Author: InfoForTech

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been codenamed AgreeToSteal by the cybersecurity company. The Outlook add-in in question is AgreeTo, which is advertised by its developer as a way for users to connect different calendars in a single place and share their availability through email. The add-in was…

Read More

Less than a week after Valve admitted that the current shortage (and growing prices) of RAM were affecting its hardware plans, the Steam Deck is completely sold out. The Steam Deck has gone in and out of stock in the past, but as Kotaku notes, the timing does raise the question whether Valve’s RAM issues could also be impacting its Linux handheld.The 256GB Steam Deck LCD, and both the 512GB and 1TB models of the Steam Deck OLED, are completely sold out on Steam. Valve announced that it was discontinuing the LCD versions of its handheld and selling through its…

Read More

Olix Computing Ltd., a startup developing an artificial intelligence chip with integrated optical components, has raised $220 million in funding. The Financial Times reported today that the investment was led by Belgian venture capital firm Hummingbird Ventures. The deal values U.K.-based Olix Computing at over $1 billion. The company previously raised an undisclosed amount of funding from Plural, Vertex Ventures, LocalGlobe and Entrepreneurs First. Olix’s chip is optimized for inference, the task of running AI models in production after training is complete. It’s unclear what optical components are included in the processor or how they’re used. However, a blog post…

Read More

TL;DR AI can preserve your memories, personality, and voice, allowing future generations to interact with a digital version of you long after you are gone. Immortality has always sounded like mythology, but AI is quietly turning it into a technical possibility. Every message we send, every photo we take, every recording we make becomes raw material for a digital version of ourselves. And for the first time, the tools exist to turn those scattered memories into something that can live on, learn, and even speak to future generations. We all leave traces behind: emails, text messages, photos, voice notes. But…

Read More

If your marketing team were eliminated, would your customers care? A guide to SaaS social media that trades vanity metrics for radical, technical truth. The current state of SaaS social media marketing is essentially a sea of sameness. If you scroll through LinkedIn or X right now, you’ll find a graveyard of “thrilled to announce” posts, generic stock photos of people in glass-walled offices, and “top 5” listicles that feel like they were written by someone who has never actually logged into a dashboard. Most brands are treating social media like a digital billboard, i.e., a place to shout about…

Read More

James J. Collins, the Termeer Professor of Medical Engineering and Science at MIT and faculty co-lead of the Abdul Latif Jameel Clinic for Machine Learning in Health, is embarking on a multidisciplinary research project that applies synthetic biology and generative artificial intelligence to the growing global threat of antimicrobial resistance (AMR).The research project is sponsored by Jameel Research, part of the Abdul Latif Jameel International network. The initial three-year, $3 million research project in MIT’s Department of Biological Engineering and Institute of Medical Engineering and Science focuses on developing and validating programmable antibacterials against key pathogens.AMR — driven by the…

Read More

It’s been estimated that humans consume between 39,000 and 52,000 microplastic particles each year, and a 2024 scoping review determined that they’ve been found in eight out of 12 human organ systems. You might find them in the air, your water, the items you use to prepare your food and even in the food you eat. All of these sources can contribute to microplastics entering your body. To find out which foods are more likely to contain microplastics and what we can do to reduce the amount of them that we consume, we consulted a doctor. Don’t miss any of…

Read More

Key Takeaways Most Active Directory attacks succeed by abusing privileged accounts. Domain Admins are high-value targets and must be protected differently Privileged identity management reduces standing access and attack paths Active Directory security depends on visibility, control, and discipline Let’s be honest—when Active Directory is compromised, the incident is never small.Almost every major enterprise breach involves Active Directory at some point. Attackers may enter through phishing, malware, or a misconfigured endpoint, but their real goal is always the same: gain control over privileged identities and Domain Admin accounts.Once that happens, containment becomes difficult and recovery becomes painful.Preventing Active Directory attacks…

Read More

Remember that AI personal health coach that promised to act as a trainer and wellness advisor called Fitbit AI Health Coach? Well, Google just took it global. Launched in October 2025 as a public preview for the U.S. Fitbit Premium users, the AI-powered personal health coach is now expanding to more countries, including the U.K., Canada, Australia, New Zealand, and Singapore. From U.S. exclusivity to global coverage The rollout is still in English and remains in “public preview” status, implying that Google is collecting data and feedback to improve the feature before a broader release. So, if you’re willing to…

Read More

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim,” Google Mandiant researchers Ross Inman and Adrian Hernandez said. UNC1069, assessed to be active since at least April 2018, has a history of conducting social engineering campaigns for financial gain using fake meeting invites and posing as…

Read More