it does differently","datePublished":"2025-09-19T02:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/"},"wordCount":727,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/","url":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/","name":"Luma AI created an AI video model that 'reasons' - what it does differently 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280","datePublished":"2025-09-19T02:00:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c2172f9430e7e0a8c7b0b82b537f77a00292e8e\/2025\/09\/18\/82c2e379-2c93-4db0-bc01-38f34211aff6\/gettyimages-2179177944.jpg?auto=webp&amp;precrop=2198,1235,x0,y0&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/luma-ai-created-an-ai-video-model-that-reasons-what-it-does-differently\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Luma AI created an AI video model that &#8216;reasons&#8217; &#8211; what it does differently"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59372"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}