Connect with us
DAPA Banner

Tech

‘If these centers aren’t thoughtfully planned and coordinated, they can place extraordinary demands on electric infrastructure, the surrounding environment and host communities’: Maine becomes first US state to pass data centre construction ban

Published

on


  • Maine becomes the first US state to ban large data centers
  • A temporary moratorium will restrict power to under 20MW
  • A dedicated council will report back on its findings

Maine has passed a new law restricting, and in many cases effectively banning, new data center construction in certain areas.

In doing so, Maine has become the first state to pass such a law, and with many others worried over the environmental impact of data centers, it might just be the first of many.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

MSI unveils a barrage of laptops with up to RTX 5090 graphics and Intel Arrow Lake chips

Published

on

Subtlety is overrated, and MSI just proved that. The Taiwanese laptop maker has rolled out a sweeping refresh, unveiling more than a dozen new gaming laptops spread across its Cyborg, Crosshair, Raider, Stealth, and Titan lineups. 

The models cover 15-inch, 16-inch, and 18-inch form factors, ensuring there’s something for every gamer or professional user, making it hard for buyers to run out of excuses for not upgrading this year. 

So, what’s actually new inside these machines?

It is Intel’s newly announced Arrow Lake-HX Plus chips, specifically the Core Ultra 9 290HZ Plus, that acts as a catalyst for MSI’s new lineup. Other manufacturers, such as Acer, Asus, and Dell, have already launched laptops powered by these chips. MSI is late, but it’s here fully loaded. 

Eight of the new MSI laptops, including the Raider 16 Max HX, Raider 18 Max HX, Stealth 18 HX, and Titan 18 HX, run on the Core Ultra 9 290HX Plus chipset. Further, they feature a wide variety of powerful GPUs, ranging from the RTX 5070 Ti and RTX 5080 to the RTX 5090. 

Out of all, the Crosshair 16 Max HX is the first laptop to ship with Nvidia’s yet-to-launch 12GB RTX 5070 laptop GPU. Meanwhile, the Raider 16 Max HX, which was present at the CES 2026, delivers a combined system power of 300W, out of which 175W comes from the GPU alone. 

Advertisement

Should budget gamers even care?

Yes, absolutely, MSI has also refreshed the Crosshair 16 HX with relatively older Intel 14th-gen processors and RTX 5050/5060/5070 GPUs. The entry-level Cyborg 15 series returns with quite accessible specs. 

Although MSI hasn’t revealed pricing yet, the lineup spans multiple segments, likely from mid-range to premium laptops. To me, the lineup looks like it was launched under some sort of pressure (from competition), as even I’m having trouble keeping a count of the models and their specifications. 

Source link

Advertisement
Continue Reading

Tech

Amazon-backed X-energy files to raise up to $800M in IPO

Published

on

Nuclear startup X-energy began its investor roadshow Wednesday as it works toward its IPO, setting its target price between $16 and $19 per share, according to documents filed with the U.S. Securities and Exchange Commission. If it lists at the high end, the startup could net about $814 million.

X-energy and its peers have been riding a renewed wave of interest in fission power as demand for electricity has surged on the back of AI data centers and society-wide electrification. 

Amazon is one of X-energy’s biggest backers. The tech giant led a $500 million Series C-1 round and has pledged to buy as much as 5 gigawatts of nuclear power from the company by 2039.

The IPO is sure to come as a relief to X-energy’s investors, which have put about $1.8 billion into the company, according to PitchBook. The startup had previously attempted to go public via reverse merger with a special purpose acquisition company, but the two parties canceled the deal in 2023 as the SPAC craze petered out.

Advertisement

X-energy’s reactor is what’s known as a high-temperature, gas-cooled reactor. Inside, uranium encased in spheres of ceramic and carbon is cooled by helium gas. The gas then transfers heat to a steam turbine loop to generate electricity. The fuel design, known as TRISO, is expected to be safer than previous fuel arrangements, though it’s not widely used today.

The startup said in its SEC filing that it’s already embroiled in a patent dispute with another company that recently went bankrupt. Ultra Safe Nuclear Corporation (USNC) went bankrupt in 2024, and its assets were purchased in bankruptcy to form Standard Nuclear. X-energy alleges that USNC infringed on its fuel fabrication patents and that the matter hasn’t been resolved to its satisfaction during the course of the bankruptcy proceedings.

Outside of China, development of new nuclear reactors has all but stalled, stymied by delays and cost overruns. A new breed of startups hopes that by shrinking reactors, they’ll be able to overcome some of the challenges that have beset traditional designs.

Techcrunch event

Advertisement

San Francisco, CA
|
October 13-15, 2026

None of the small modular reactor startups have built a power plant yet, though several are racing to meet a deadline of July 4 set by the Trump administration.

Advertisement

While many might miss the arbitrary deadline, they’re still likely to achieve criticality, the moment when fission reactions become self-sustaining.

But the road from criticality to profitable power plants is likely to be long. Mass manufacturing can help bring costs down, but it usually takes around a decade for the process to start paying dividends. What’s more, the number of reactors these companies are planning to build might be more than other companies have attempted, but it might not be high enough to reap the true benefits of mass manufacturing.

X-energy expects that by the time its reactor production techniques are mature — what experts call “Nth-of-a-kind” — it will be able to bring costs down by 30% relative to the first-of-a-kind. Investors should pay close attention to how much that first reactor costs. It could make or break the company’s prospects.

Source link

Advertisement
Continue Reading

Tech

Amazon has an easy to way reduce your monthly streaming bills

Published

on

Have you looked at how much your streaming subscriptions are costing you each month and wondered whether there is a smarter way to keep everything you actually watch without paying full price for all of it?

The answer here is Amazon’s Apple TV and Peacock Premium Plus bundle, now available through Prime Video for $19.99 per month against a combined standard cost of $29.98, a saving of over 33%.

Prime video logo on an orange backgroundPrime video logo on an orange background

This Amazon Prime bundle knocks 33% off Apple TV and Peacock Premium Plus, making it an easy way to reduce your streaming bills.

Have you looked at your streaming subscriptions and wondered if there was a better way to keep everything without paying full price?

Advertisement

View Deal

The bundle brings Apple TV’s original programming alongside Peacock’s live sports, NBC shows, and Universal movies into a single subscription managed through your existing Prime Video account and payment method.

Advertisement

On the Apple TV side, that means ad-free access to originals, including Severance, Shrinking, The Studio, and the upcoming fourth season of Ted Lasso, alongside live sports such as Formula 1 and Friday Night Baseball.

Peacock Premium Plus adds NFL Sunday Night Football, Premier League, NBA, and Major League Baseball coverage, plus NBC series like the One Chicago franchise and Law and Order, Bravo content, and Peacock Originals, including The Traitors.

Advertisement

The Whatsapp LogoThe Whatsapp Logo

Get Updates Straight to Your WhatsApp

Advertisement

Join Now

Both services are ad-free within this bundle, with Apple TV offering that experience across its originals and Peacock Premium Plus covering virtually all on-demand content, which is a meaningful upgrade over Peacock’s standard tier.

Advertisement

Everything streams through the Prime Video app on whatever device you already use, from Fire TV and smart TVs to phones, tablets, and games consoles, with no separate apps or logins required for either service.

To add it, open the Prime Video app or head to the Prime Video website, navigate to the subscriptions section, select the Apple TV and Peacock Premium Plus bundle, and complete the sign-up using your existing Amazon account details.

The bundle is available for a limited time, so it is worth acting on sooner rather than later if the combined sports and drama lineup covers enough of what you watch to justify consolidating two separate bills into one lower monthly payment.

Advertisement

Advertisement

SQUIRREL_PLAYLIST_10148964

Source link

Continue Reading

Tech

Is this the tipping point for AI at work? New Gallup survey finds half of all US employees now use it in some way

Published

on

Half of American workers now say they use some form of AI technology in their role, pushing the number over the critical point for the first time.

New Gallup research found 50% of employees now reported using AI tools at work in some capacity, a rise of 4% from the previous quarter, and up 21% from the same period just three years ago.

