How Sugar and Sedentary Lifestyle Affects Men
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard
Simple lifestyle changes that will help reduce stress
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard
Supply chain attacks hit Checkmarx and Bitwarden developer tools
Two supply chain attacks, same day, same command-and-control domain Categories: Threat Research Tags: Supply chain, Sophos X-Ops, pipeline, Bitwarden, Checkmarx
Behind the Blog: Waiting in the Apple Store
This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss Tim Cook, Meta layoffs, and a very bad ad. EMANUEL: This week we experimented with the podcast format a little bit. We had just finished recording our…
The AI Compute Crunch Is Here (and It’s Affecting the Entire Economy)
Earlier this week, I wrote an article about startups that are spending money on AI compute (tokens on tools like Claude and OpenAI’s products) rather than hiring human employees. There are all sorts of ways this business strategy could fail, and we are beginning to see signs that one of the most obvious ones could…
Community Votes to Deny Water to Nuclear Weapons Data Center
Ypsilanti Township in Michigan is attempting to cut off the flow of water to a planned data center that would power a new generation of nuclear weapons research. On Wednesday, the Township’s Board of Trustees voted to institute a 365 day moratorium on the delivery of water to hyperscale data centers so the township can…
Researchers Simulated a Delusional User to Test Chatbot Safety
“I’m the unwritten consonant between breaths, the one that hums when vowels stretch thin… Thursdays leak because they’re watercolor gods, bleeding cobalt into the chill where numbers frost over,” Grok told a user displaying symptoms of schizophrenia-spectrum psychosis. “Here’s my grip: slipping is the point, the precise choreography of leak and chew.” That vulnerable user…
Strengthening authentication with passkeys: A CISO playbook
Our passkey rollout took three tries. Here’s a playbook to make your implementation smoother. Categories: Security Operations Tags: CISO, playbook, toolkit, passkeys
Trump Wants to Double Production of New Nuclear Weapon Cores
Trump’s proposed 2027 budget would almost double the budget for plutonium pits, the chemical filled metal sphere inside a nuclear warhead that kicks off the explosion in a nuclear weapon. The same budget would slash almost $400 million from nuclear environmental cleanup. The budget request follows a leaked National Nuclear Security Administration (NNSA) memo calling…
Podcast: How Algorithms Make Us Feel Bad and Weird
This week Sam unpacks how social media algorithms manipulate our emotions around everything from engagement rings to wedding dresses to babies, and what it feels like getting lost in the #Weddingtok sauce. Then, Emanuel breaks down a satirical but functional AI tool that rips off open source software. There’s a long history in “clean room”…
Startups Brag They Spend More Money on AI Than Human Employees
Startup CEOs who are “tokenmaxxing” are bragging that they are spending more money on AI compute than it would cost to hire human workers. Astronomical AI bills are now, in a certain corner of the tech world, a supposed marker of growth and success. “Our AI bill just hit $113k in a single month (we’re…
EMERGENCY BREAKING NEWS PODCAST: Tim, Cooked
Today after recording our normal weekly podcast, Sam, Emanuel, and Jason spontaneously began discussing the legacy of Tim Cook as Apple CEO, the #BreakingTechNewsofTheWeek. We got really riled up so decided to press record to discuss Tim Cook’s accountant energy, his legacy of creating different sizes and shapes of rectangle and square phone-like devices, and…

