#247-monitoring

[ follow ]
DevOps
fromTNW | Offers
2 hours ago

NinjaOne free trial. Test the unified IT operations platform

NinjaOne is a unified IT operations platform that consolidates multiple IT management functions into a single cloud-native console.
#ai
Marketing tech
fromForbes
4 days ago

The New Frontier Of GEO Demands An Integrated Approach

AI has transformed search optimization, requiring a unified approach across departments to enhance brand visibility and trustworthiness.
fromFortune
18 hours ago
Digital life

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

Artificial intelligence
fromInfoWorld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Digital life
fromFortune
5 hours ago

AI's next frontier is the real world | Fortune

AI has transformed digital interactions, yet the physical world still relies on outdated identity verification methods.
Marketing tech
fromForbes
4 days ago

The New Frontier Of GEO Demands An Integrated Approach

AI has transformed search optimization, requiring a unified approach across departments to enhance brand visibility and trustworthiness.
Digital life
fromFortune
18 hours ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Artificial intelligence
fromInfoWorld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
#cybersecurity
fromTechCrunch
3 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromTechCrunch
3 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Roam Research
fromFast Company
6 hours ago

This turbulence-tracking travel app will make your next trip more tolerable

Turbli is a free website that provides detailed turbulence forecasts for flights, enhancing travel planning and experience.
Education
fromFox News
1 day ago

NYC schools track bathroom time with digital hall passes

SmartPass digital hall pass system in NYC schools tracks student movement and time outside class, aiming to improve safety and accountability.
Environment
from99% Invisible
1 day ago

Service Request #4: How Does the Grid in Phoenix Work? - 99% Invisible

Phoenix's extreme summer heat underscores the critical importance of a reliable electrical grid for survival.
Cars
fromFuturism
23 hours ago

Dozens of Robotaxis In China Stop Dead in the Middle of Roads and Highways, Causing Crashes

A system failure left over a hundred Baidu robotaxis stranded in Wuhan, causing traffic chaos and multiple crashes.
Photography
fromBusiness Matters
2 days ago

Explosion Proof PTZ Cameras - Full 360 Intelligence in Explosive Zones

Explosion proof PTZ cameras provide essential situational awareness in hazardous environments, overcoming challenges posed by fixed cameras.
Artificial intelligence
fromTechRepublic
1 day ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
Remote teams
fromSouth China Morning Post
1 day ago

Indonesia and Malaysia require geo-tracking for civil servants working from home

Governments in Indonesia and Malaysia implement strict work-from-home policies for civil servants to reduce fuel consumption amid rising oil prices.
Business intelligence
fromComputerWeekly.com
2 days ago

Wireless AI paradox emerges as Wi-Fi evolves into strategic growth engine | Computer Weekly

Strategic investments in wireless and AI are crucial for businesses to achieve operational efficiency and productivity gains.
Silicon Valley
fromFast Company
1 day ago

Baltimore is pushing back against AI's worst excesses. What happens next could reshape American tech

Baltimore is addressing the risks of AI, exemplified by a lawsuit against xAI for generating illegal content.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
#data-centers
Tech industry
fromAxios
1 day ago

AI boom drives clash between grid power vs. energy "islands"

On-site power for data centers is increasing, with projections suggesting it could reach 50% of planned capacity.
Data science
fromThe Walrus
2 days ago

Data Centres Are on Track to Wreck the Planet. Can We Stop Them? | The Walrus

Hyperscaled data centers consume massive power and water, raising concerns about their environmental impact.
Tech industry
fromAxios
1 day ago

AI boom drives clash between grid power vs. energy "islands"

On-site power for data centers is increasing, with projections suggesting it could reach 50% of planned capacity.
Data science
fromThe Walrus
2 days ago

Data Centres Are on Track to Wreck the Planet. Can We Stop Them? | The Walrus

Hyperscaled data centers consume massive power and water, raising concerns about their environmental impact.
fromwww.theguardian.com
3 days ago

Silicon Valley city to give residents doorbells equipped with cameras

Public safety is my top priority, and this door camera initiative is about strengthening crime prevention right where it matters most at home. By equipping residents with tools and partnering closely with our Milpitas police department, we're building a stronger connection between our community and law enforcement to help deter crime and protect our neighborhoods.
Privacy technologies
US news
fromsfist.com
3 days ago

Tuesday Morning Topline: Bay Area City Giving Away Ring Cameras

Supervisor Jackie Fielder's mental health issue may lead to her resignation, paralleling past cases of supervisors stepping back due to health concerns.
Wearables
fromTechCrunch
4 days ago

With its new app store, Ring bets on AI to go beyond home security | TechCrunch

Amazon-owned Ring launches an app store to enhance camera capabilities, focusing on elder care, workforce analytics, and rental management.
San Francisco
fromMission Local
4 days ago

Cell outage blocks San Francisco 911 calls

A cell outage may disrupt 911 calls in San Francisco, prompting residents to use Wi-Fi calling or text 911 for assistance.
Science
fromSilicon Canals
6 days ago

AI broke the energy grid's assumptions - Silicon Canals

The future of the electrical grid in 2035 hinges on AI-driven demand, creating competition among energy sources like natural gas, nuclear, and renewables.
Austin
fromFast Company
6 days ago

This new tech could help prevent future runway crashes

New runway collision warning technology could significantly enhance aviation safety by providing pilots with immediate alerts.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#observability
DevOps
fromTechzine Global
2 days ago

Observability warehouses, the next structural evolution for telemetry

Observability is essential for real-time insights in cloud systems, helping to reduce downtime and improve performance.
fromInfoQ
1 month ago
Software development

From Alert Fatigue to Agent-Assisted Intelligent Observability

DevOps
fromTechzine Global
2 days ago

Observability warehouses, the next structural evolution for telemetry

Observability is essential for real-time insights in cloud systems, helping to reduce downtime and improve performance.
fromInfoQ
1 month ago
Software development

From Alert Fatigue to Agent-Assisted Intelligent Observability

fromFuturism
1 day ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
Business intelligence
fromComputerWeekly.com
1 day ago

Wilson Connectivity, Autonomous Systems team for in-building wireless service | Computer Weekly

Wilson Connectivity and Autonomous Systems partner to automate in-building wireless infrastructure management, enhancing deployment and ongoing optimization.
Privacy professionals
fromSecurityWeek
3 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Environment
fromFortune
2 days ago

Data centers are so hot, their 'heat island' effect is raising temperatures up to 6 miles away and impacting 343 million people worldwide, study finds | Fortune

AI infrastructure is creating a 'data heat island effect' that raises local temperatures and impacts millions of people.
Cars
fromwww.bbc.com
3 days ago

Mass robotaxi malfunction halts traffic in Chinese city

A mass robotaxi outage in Wuhan raised safety concerns about driverless vehicles after over a hundred cars stopped mid-traffic due to a system malfunction.
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Photography
fromWIRED
6 days ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
DevOps
fromTechzine Global
1 day ago

IGEL breaks down the wall between IT and OT

IGEL is enhancing security and manageability in OT environments through its platform and Preventative Security Model.
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromReadWrite
2 weeks ago

From Reactive Repairs to Smarter Home Protection: How Technology Is Changing Roof Care

In the past, roof inspections mostly focused on what could be seen from the outside. Contractors looked for broken shingles, worn flashing, or areas where water might enter the roof. The problem is that roof damage does not always show clear signs right away. Water can move through roofing layers before it becomes visible inside the home.
Renovation
Environment
fromTheregister
3 days ago

AI datacenters create heat islands around them, paper finds

Datacenters significantly raise surrounding temperatures, impacting communities up to 10 km away, with average increases between 1.5°C and 2.4°C.
London
fromLondon Business News | Londonlovesbusiness.com
2 weeks ago

Building a smarter London: How embedded systems are driving urban innovation - London Business News | Londonlovesbusiness.com

Embedded systems integrated into London's infrastructure enable real-time monitoring and intelligent decision-making, transforming transport, energy, and logistics to reduce costs and emissions.
DevOps
fromComputerWeekly.com
2 days ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
Business intelligence
fromInfoWorld
2 days ago

Kilo targets shadow AI agents with a managed enterprise platform

KiloClaw for Organizations enhances AI agent management with centralized governance, addressing security and compliance concerns for enterprises.
fromTechzine Global
2 days ago

IGEL OS can now run AI models locally on endpoints

AI Armor provides dynamic runtime security and relies on a central policy engine in the Universal Management Suite (UMS) to meet compliance requirements, ensuring that organizations can manage their security effectively.
DevOps
Miscellaneous
fromComputerWeekly.com
3 weeks ago

Render Networks unveils synchronised agentic critical infrastructure architecture | Computer Weekly

