Author: InfoForTech

When Jonathan Ross shot and killed Renee Nicole Good last Wednesday morning in Minneapolis, the 37-year-old mother became one of at least 25 people killed by an Immigration and Customs Enforcement agent shooting since 2015.In the days after Ross fired at Good multiple times from the front and side of Good’s car, visual investigations from outlets like The New York Times and The Washington Post have reconstructed the event, which unfolded in a matter of seconds, combing through a series of videos that emerged from various angles. These present apparent contradictions between the narrative presented by the White House and…

Read More

Hello Cyber Builders 🖖,The world’s heart beats in bytes, and right now, it is racing. Driven by AI and Digital Technologies (“Tech”), the global pulse is accelerating. Yet, here in Europe, it often feels like we are out of breath.Imagine standing in a long queue at a busy European border crossing. While the digital world sprints, you are watching a single customs officer stamp passports by hand, echoing a past era. It feels like the system is struggling to keep up.Society always moves forward; there is no way back to heavy files or horse-drawn carriages. But my fellow Europeans are…

Read More

Attack surface monitoring is the continuous discovery and analysis of all assets, services, identities, and access points that attackers could exploit. This includes internet-facing infrastructure, cloud services, SaaS platforms, APIs, and sometimes internal attack paths.Mean time to detect measures how quickly an organization identifies malicious activity after it begins. When you continuously monitor your attack surface, you detect risky changes earlier, which directly shortens the time between initial exposure and threat detection.This connection is critical because attackers almost always interact with the attack surface before triggering traditional security alerts.

Read More

15 mins and 40 seconds. That’s how long it took to troubleshoot the first tech problem of 2026, and that’s how far you’ll need to skip through this video to hear the audio at normal volume. The problem Scott and I had is analogous to the troubleshooting so many of us do in our roles day in and day out:This should work fineIt doesn’t work, and I don’t know whyI did something that seems unrelate,d and now it worksI still don’t know whyAnyway, I’ve cleaned up the audio-only version for the podcast, but I can’t change the YouTube version once…

Read More

Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate extramarital affairs, there was massive social stigma attached to it. As a result, we saw some pretty crazy stuff:Various websites were stood up to publicly disclose the presence of people in the data and out them as “cheaters”Churches trawled through the data and contacted the spouses of exposed parishionersThe media…

Read More

Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin has more than 40,000 active installs. “In versions 2.5.1 and below, the plugin is vulnerable to privilege escalation, due to a combination of factors including direct route selection, bypassing of authentication mechanisms, and auto-login…

Read More

Something interesting just happened in China’s AI scene, and it didn’t come with fireworks or chest-thumping press conferences.Instead, it arrived almost casually – which somehow makes it more impressive. Zhipu AI, a well-known Chinese artificial intelligence company, says it has trained a cutting-edge image generation model entirely on Huawei’s homegrown chips. No Nvidia GPUs.No Western hardware safety net. Just local silicon doing the heavy lifting. That alone makes people stop scrolling and ask: wait, how did that happen?You can dig into the technical details through reporting that surfaced earlier this week on InfoWorld.The model, called GLM-Image, was trained using Huawei’s…

Read More

The Contrarian View: AI Is Overhyped and Incremental at BestA common contrarian argument is that AI, while impressive, does not fundamentally change how businesses compete. From this perspective, AI is simply another productivity tool, similar to spreadsheets, ERP systems, or cloud computing. Useful, yes, but not transformative.Supporters of this view argue that most AI gains will be competed away quickly. If every company can access similar models, similar agents, and similar tooling, then AI becomes table stakes rather than a source of durable advantage. Margins normalize, differentiation evaporates, and the fundamental drivers of success remain brand strength, execution quality, and…

Read More

The MIT Siegel Family Quest for Intelligence (SQI), a research unit in the MIT Schwarzman College of Computing, brings together researchers from across MIT who combine their diverse expertise to understand intelligence through tightly coupled scientific inquiry and rigorous engineering. These researchers engage in collaborative efforts spanning science, engineering, the humanities, and more. SQI seeks to comprehend how brains produce intelligence and how it can be replicated in artificial systems to address real-world problems that exceed the capabilities of current artificial intelligence technologies.“In SQI, we are studying intelligence scientifically and generically, in the hope that by studying neuroscience and behavior in…

Read More

Enterprise content management provider Box Inc. is expanding its armory of artificial intelligence tools with the launch of Box Extract in general availability. The new tool uses third-party AI models from companies including OpenAI Group PBC, Google LLC and Anthropic PBC to extract valuable insights embedded in documents such as invoices and contracts to enhance enterprise decision-making. Box believes that the new tool is going to become vital for enterprise customers. It’s well=known that there’s vast amounts of organizational knowledge locked inside documents such as spreadsheets, product listings, product specifications, policy documents, videos, charts, social media and other types of…

Read More