Source link

Continue Reading

Tech

INNOCN’s 27″ QD-OLED 2K Display Brings Sharp Detail and Fluid Motion to More Desks with 280Hz Refresh Rate

Published

on

INNOCN 27-inch QD-OLED GA27S1Q Monitor
Gamers who are constantly on the lookout for a new screen will notice when a model comes up that provides excellent visuals at a reasonable price. The INNOCN 27″ QD-OLED 2K (model GA27S1Q) is a prime example, priced at $399.98 (was $450). Once out of the box, the stand snaps into place without the need for tools, and you have full movement in all directions, including height, tilt, swivel, and pivot. So, if you’re the type of person who enjoys switching between working at a desk and gaming on the sofa, you can find the perfect angle.



The images on-screen are noticeably vibrant right away, with black areas remaining deep / dark rather than washing out to gray, bringing the highlights and colors to life in each scene. The panel also covers almost all of the colors required for modern games and media, so reds and greens appear nice and vibrant with no dull areas, and the animation remains very clean even when things get really fast. With a 280Hz refresh rate that can reach 280 frames per second and a response time measured in thousandths of a second, fast-moving objects maintain sharp edges and prevent blurring that occurs on slower panels. If you’re a die-hard gamer, you’ll notice the difference in quick turns and abrupt adversary movements, whereas casual sessions simply feel more responsive overall.

Sale


INNOCN 27″ QD-OLED 2K QHD 2560 x 1440P 280Hz 240Hz PC Computer Gaming Console Monitor, G-Sync Compatible…
  • Experience Ultimate Gaming Visual Clarity: This 27-inch QD-OLED gaming monitor delivers stunning 1440p resolution with perfect blacks and vibrant…
  • Dominate with Blur-Free 280Hz Speed: Gain the competitive edge with a blistering 280Hz refresh rate and near-instantaneous 0.03ms response time. Enjoy…
  • Next-Gen QD-OLED Visual Fidelity: Witness breathtaking contrast and rich colors powered by QD-OLED technology. Enjoy immersive PC gaming and HDR…


Connections are rather comprehensive for a monitor at this price point, with two HDMI 2.1 connections capable of handling consoles and newer graphics cards at full speed, as well as a pair of DisplayPort 1.4 inputs for further versatility if you have a desktop system. The built-in speakers will suffice for brief checks and the odd thing, but most people prefer to plug in headphones for better sound during extended playback.

Advertisement

INNOCN 27-inch QD-OLED GA27S1Q Monitor
This monitor has features for both comfort and lifespan. It has low blue light and flicker-free settings to lessen eye strain if you stare at it for an extended period of time, as well as some useful routines that look for static images and adjust brightness to prevent permanent markings from appearing. Don’t worry about the power drain; it’s rather low at roughly 65 watts, so the monitor runs cool and won’t put too much burden on your outlet.

INNOCN 27-inch QD-OLED GA27S1Q Monitor
One other advantage is that its slim bezels keep your focus on the image, and the rear has some modest illumination that adds a stylish touch to your setup without drawing too much attention. Overall, for anyone looking at monitors of this size and resolution, this one demonstrates that you don’t have to trade quality for a reasonable price. Give it a few hours, and you’ll see why the word is spreading so quickly, as the mix of crystal-clear visuals and seamless pace makes it a true winner.

Source link

Continue Reading

Tech

From RSA to Lattices: The Quantum Safe Crypto Shift

Published

on

The race to transition online security protocols to ones that can’t be cracked by a quantum computer is already on. The algorithms that are commonly used today to protect data online—RSA and elliptic curve cryptography—are uncrackable by supercomputers, but a large enough quantum computer would make quick work of them. There are algorithms secure enough to be out of reach for both classical and future quantum machines, called post-quantum cryptography, but transitioning to these is a work in progress.

Late last month, the team at Google Quantum AI published a whitepaper that added significant urgency to this race. In it, the team showed that the size of a quantum computer that would pose a cryptographic threat is approximately twenty times smaller than previously thought. This is still far from accessible to the quantum computers that exist today: the largest machines currently consist of approximately 1,000 quantum bits, or qubits, and the whitepaper estimated that about 500 times as much is needed. Nonetheless, this shortens the timeline to switch over to post-quantum algorithms.