Render Networks expands ClearWay platform to automate critical infrastructure deployment, reducing capital risk through real-time field verification and audit-grade accountability across complex multi-asset projects.
fromComputerworld
21 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy professionals
fromSilicon Canals
5 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
DevOps
fromTechzine Global
3 days ago

IGEL brings 'Smarter, Zero Trust' approach Contextual Access to endpoints

IGEL's Contextual Access enhances endpoint security by adapting access rights based on user, device, location, and trust status.
Information security
fromTechzine Global
1 day ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
#ai-security
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
fromTechzine Global
3 days ago
Information security

Exabeam now monitors AI agents in ChatGPT, Copilot, and Gemini

Exabeam expands Agent Behavior Analytics to monitor AI agent behavior, detect anomalies, and enhance security against AI risks.
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
DevOps
fromAmazon Web Services
3 days ago

Leverage Agentic AI for Autonomous Incident Response with AWS DevOps Agent | Amazon Web Services

AI-powered operational agents like AWS DevOps Agent enhance incident management and operational efficiency for distributed workloads.
#cisco
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromThe Hacker News
1 day ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromThe Hacker News
1 day ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
#supply-chain-attack
DevOps
fromInfoQ
5 days ago

Optimization in Automated Driving: From Complexity to Real-Time Engineering

A production-grade AV stack is a distributed dataflow graph of components, optimized for resource management and real-time constraints.
Artificial intelligence
fromMedium
2 weeks ago

From Dumb Devices to Digital Teammates: How Agentic AI is Revolutionizing the Internet of Things

Agentic AI transforms IoT from obedient automation into intelligent systems that anticipate needs, reason through problems, and take initiative rather than simply following programmed commands.
Information security
fromComputerWeekly.com
4 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Gadgets
fromArchitectural Digest
1 month ago

The Spectrum of Home Security Today-From Sensors to Safe Rooms

Modern home security uses discreet, AI-enabled sensors, cloud storage, and professional integrations, making devices critical for evidence and design-integrated protection.
Artificial intelligence
fromArchDaily
4 weeks ago

Compute Isn't Weightless: AI Infrastructure and the Architecture of the City

AI development is reshaping urban infrastructure and spatial planning in the Greater Bay Area through government-led initiatives that translate computational needs into physical zones, data centers, and specialized districts.
Information security
fromSecuritymagazine
3 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromInfoQ
4 days ago

Cloudflare Adds Active API Vulnerability Scanning to Its Edge

Cloudflare's Web and API Vulnerability Scanner focuses on detecting Broken Object Level Authorization vulnerabilities in APIs.
Public health
fromNature
1 month ago

The smart sensors improving the world's biggest cities

Sensors and low-cost interventions are being used to monitor and mitigate heat, pollution, and infrastructure challenges in rapidly growing megacities.
Information security
fromSecurityWeek
4 days ago

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Threat actors exploit a critical SQL injection vulnerability in Fortinet FortiClient EMS, allowing remote code execution without authentication.
fromBleepingComputer
4 days ago

New RoadK1ll WebSocket implant used to pivot on breached networks

"Its sole function is to convert a single compromised machine into a controllable relay point, an access amplifier, through which an operator can pivot to internal systems, services, and network segments that would otherwise be unreachable from outside the perimeter."
Information security
Science
fromNature
2 months ago

Sensors are transforming the world - work together to maximize their benefits

Converging diverse sensing disciplines into a shared scientific home accelerates innovation, real-world impact and cross-domain discovery.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
fromTheregister
2 months ago

Ring ready for end of the world as it turns cameras on fires

Your camera can make mistakes and might produce false positives (detecting fire when there isn't one) or false negatives (missing actual fires).
Gadgets
fromFuturism
1 month ago

Cities Are Shredding Their AI Surveillance Contracts en Masse

Since the start of 2025, at least 30 cities have canceled their contracts with Flock Safety, the AI surveillance company whose CEO wants to end all crime within the decade by blanketing the country in ever-watchful security cameras. That startling figure comes courtesy of NPR, which reports that concerned activists are putting mounting pressure on cities to cut ties with the company. "We are seeing a lot more momentum," Will Freeman, a Colorado-based organizer who runs the website DeFlock.org, told the broadcaster.
Privacy professionals
Digital life
fromComputerWeekly.com
1 month ago

Urban digital twins - missing pieces and emerging divides | Computer Weekly

Digital twins enable broad decision-making across domains but struggle to model human behaviour and complex dynamics; AI can help yet introduces its own challenges.
Information security
fromTechRepublic
2 weeks ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
[ Load more ]