Author: user
hacker newsJanuary 21, 2026Artificial intelligence/automation In 2026, all managed security providers will be challenged by the same problem. Clients who have too many alerts, too few analysts, and require “CISO-level protection” on small business budgets. truth? Most MSSPs are running harder, not smarter. And it’s breaking their limits. A quiet revolution is taking place there. More than just writing reports and surfacing risks, AI is reshaping the way security services are delivered. the shift Historically, MSSPs scaled by adding people. Each new customer means another analyst, another spreadsheet, and another late-night ticket line. AI automation flips that model. Process assessments,…
Cleaning up PFAS contamination has long been a challenge for environmental engineers, but a solution may emerge from an unexpected field. Rather than relying on filters and chemical additives, researchers are turning to the destructive power of particle accelerators and electron beams. By harnessing high-energy electrons, scientists believe they can break down some of the most stubborn synthetic pollutants, offering a fundamentally new way to treat contaminated water and soil. The global PFAS challenge PFAS compounds, also known as “forever chemicals,” are present in groundwater, rivers, and soils around the world. Because they are chemically stable, they resist natural degradation…
Patient: 26-year-old female living in CaliforniaSymptoms: The woman was admitted to a psychiatric hospital in an agitated and confused state. She speaks quickly, jumps from one idea to another, and said she believes she can communicate with her brother through an AI chatbot. But her brother had died three years earlier.What happened next: Doctors reviewed the woman’s psychiatric history and noted in the case report that she had a history of depression, anxiety, and attention-deficit/hyperactivity disorder (ADHD). She managed these symptoms with prescribed antidepressants and stimulants. She also reported having extensive experience using large-scale language models (LLMs) in schools and…
Accelerated nuclear power deployment requires early coordination on design choices to ensure new technologies remain unattractive for weapons development. During a period when the effects of climate change are pushing the world towards more sustainable forms of energy production, nuclear power has emerged as a suitable option in many states that had not previously planned for new nuclear energy systems. One example is Sweden, which is now considering the deployment of small modular reactors in the coming years. At the same time, increasing geopolitical uncertainty and growing concerns over war in Europe have led many states to place nuclear non-proliferation…
Gartner® doesn’t create new categories lightly. Typically, new acronyms emerge only when it becomes mathematically impossible to complete an industry-wide “to-do list.” The introduction of the Exposure Assessment Platform (EAP) category therefore appears to be a formal acknowledgment that traditional vulnerability management (VM) is no longer a viable way to protect modern enterprises. The transition from traditional vulnerability assessment market guides to the new Magic Quadrant for EAP represents a move away from an endless stream of “vulnerability hoses” or CVEs and toward a Continuous Threat Exposure Management (CTEM) model. For us, this is more than just a change in…
Researchers from Trinity College Dublin are working with collaborators across the island of Ireland on a large-scale cross-border effort to improve air quality. Through a structured program of scientific research, behavioral insights, community outreach, and policy support, Peace Air addresses three major sources of air pollution: solid fuel combustion, transportation emissions, and agricultural ammonia. The project brings together local authorities, universities, environmental authorities, health organizations and community groups from both jurisdictions, ensuring that the work is based on shared priorities and accessible evidence. John Gallagher, associate professor of engineering at Trinity University, said: “For us, the success of this project…
Ravi LakshmananJanuary 21, 2026Vulnerability / Artificial Intelligence A security vulnerability has been discovered in the popular open source artificial intelligence (AI) framework Chainlit. This vulnerability could allow an attacker to steal sensitive data and potentially allow lateral movement within a susceptible organization. Zafran Security said the high-severity flaws, collectively referred to as ChainLeak, could be exploited to leak API keys in cloud environments to steal sensitive files or conduct server-side request forgery (SSRF) attacks against servers hosting AI applications. Chainlit is a framework for creating conversational chatbots. According to statistics shared by the Python Software Foundation, this package has been…
A recently discovered sophisticated Linux malware framework known as VoidLink is believed to have been developed by a single person with the assistance of artificial intelligence (AI) models. This is due to new findings from Check Point Research, which identify operational security mistakes by the malware’s creators and shed light on the origin of the malware’s development. The latest insights make VoidLink one of the first instances of advanced malware generated primarily using AI. “These materials provide clear evidence that the malware was primarily generated through AI-driven development and reached its first functional implant within a week,” the cybersecurity firm…
Europe’s digital backbone is under increasing strain as cyber-sabotage, ransomware and foreign interference become everyday realities. In response, the European Commission announced a wide-ranging review of cybersecurity law and set out a new strategy to secure technology supply chains, reduce exposure to high-risk vendors, and strengthen the EU’s collective capacity to prevent and respond to cyber crises. The proposal marks a shift from piecemeal defenses to a more coordinated security-by-design approach aimed at protecting critical services, businesses and citizens across the bloc. The proposed reforms aim to future-proof the EU’s digital ecosystem by strengthening supply chain security, simplifying business rules…
A recent study by Washington State University geophysicists provides insight into how nutrients reach the subsurface ocean of Europa, one of Jupiter’s moons and a leading candidate for extraterrestrial life in our solar system. Scientists have long wondered how life-sustaining nutrients can get from the Earth’s surface to Europe’s oceans, where microscopic life is thought to exist. Using computer modeling, the research team showed that dense, nutrient-rich ice can separate from surrounding ice and descend into the ocean, taking advantage of the geological process of crustal delamination. “This is a novel idea in planetary science, inspired by ideas that are…