** The Hacker News ** Jan 22, 2026 Email Security / SaaS Security Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams …
Homepage-Fragments
Investigating Gaza, Personal Mobile Data for Sale, and Compromised Supply Chains: 2025’s Best Investigative Stories in French
The stories selected for our editors’ pick this year span cocoa trafficking in the Democratic Republic of Congo, the sale of personal mobile data in Europe by secretive but powerful data brokers, and …
The title of this diary is perhaps a bit catchy but the question is important. I don’t consider myself as a good developer. That’s not my day job and I’m writing code to improve my daily tasks. I like …
** Ravie Lakshmanan ** Jan 22, 2026 Network Security / Vulnerability Cybersecurity company Arctic Wolf has warned of a “new cluster of automated malicious activity” that involves …
** Ravie Lakshmanan ** Jan 22, 2026 Vulnerability / Zero-Day Cisco has released fresh patches to address what it described as a “critical” security vulnerability impacting multiple Unified …
ISC Stormcast For Thursday, January 22nd, 2026 https://isc.sans.edu/podcastdetail/9776, (Thu, Jan 22nd)
ISC Stormcast For Thursday, January 22nd, 2026 https://isc.sans.edu/podcastdetail/9776
How Thomson Reuters built an Agentic Platform Engineering Hub with Amazon Bedrock AgentCore
This post was co-written with Naveen Pollamreddi and Seth Krause from Thomson Reuters. Thomson Reuters (TR) is a leading AI and technology company dedicated to delivering trusted content and workflow …
Pushing the frontiers of computer-use agents with an open-weight, ultra-compact model, optimized for real-world web tasks In 2024, Microsoft introduced small language models (SLMs) to customers, …
As AI agents become more autonomous in handling tasks for users, it’s crucial they adhere to contextual norms around what information to share—and what to keep private. The theory of contextual …
HANNA WALLACH: Yeah, so I was a PhD student at the University of Cambridge, and I was working with the late David MacKay. I was focusing on machine learning for analyzing text, and at that point in …
Today, most agents operate only on what’s visible in the current interaction: they can access facts and knowledge, but they can’t remember how they solved similar problems before or why certain …
Prince Harry leaving the High Court on day three of his privacy action against the Daily Mail. Picture: Jeff Moore/PA Wire Prince Harry appeared on the verge of tears as he concluded his evidence at …
Using Strands Agents to create a multi-agent solution with Meta’s Llama 4 and Amazon Bedrock
Multi-agent solutions, in which networks of agents collaborate, coordinate, and reason together, are changing how we approach real-world challenges. Enterprises manage environments with multiple data …
This post was co-authored with Benjamin Kleppe, Machine Learning Engineering Lead at bunq . The integration of agentic AI is transforming the banking industry, marking a significant shift from …
As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning …
** Ravie Lakshmanan ** Jan 21, 2026 Vulnerability / Network Security Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in …
“Largest Infrastructure Buildout In Human History”: Jensen Huang on AI’s “Five-Layer Cake” at Davos
From skilled trades to startups, AI’s rapid expansion is the beginning of the next massive computing platform shift, and for the world’s workforce a move from tasks to purpose. At a packed mainstage …
** The Hacker News ** Jan 21, 2026 Artificial Intelligence / Automation Every managed security provider is chasing the same problem in 2026 — too many alerts, too few analysts, and clients demanding …
Internet Voting is Too Insecure for Use in Elections No matter how many times we say it, the idea comes back again and again. Hopefully, this letter will hold back the tide for at least a while …
Gartner® doesn’t create new categories lightly. Generally speaking, a new acronym only emerges when the industry’s collective “to-do list” has become mathematically impossible …
‘Some Stories Just Work Better Through Film’: On the Strategy Behind Making an Investigative Documentary
When “ The Dynasty” was released earlier this year, few expected a 55-minute investigative film about Hungarian Prime Minister Viktor Orban’s family’s business dealings to capture millions of views. …
VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code
The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person with assistance from an artificial intelligence (AI) model. …
Visual Studio Code is a popular open-source code editor[ 1 ]. But it’s much more than a simple editor, it’s a complete development platform that supports many languages and it is available on multiple …
** Ravie Lakshmanan ** Jan 21, 2026 Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit that …
Vox’s page on Patreon Explainer journalism brand Vox is using membership and subscriptions platform Patreon to help build a “two-way relationship” with its audience. US-based Vox expanded its …