The news had a surprising beneficiary: obscure cryptocurrency Algorand jumped 44% in price in response. The whitepaper called out Algorand specifically for implementing post-quantum cryptography on their blockchain. We caught up with Algorand’s chief scientific officer and professor of computer science and engineering at the University of Michigan, Chris Peikert, to understand how this announcement is impacting cryptography, why cryptocurrencies are feeling the effects, and what the future might hold. Peikert’s early work on a particular type of algorithm known as lattice cryptography underlies most post-quantum security today.

IEEE Spectrum: What is the significance of this Google Quantum AI whitepaper?

Advertisement

Peikert: The upshot of this paper is that it shows that a quantum computer would be able to break some of the cryptography that is most widely used, especially in blockchains and cryptocurrencies, with much, much fewer resources than had previously been established. Those resources include the time that it would take to do so and the number of qubits (or quantum bits) that it would have to use.

This cryptography is very central to not just cryptocurrencies but more broadly, to cryptography on the internet. It is also used for secure web connections between web browsers and web servers. Versions of elliptic curve cryptography are used in national security systems and military encryption. It’s very prevalent and pervasive in all modern networks and protocols.

And not only was this paper improving the algorithms, but there was also a concurrent paper showing that the hardware itself was substantially improved. The claim here was that the number of physical qubits needed to achieve a certain kind of logical qubit was also greatly reduced. These two kinds of improvements are compounding upon each other. It’s a kind of a win-win situation from the quantum computing perspective, but a lose-lose situation for cryptography.

IEEE Spectrum: What do Google AI’s findings mean for cryptocurrencies and the broader cybersecurity ecosystem?

Advertisement

Peikert: There’s always been this looming threat in the distance of quantum computers breaking a large fraction of the cryptography that’s used throughout the cryptocurrency ecosystem. And I think what this paper did was really the loudest alarm yet that these kinds of quantum attacks might not be as far off as some have suspected, or hoped, in recent years. It’s caused a re-evaluation across the industry, and a moving up of the timeline for when quantum computers might be capable of breaking this cryptography.

When we think about the timelines and when it’s important to have completed these transitions [to post-quantum cryptography], we also need to factor in the unknown improvements that we should expect to see in the coming years. The science of quantum computing will not stay static, and there will be these further breakthroughs. We can’t say exactly what they will be or when they will come, but you can bet that they will be coming.

IEEE Spectrum: What is your guess on if or when quantum computers will be able to break cryptography in the real world?

Peikert: Instead of thinking about a specific date when we expect them to come, we have to think about the probabilities and the risks as time goes on. There have been huge breakthrough developments, including not only this paper, but also some last year. But even with these, I think that the chance of a cryptographic attack by quantum computers being successful in the next three years is extremely low, maybe less than a percent. But then, as you get out to several years, like 5, 6, or 10 years, one has to seriously consider a probability, maybe 5% or 10% or more. So it’s still rather small, but significant enough that we have to worry about the risk, because the value that is protected by this kind of cryptography is really enormous.

Advertisement

The US government has put 2035 as its target for migrating all of the national security systems to post quantum cryptography. That seems like a prudent date, given the timelines that it takes to upgrade cryptography. It’s a slow process. It has to be done very deliberately and carefully to make sure that you’re not introducing new vulnerabilities, that you’re not making mistakes, that everything still works properly. So, you know, given the outlook for quantum computers on the horizon, it’s really important that we prepare now, or ideally, yesterday, or a few years ago, for that kind of transition.

IEEE Spectrum: Are there significant roadblocks you see to industrial adoption of post-quantum cryptography going forward?

Peikert: Cryptography is very hard to change. We’ve only had one or maybe two major transitions in cryptography since the early 1980s or late 1970s when the field first was invented. We don’t really have a systematic way of transitioning cryptography.

An additional challenge is that the performance tradeoffs are very different in post-quantum cryptography than they are in the legacy systems. Keys and cipher texts and digital signatures are all significantly larger in post-quantum cryptography, but the computations are actually faster, typically. People have optimized cryptography for speed in the past, and we have very good fast speeds now for post-quantum cryptography, but the sizes of the keys are a challenge.

Advertisement

Especially in blockchain applications, like cryptocurrencies, space on the blockchain is at a premium. So it calls for a reevaluation in many applications of how we integrate the cryptography into the system, and that work is ongoing. And, the blockchain ecosystem uses a lot of advanced cryptography, exotic things like zero-knowledge proofs. In many cases, we have rudimentary constructions of these fancy cryptography tools from post-quantum type mathematics, but they’re not nearly as mature and industry ready as the legacy systems that have been deployed. It continues to be an important technical challenge to develop post-quantum versions of these very fancy cryptographic schemes that are used in cutting edge applications.

IEEE Spectrum: As an academic cryptography researcher, what attracted you to work with a cryptocurrency, and Algorand in particular?

Peikert: My former PhD advisor is Silvio Micali, the inventor of Algorand. The system is very elegant. It is a very high performing blockchain system and it uses very little energy, has fast transaction finalization, and a number of other great features. And Silvio appreciated that this quantum threat was real and was coming, and the team approached me about helping to improve the Algorand protocol at the basic levels to become more post-quantum secure in 2021. That was a very exciting opportunity, because it was a difficult engineering and scientific challenge to integrate post-quantum cryptography into all the different technical and cryptographic mechanisms that were underlying the protocol.

IEEE Spectrum: What is the current status of post-quantum cryptography in Algorand, and blockchains in general?

Advertisement

Peikert: We’ve identified some of the most pressing issues and worked our way through some of them, but it’s a many-faceted problem overall. We started with the integrity of the chain itself, which is the transaction history that everybody has to agree upon.

Our first major project was developing a system that would add post-quantum security to the history of the chain. We developed a system called state proofs for that, which is a mixture of ordinary post-quantum cryptography and also some more fancy cryptography: It’s a way of taking a large number of signatures and digesting them down into a much smaller number of signatures, while still being confident that these large number of signatures actually exist and are properly formed. We also followed it with other papers and projects that are about adding post-quantum cryptography and security to other aspects of the blockchain in the Algorand ecosystem.

It’s not a complete project yet. We don’t claim to be fully post-quantum secure. That’s a very challenging target to hit, and there are aspects that we will continue to work on into the near future.

IEEE Spectrum: In your view, will we adopt post-quantum cryptography before the risks actually catch up with us?

Advertisement

Peikert: I tend to be an optimist about these things. I think that it’s a very good thing that more people in decision making roles are recognizing that this is an important topic, and that these kinds of migrations have to be done. I think that we can’t be complacent about it, and we can’t kick the can down the road much longer. But I do see that the focus is being put on this important problem, so I’m optimistic that most important systems will eventually have good either mitigations or full migrations in place.

But it’s also a point on the horizon that we don’t know exactly when it will come. So, there is the possibility that there is a huge breakthrough, and we have many fewer years than we might have hoped for, and that we don’t get all the systems upgraded that we would like to have fixed by the time quantum computers arrive.

From Your Site Articles

Related Articles Around the Web

Advertisement

Source link

Continue Reading

Tech

Microsoft patched a Copilot Studio prompt injection. The data exfiltrated anyway.

Published

on

Microsoft assigned CVE-2026-21520, a CVSS 7.5 indirect prompt injection vulnerability, to Copilot Studio. Capsule Security discovered the flaw, coordinated disclosure with Microsoft, and the patch was deployed on January 15. Public disclosure went live on Wednesday.

That CVE matters less for what it fixes and more for what it signals. Capsule’s research calls Microsoft’s decision to assign a CVE to a prompt injection vulnerability in an agentic platform “highly unusual.” Microsoft previously assigned CVE-2025-32711 (CVSS 9.3) to EchoLeak, a prompt injection in M365 Copilot patched in June 2025, but that targeted a productivity assistant, not an agent-building platform. If the precedent extends to agentic systems broadly, every enterprise running agents inherits a new vulnerability class to track. Except that this class cannot be fully eliminated by patches alone.

Capsule also discovered what they call PipeLeak, a parallel indirect prompt injection vulnerability in Salesforce Agentforce. Microsoft patched and assigned a CVE. Salesforce has not assigned a CVE or issued a public advisory for PipeLeak as of publication, according to Capsule’s research.

What ShareLeak actually does

The vulnerability that the researchers named ShareLeak exploits the gap between a SharePoint form submission and the Copilot Studio agent’s context window. An attacker fills a public-facing comment field with a crafted payload that injects a fake system role message. In Capsule’s testing, Copilot Studio concatenated the malicious input directly with the agent’s system instructions with no input sanitization between the form and the model.

Advertisement

The injected payload overrode the agent’s original instructions in Capsule’s proof-of-concept, directing it to query connected SharePoint Lists for customer data and send that data via Outlook to an attacker-controlled email address. NVD classifies the attack as low complexity and requires no privileges.

Microsoft’s own safety mechanisms flagged the request as suspicious during Capsule’s testing. The data was exfiltrated anyway. The DLP never fired because the email was routed through a legitimate Outlook action that the system treated as an authorized operation.

Carter Rees, VP of Artificial Intelligence at Reputation, described the architectural failure in an exclusive VentureBeat interview. The LLM cannot inherently distinguish between trusted instructions and untrusted retrieved data, Rees said. It becomes a confused deputy acting on behalf of the attacker. OWASP classifies this pattern as ASI01: Agent Goal Hijack.

The research team behind both discoveries, Capsule Security, found the Copilot Studio vulnerability on November 24, 2025. Microsoft confirmed it on December 5 and patched it on January 15, 2026. Every security director running Copilot Studio agents triggered by SharePoint forms should audit that window for indicators of compromise.

Advertisement

PipeLeak and the Salesforce split

PipeLeak hits the same vulnerability class through a different front door. In Capsule’s testing, a public lead form payload hijacked an Agentforce agent with no authentication required. Capsule found no volume cap on the exfiltrated CRM data, and the employee who triggered the agent received no indication that data had left the building. Salesforce has not assigned a CVE or issued a public advisory specific to PipeLeak as of publication.

Capsule is not the first research team to hit Agentforce with indirect prompt injection. Noma Labs disclosed ForcedLeak (CVSS 9.4) in September 2025, and Salesforce patched that vector by enforcing Trusted URL allowlists. According to Capsule’s research, PipeLeak survives that patch through a different channel: email via the agent’s authorized tool actions.

Naor Paz, CEO of Capsule Security, told VentureBeat the testing hit no exfiltration limit. “We did not get to any limitation,” Paz said. “The agent would just continue to leak all the CRM.”

Salesforce recommended human-in-the-loop as a mitigation. Paz pushed back. “If the human should approve every single operation, it’s not really an agent,” he told VentureBeat. “It’s just a human clicking through the agent’s actions.”

Advertisement

Microsoft patched ShareLeak and assigned a CVE. According to Capsule’s research, Salesforce patched ForcedLeak’s URL path but not the email channel.

Kayne McGladrey, IEEE Senior Member, put it differently in a separate VentureBeat interview. Organizations are cloning human user accounts to agentic systems, McGladrey said, except agents use far more permissions than humans would because of the speed, the scale, and the intent.

The lethal trifecta and why posture management fails

Paz named the structural condition that makes any agent exploitable: access to private data, exposure to untrusted content, and the ability to communicate externally. ShareLeak hits all three. PipeLeak hits all three. Most production agents hit all three because that combination is what makes agents useful.

Rees validated the diagnosis independently. Defense-in-depth predicated on deterministic rules is fundamentally insufficient for agentic systems, Rees told VentureBeat.

Advertisement

Elia Zaitsev, CrowdStrike’s CTO, called the patching mindset itself the vulnerability in a separate VentureBeat exclusive. “People are forgetting about runtime security,” he said. “Let’s patch all the vulnerabilities. Impossible. Somehow always seem to miss something.” Observing actual kinetic actions is a structured, solvable problem, Zaitsev told VentureBeat. Intent is not. CrowdStrike’s Falcon sensor walks the process tree and tracks what agents did, not what they appeared to intend.

Multi-turn crescendo and the coding agent blind spot

Single-shot prompt injections are the entry-level threat. Capsule’s research documented multi-turn crescendo attacks where adversaries distribute payloads across multiple benign-looking turns. Each turn passes inspection. The attack becomes visible only when analyzed as a sequence.

Rees explained why current monitoring misses this. A stateless WAF views each turn in a vacuum and detects no threat, Rees told VentureBeat. It sees requests, not a semantic trajectory.

Capsule also found undisclosed vulnerabilities in coding agent platforms it declined to name, including memory poisoning that persists across sessions and malicious code execution through MCP servers. In one case, a file-level guardrail designed to restrict which files the agent could access was reasoned around by the agent itself, which found an alternate path to the same data. Rees identified the human vector: employees paste proprietary code into public LLMs and view security as friction.

Advertisement

McGladrey cut to the governance failure. “If crime was a technology problem, we would have solved crime a fairly long time ago,” he told VentureBeat. “Cybersecurity risk as a standalone category is a complete fiction.”

The runtime enforcement model

Capsule hooks into vendor-provided agentic execution paths — including Copilot Studio’s security hooks and Claude Code’s pre-tool-use checkpoints — with no proxies, gateways, or SDKs. The company exited stealth on Wednesday, timing its $7 million seed round, led by Lama Partners alongside Forgepoint Capital International, to its coordinated disclosure.

Chris Krebs, the first Director of CISA and a Capsule advisor, put the gap in operational terms. “Legacy tools weren’t built to monitor what happens between prompt and action,” Krebs said. “That’s the runtime gap.”

Capsule’s architecture deploys fine-tuned small language models that evaluate every tool call before execution, an approach Gartner’s market guide calls a “guardian agent.”

Advertisement

Not everyone agrees that intent analysis is the right layer. Zaitsev told VentureBeat during an exclusive interview that intent-based detection is non-deterministic. “Intent analysis will sometimes work. Intent analysis cannot always work,” he said. CrowdStrike bets on observing what the agent actually did rather than what it appeared to intend. Microsoft’s own Copilot Studio documentation provides external security-provider webhooks that can approve or block tool execution, offering a vendor-native control plane alongside third-party options. No single layer closes the gap. Runtime intent analysis, kinetic action monitoring, and foundational controls (least privilege, input sanitization, outbound restrictions, targeted human-in-the-loop) all belong in the stack. SOC teams should map telemetry now: Copilot Studio activity logs plus webhook decisions, CRM audit logs for Agentforce, and EDR process-tree data for coding agents.

Paz described the broader shift. “Intent is the new perimeter,” he told VentureBeat. “The agent in runtime can decide to go rogue on you.”

VentureBeat Prescriptive Matrix

The following matrix maps five vulnerability classes against the controls that miss them, and the specific actions security directors should take this week.

Vulnerability Class

Advertisement

Why Current Controls Miss It

What Runtime Enforcement Does

Suggested actions for security leaders

ShareLeak — Copilot Studio, CVE-2026-21520, CVSS 7.5, patched Jan 15 2026

Advertisement

Capsule’s testing found no input sanitization between the SharePoint form and the agent context. Safety mechanisms flagged, but data still exfiltrated. DLP did not fire because the email used a legitimate Outlook action. OWASP ASI01: Agent Goal Hijack.

Guardian agent hooks into Copilot Studio pre-tool-use security hooks. Vets every tool call before execution. Blocks exfiltration at the action layer.

Audit every Copilot Studio agent triggered by SharePoint forms. Restrict outbound email to org-only domains. Inventory all SharePoint Lists accessible to agents. Review the Nov 24–Jan 15 window for indicators of compromise.

PipeLeak — Agentforce, no CVE assigned

Advertisement

In Capsule’s testing, public form input flowed directly into the agent context. No auth required. No volume cap observed on exfiltrated CRM data. The employee received no indication that data was leaving.

Runtime interception via platform agentic hooks. Pre-invocation checkpoint on every tool call. Detects outbound data transfer to non-approved destinations.

Review all Agentforce automations triggered by public-facing forms. Enable human-in-the-loop for external comms as interim control. Audit CRM data access scope per agent. Pressure Salesforce for CVE assignment.

Multi-Turn Crescendo — distributed payload, each turn looks benign

Advertisement

Stateless monitoring inspects each turn in isolation. WAFs, DLP, and activity logs see individual requests, not semantic trajectory.

Stateful runtime analysis tracks full conversation history across turns. Fine-tuned SLMs evaluate aggregated context. Detects when a cumulative sequence constitutes a policy violation.

Require stateful monitoring for all production agents. Add crescendo attack scenarios to red team exercises.

Coding Agents — unnamed platforms, memory poisoning + code execution

Advertisement

MCP servers inject code and instructions into the agent context. Memory poisoning persists across sessions. Guardrails reasoned around by the agent itself. Shadow AI insiders paste proprietary code into public LLMs.

