Agregátor RSS

Čeští meteorologové vyvracejí fámy o zásadním vlivu větrných elektráren na počasí a krajinu

Živě.cz - 5 Květen, 2026 - 11:45
Český hydrometeorologický ústav se pustil do vyvracení fám ohledně větrných elektráren, které se už nějaký čas šíří i českým internetovým prostorem. Typicky jde o nepodložená tvrzení, podle kterých dokážou rozsáhlé farmy větrníků citelně měnit ráz kontinentálního počasí, způsobují sucho, případně ...
Kategorie: IT News

Microsoft, Google push AI agent governance into enterprise IT mainstream

Computerworld.com [Hacking News] - 5 Květen, 2026 - 11:34

Microsoft and Google are adding new controls for AI agents, as enterprise IT teams try to keep up with tools that can access corporate data and act across business applications.

Microsoft’s Agent 365, announced last November and made generally available for commercial customers on May 1, is designed to help organizations discover, govern, and secure AI agents, including those operating across Microsoft, third-party SaaS, cloud, and local environments.

Google’s new AI control center for Workspace, announced this week, focuses more specifically on giving administrators a centralized view of AI usage, security settings, data protection controls, and privacy safeguards within Workspace.

The timing reflects a shift in enterprise AI use. Many companies are no longer just testing chatbots, but are beginning to use agents that can reach corporate systems and carry out tasks on behalf of users.

Analysts said the shift changes how CIOs and CISOs should think about AI agents inside the enterprise.

“By placing agent controls alongside identity, access, data, and workload management, vendors are positioning AI governance as an operational discipline owned jointly by IT and security,” said Biswajeet Mahapatra, principal analyst at Forrester. “For CIOs, this means AI agents now need to be managed like any other digital workforce, with lifecycle oversight, cost visibility, and integration into service management.”

For CISOs, that broadens the mandate beyond model risk and data leakage. As agents are given more autonomy, security teams will need a more continuous way to control what they can do and contain the impact when their actions create risk.

The announcements also elevate AI governance to a “core component of all AI-assisted enterprise applications,” signaling to CIOs and CISOs that governance will need to be built into AI deployments as adoption moves from pilots to enterprise-wide enablement, according to Lian Jye Su, chief analyst at Omdia.

Where Microsoft and Google differ

Microsoft Agent 365 and Google’s AI control center address related governance problems, but from different starting points.

“Given how enterprises are increasingly deploying AI in multicloud and hybrid IT environments, these two are complementary,” Su said. “They are highly optimized for AI workloads within their respective environments, meaning enterprises heavily invested in one vendor will find the native AI governance experience to be far smoother.”

According to Mahapatra, enterprises should see the distinction as a matter of platform scope rather than governance maturity. Microsoft’s approach treats AI agents as enterprise actors that require broad organizational oversight, while Google’s controls are more narrowly focused on how AI interacts with collaboration data and user content.

“These are not fully competing approaches because they govern different control planes, but they are not truly complementary either unless an enterprise standardizes on both ecosystems,” Mahapatra said. “Over time, each model reinforces governance capabilities that are tightly coupled to its underlying productivity and data platforms, which increases the risk that AI governance decisions become implicitly tied to vendor choice rather than enterprise architecture strategy.”

Pareekh Jain, CEO of Pareekh Consulting, took a middle view, saying the approaches are both complementary and competitive, especially as enterprises using both Microsoft and Google may find AI governance becoming more closely tied to each vendor’s underlying platform.

Risks left to resolve

The new controls may give enterprises better visibility into AI agents, but analysts said they do not eliminate bigger risks related to shadow AI, third-party integrations, and accountability for autonomous actions.

According to Jain, shadow AI agents can still emerge through developer tools, browser extensions, local assistants, SaaS copilots, and unsanctioned tool connections. Third-party integrations, he said, could also expand faster than security teams can validate them.

“Audit logs may show what happened, but not always why an autonomous agent chose an action,” Jain said.

That leaves enterprises with difficult questions when an agent takes actions that create business or security risks. Better logs do not automatically settle questions of control or responsibility.

Mahapatra said the biggest gaps are likely to remain outside the boundaries of native platforms. Shadow agents created through low-code tools, external APIs, or embedded SaaS applications can bypass central controls and operate with excessive or inherited permissions.

“Third-party integrations often expand agent reach without equivalent visibility into downstream actions or data propagation,” Mahapatra said. “Auditability remains uneven when agents chain actions across systems, making it hard to reconstruct intent versus outcome. Accountability is still unresolved when autonomous agents trigger material business or security impacts, since ownership is split across users, developers, and platform controls.”

The message for enterprises is that native controls from Microsoft or Google may help, but they are unlikely to cover the full agent landscape. Companies using multiple clouds, SaaS tools, developer platforms, and browser-based AI assistants will still need governance that extends beyond any single vendor’s console.

Related reading:

Kategorie: Hacking & Security

NHS to close-source hundreds of GitHub repos over AI, security concerns

The Register - Anti-Virus - 5 Květen, 2026 - 11:15
Healthcare giant's maintainers handed May deadline to enact the change

The UK's National Health Service (NHS) is ordering all of its technology leaders to temporarily wall off the organization's open source projects over concerns relating to advanced AI and Anthropic's Mythos.…

Kategorie: Viry a Červi

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

The Hacker News - 5 Květen, 2026 - 11:07
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have enabled the
Kategorie: Hacking & Security

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

The Hacker News - 5 Květen, 2026 - 11:07
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have enabled the Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

ScarCruft hackers push BirdCall Android malware via game platform

Bleeping Computer - 5 Květen, 2026 - 11:04
The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain attack through a video game platform. [...]
Kategorie: Hacking & Security

Poslední místo, kde byste čekali dotykový displej. Turtle Beach vyrobil netradiční myš

Živě.cz - 5 Květen, 2026 - 10:45
Turtle Beach Command Series MC7 obsahuje velký dotykový displej a 11 tlačítek. • K tomu má perfektní kolečko, které umí vše, co byste chtěli. • Láká také na vyměnitelné akumulátory, které se do těla zasouvají jako kazeta.
Kategorie: IT News

Microsoft's bad obsession is showing up in shabby services and slipshod software. Here's proof

The Register - