A leading online source of technology news and analysis
Enterprise AI adoption is accelerating, but as large language models converge, competitive edge will stem from how organizations supply context rather than which model they choose. In a Q&A, Saket Saurabh, CEO of Nexla, defines context engineering as the layer of proprietary data, policies, and memory that shapes AI reasoning. He explains that agentic AI systems need this foundation to act reliably, and that orchestration, governance, and shared knowledge bases are essential to manage dynamic, multi‑agent environments. Finally, he warns that expanding context windows will intensify governance demands while offering opportunities for deeper, longer‑term AI interactions.
Meta is developing a parental‑control system for WhatsApp that links a child’s secondary account to a parent’s primary account. The child account will have limited features, such as contacts‑only messaging, while preserving end‑to‑end encryption so parents cannot read messages. Parents...
New research from ISP Beaming reveals UK firms endured over 791,600 cyber‑attacks in 2025, with attackers homing in on remote‑work infrastructure and data‑storage systems. Automated probing of remote desktop and VPN services became a constant, feeding ransomware groups that encrypt...
Microsoft announced a new shortcut that lets users add hyperlinks in Word by simply pasting a copied URL onto selected text, eliminating the traditional right‑click menu. The feature is available across Word for Windows, macOS, and the web, requiring version...
NordPass has introduced its Authenticator feature to personal account holders, extending a tool previously limited to business users. The built‑in TOTP generator creates time‑based one‑time passwords directly inside the NordPass vault, eliminating the need for a separate authenticator app. Biometric...
Hydrolix has launched Bot Insights, a real‑time platform that detects, classifies, and alerts on every bot, crawler, and AI agent accessing a website. The solution ingests massive bot traffic data in seconds, offering full‑fidelity analytics without sampling and supporting long‑term...
In 2025 phishing‑as‑a‑service (PhaaS) kits doubled, intensifying threats for security teams. New actors such as Whisper 2FA and GhostFrame introduced evasive tools, while incumbents like Mamba and Tycoon refined existing capabilities. Multifactor‑authentication bypass and URL obfuscation each featured in 48% of...
A new wave of supply‑chain attacks targets JavaScript package managers like NPM by weaponizing install scripts rather than embedding malicious code directly. The scripts appear benign during static scans, fetch additional code at build time, and inject malicious script tags...
Google has re‑introduced the Material 3 Expressive redesign to the Android version of Google Drive, restoring a visual tweak that was previously removed. The update adds side padding to the file list container, gives it rounded top corners while keeping the bottom...
Recent research by NordStellar uncovered 25 dark‑web posts in the past year seeking malicious insiders, especially at social‑media and cryptocurrency firms. Cybercriminals use these insiders to bypass defenses, steal data, and launch ransomware or phishing attacks. Recruitment often moves to...
Exabeam announced a new release that embeds AI‑agent behavior analytics into its UEBA platform, leveraging integration with Google Gemini Enterprise. The update centralizes detection, investigation and response to AI‑agent activity, giving security teams a unified view of risky deviations. It...
GenAI‑related data policy violations more than doubled in 2025, with organizations now averaging 223 incidents per month and the top 25 percent facing 2,100 monthly breaches. User‑generated prompts surged 500 percent to 18,000 per organization, while regulated‑data uploads account for 54 percent of...
Amazon announced that its Alexa+ AI assistant is now available via any web browser, initially through an Early Access program at Alexa.com. The web version mirrors the device‑based experience, handling shopping, calendar management, document analysis and smart‑home control. By decoupling...
Enterprises are hitting a hidden bottleneck dubbed “slow AI,” where outdated, complex networks impede the rapid rollout of AI workloads. AI’s massive data throughput, ultra‑low latency, and hybrid‑cloud demands expose gaps in legacy network capacity, visibility, and security. Companies often...
Resecurity disclosed that a recent breach claim was a honeypot trap, not a genuine data loss. The Scattered Lapsus$ Hunters (SLH) group boasted access to internal systems, but only interacted with synthetic accounts populated with fake consumer and payment records....
Generative AI is rapidly closing the long‑standing developer shortage by automating repetitive coding tasks and empowering citizen developers, allowing enterprises to clear backlogs and accelerate delivery. At the same time, the same productivity boost is eroding traditional technological moats built...
Companies that retain outdated customer records face amplified breach costs and reputational damage, as legacy data expands the attack surface. Regulators such as the EU’s GDPR have levied multi‑million‑dollar fines on firms that hoard unnecessary personal information. Data minimization—collecting only...
Industry leaders predict that digital identity wallets will move from pilots to global scaling by 2026, anchored by the EU Digital Identity (EUDI) regulation and expanding support in Apple and Google wallets. Companies will boost spending on privacy, compliance and...
AI video tools are reshaping business communication by slashing production time and cost, enabling richer, on‑demand content. CraftStory’s CEO Victor Erukhimov explains how their platform generates long‑form videos through segmented diffusion and high‑frame‑rate data, delivering a one‑minute video in about...

Japanese automaker Nissan confirmed that a security breach at its software partner Red Hat exposed personal data of roughly 21,000 customers in Fukuoka. The leaked information includes names, addresses, phone numbers and partial email addresses, but no financial or credit‑card details....

Foxit released PDF Editor v2025.3 for Windows and Mac, adding privacy‑focused collaboration safeguards and a suite of AI tools. The update introduces region‑specific consent prompts, audit‑logged consent data, and automatic anonymization for users who decline. Integration with Microsoft Sensitivity Labels...

EaseUS released Data Recovery Wizard 20.1.0, adding a SmartSector Rebuild (SSR) engine that targets fragmented files on heavily used removable storage. The SSR technology analyzes data signatures, metadata, and block proximity to reconstruct files that standard tools miss. EaseUS claims up...

NordProtect, Nord Security’s identity‑theft protection service, has added expanded monitoring capabilities to detect fraud earlier. The upgrade includes credit monitoring across all three major bureaus, short‑term loan tracking, and comprehensive financial‑account alerts. Users also receive a TransUnion credit‑lock feature and...

Microsoft released Windows 11 Insider Preview Build 26220.7523, adding Ask Copilot and AI Agents directly to the taskbar for commercial users. The opt‑in feature integrates Microsoft 365 Copilot, contextual Work IQ data, and voice or text interaction in a single click. Agents can be invoked via...