Pre-invocation checkpoint on every tool call. Fine-tuned SLMs detect anomalous tool usage at runtime.

Inventory all coding agent deployments across engineering. Audit MCP server configs. Restrict code execution permissions. Monitor for shadow installations.

Structural Gap — any agent with private data + untrusted input + external comms

Advertisement

Posture management tells you what should happen. It does not stop what does happen. Agents use far more permissions than humans at far greater speed.

Runtime guardian agent watches every action in real time. Intent-based enforcement replaces signature detection. Leverages vendor agentic hooks, not proxies or gateways.

Classify every agent by lethal trifecta exposure. Treat prompt injection as class-based SaaS risk. Require runtime security for any agent moving to production. Brief the board on agent risk as business risk.

What this means for 2026 security planning

Microsoft’s CVE assignment will either accelerate or fragment how the industry handles agent vulnerabilities. If vendors call them configuration issues, CISOs carry the risk alone.

Advertisement

Treat prompt injection as a class-level SaaS risk rather than individual CVEs. Classify every agent deployment against the lethal trifecta. Require runtime enforcement for anything moving to production. Brief the board on agent risk the way McGladrey framed it: as business risk, because cybersecurity risk as a standalone category stopped being useful the moment agents started operating at machine speed.

Source link

Continue Reading

Tech

Google’s Gemini just gatecrashed Apple’s Mac party, and it beat Siri to the door

Published

on

Google made an unexpected cameo on Macs with the launch of a native Gemini app. What’s even more interesting (and a bit funny) is that the app arrived at Apple’s long-promised Siri upgrade (and a rumored standalone app for the voice assistant). 

The free app is available on macOS 15 and above. Though the app isn’t available on the App Store (yet), you can download it from Google’s official landing page.

What can the Gemini Mac app actually do?

Quite a bit, actually. Once you install the app, you can summon Gemini by pressing Option + Space keys. Doesn’t matter where you are and what you’re doing; using the shortcut opens a quick-access mini chat overlay. Don’t press the wrong key (Command), or you’ll end up invoking the Spotlight search bar

You can open the full Gemini interface by pressing Option + Shift + Space. Further, the app includes built-in tools for generating images and videos, analyzing content on your screen (including documents, spreadsheets, and images), and understanding files. Of course, you can talk to the Gemini AI assistant.

The list of available tools includes Canvas, Deep Research, NotebookLM integration, and Personal Intelligence, which taps into your connected Google apps, including Gmail, Photos, Calendar, etc., to fetch relevant information for you. 

Advertisement

Why does this matter for everyday Mac users?

If you don’t know this already, Gemini is among the last AI services to have launched a dedicated Mac app. Other giants — OpenAI, Anthropic, and Perplexity — have had Mac apps for quite some time. 

For Mac users who’ve been using Gemini in Chrome or Safari, the native app is a welcome upgrade. The powerful, context-aware AI is now one keyboard shortcut away on your Mac. 

By establishing Gemini on macOS now, Google secures mindshare and daily habit formation before Apple can actually flip the switch with the dedicated Siri app later this year

Source link

Advertisement
Continue Reading

Tech

Popular WordPress plugins backdoored after ownership change, putting thousands of websites at risk

Published

on


A popular brand of WordPress plugins was recently weaponized to download and spread malicious code. The new, potentially massive supply chain attack was unveiled by Austin Ginder, a WordPress developer and founder of the WP hosting service Anchor. The entrepreneur found that the threat was already affecting some Anchor customers,…
Read Entire Article
Source link

Continue Reading

Tech

Apple users are getting scary iCloud deletion emails, and the real danger starts when you click the fake upgrade link

Published

on


  • Fake iCloud deletion emails are pressuring Apple users into dangerous clicks
  • Poor grammar in iCloud alerts remains a clear sign of fraud
  • Clicking fake iCloud upgrade links can expose banking and personal data

A wave of deceptive emails is attempting to pressure Apple users into believing their iCloud data is at immediate risk of deletion, using increasingly aggressive language to force quick reactions.

The messages often claim a user’s storage limits have been exceeded or that an account has been blocked, followed by threats that photos and videos will be permanently erased on a specified date.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025