Editor picks
Google warns EU: sovereignty undermines competition
Google's top lawyer Kent Walker warns that Europe is undermining its ...
Snowflake CEO: Software risks becoming a “dumb data pipe” for AI
AI tooling works best when it has access to relevant business data. S...
Major hack of Dutch telco Odido was a classic case of social engineering
Customer support got found out multiple times
As MySQL stagnates, its community sounds the alarm
This year, Oracle has already tried to placate fears about MySQL's de...
"*" indicates required fields
Story timeline
ThoughtSpot aims to make data AI-ready with Analyst Studio update
With a new version of Analyst Studio, ThoughtSpot hopes to make company data ready for AI projects via agents...
Palo Alto lowers profit forecast after CyberArk deal
In addition to being a security company, Palo Alto Networks has recently been an acquisition specialist. From...
Cyber attackers hide their tracks by exploiting firewalls
Barracuda research shows that nine out of ten ransomware incidents in 2025 exploited firewalls. In the fastes...
As MySQL stagnates, its community sounds the alarm
This year, Oracle has already tried to placate fears about MySQL's development and adoption, as its apparent ...
TanStack gains ground within React ecosystem
Devographics' annual State of React survey shows that React retains its dominant position, but is also raisin...
Vulnerable VS Code extensions affect tens of millions of developers
Security researchers have discovered three serious vulnerabilities in four popular VS Code extensions, which ...
VMware customers reduce dependency after Broadcom acquisition
Two years after the acquisition by Broadcom, 86 percent of VMware customers are actively working to reduce th...
ClickShare combines MDEP with ease of use for video conferencing
Organizations are geared up for video conferencing, but their solutions aren't always mature. ClickShare, par...
Zero knowledge in password managers is not foolproof
For years, password managers have been promoting themselves as secure vaults that even the provider cannot ac...
Groundcover CEO exposes the hard truths in observability
Modern observability has delivered real value to teams in recent years. Metrics, logs and traces have helped ...
Claude Sonnet 4.6 available: better in coding, reasoning, and agentic
The latest Anthropic model brings improvements in coding, computer usage, long-context reasoning, and agent p...
Mistral AI secures its first acquisition with Koyeb
French AI company Mistral AI announced its first acquisition today. The company will purchase serverless clou...
AI agents are changing entire roles, not just task augmentation
ServiceNow is seeing a fundamental shift in how companies implement AI. The discussion is no longer exclusive...
Palo Alto Networks acquires Koi to monitor agentic endpoints
Following rumors, Palo Alto Networks' planned acquisition of Koi appears to be a reality. At least, the two p...
Checkmarx integrates agentic security within AWS Kiro IDE
Ideally, security issues should be identified during the coding process. That is the goal of Checkmarx Develo...
Qwen3.5 aims to position Alibaba alongside GPT and Claude
Alibaba is taking a step forward in developing open-source AI models with the introduction of Qwen3.5. The co...
Infostealer steals identity of AI agent OpenClaw
Security researchers have discovered a live infection in which an infostealer has stolen the configuration fi...
Snowflake CEO: Software risks becoming a “dumb data pipe” for AI
AI tooling works best when it has access to relevant business data. Snowflake CEO Sridhar Ramaswamy argues th...
AWS expands EC2 with support for nested virtualization
Amazon Web Services (AWS) is expanding EC2 capabilities by supporting nested virtualization on select instan...
Anthropic and Infosys to build customized AI agents
Anthropic and Infosys have announced a strategic partnership to develop custom AI agents for large enterprise...
Cisco builds its own VMware hypervisor alternative, release imminent
Cisco is introducing a hypervisor for running its own applications. NFVIS-for-UC is intended to offer an alte...
Red Hat launches digital sovereignty assessment tool
Red Hat introduces the Digital Sovereignty Readiness Assessment tool. Organizations can use this tool to asse...
Dutch investor backs Nexperia with $60 million loan
Invest International is providing Nexperia with a $60 million loan to expand its global production capacity i...
Accelerated investigation into Microsoft’s cloud and AI monopoly
The US Federal Trade Commission (FTC) is accelerating its investigation into Microsoft. The regulator wants t...
Google patches first Chrome zero-day of 2026
Google has released emergency updates for a critical Chrome vulnerability that is being actively exploited in...
Trusted Tech Alliance establishes five principles for secure technology
Sixteen tech companies from eleven countries, including Microsoft, Google Cloud, Ericsson, and SAP, launched ...
Major hack of Dutch telco Odido was a classic case of social engineering
Customer support got found out multiple times
Data breach at Odido: responsibility and compensation under discussion
The recent data breach at internet provider Odido, in which data from an estimated 6.2 million customers was ...
Fiber optics are getting even thinner: Prysmian reaches 160 microns
Prysmian has unveiled a new single-mode fiber optic cable with a coating diameter of 160 microns. According t...
Why OpenAI has recruited the founder of OpenClaw
OpenAI has recruited Peter Steinberger, the founder of the open source agent framework OpenClaw. With this mo...
TypeScript 6.0 beta announced, its last JavaScript-based release
Microsoft has released the TypeScript 6.0 beta, marking the end of an era. This will be the final version bui...
Nexperia live blog: China asks Dutch to cooperate on resolution to Nexperia saga
February 13 - The Chinese Ministry of Commerce has stated that supply chain security is of paramount importan...
Salesforce aims to make e-commerce smarter with Cimulate acquisition
Salesforce has signed a definitive agreement to acquire Cimulate. With the move, Salesforce aims to strengthe...
Cloudflare now serves sites in Markdown to AI agents
Cloudflare has announced a new feature that automatically serves websites in Markdown to AI agents. With Mark...
Proofpoint acquires AI security company Acuvity
Proofpoint has announced the acquisition of Acuvity, which provides tooling for AI security and governance. T...
Check Point acquires security startups Cyclops, Cyata, and Rotate
Check Point has acquired three young cybersecurity companies to further expand its portfolio. The acquisition...
CFOs under pressure to deliver AI results, but returns often fail to materialize
Financial leaders worldwide are feeling increasing pressure to deploy artificial intelligence. However, they ...
Google warns EU: sovereignty undermines competition
Google's top lawyer Kent Walker warns that Europe is undermining its own competitiveness by restricting acces...
OpenAI accuses DeepSeek of misusing AI models
OpenAI informed US policymakers of suspicions that Chinese AI company DeepSeek is using techniques to mimic e...
OpenAI swaps Nvidia for Cerebras with GPT-5.3-Codex-Spark
OpenAI releases GPT-5.3-Codex-Spark, a smaller AI encoding model that generates over 1,000 tokens per second ...
Okta tackles shadow AI with new agent discovery tools
Okta is rolling out Agent Discovery in its Identity Security Posture Management (ISPM) platform to combat the...
Lumma Stealer back despite previous police action
Lumma Stealer is active again and spreading widely through attacks that are difficult to detect. Security res...
Cisco CX wants to transform customer experience with AI
CX has become a key pillar of the Cisco story
European regulators criticize weakening GDPR
In a joint opinion, the European privacy regulators EDPB and EDPS have expressed serious concerns about key e...
Google sees increase in AI abuse by cybercriminals
The latest analysis from the Google Threat Intelligence Group shows that malicious actors are no longer just ...
Samsung enters AI infrastructure market with first HBM4 deliveries
Samsung Electronics has begun delivering its latest-generation high-bandwidth memory, HBM4. With this step, t...
Palo Alto completes $25 billion acquisition of CyberArk
Palo Alto Networks has officially completed its $25 billion acquisition of CyberArk. Identity security will n...
Kong Context Mesh prepares enterprise APIs for AI agents
Kong Context Mesh is a new product for automatic enterprise API discovery. It converts them into agent tools ...
Early win VMware in lawsuit against Siemens
VMware appears to have won an early procedural victory in its lawsuit against Siemens. The judge ruled in fav...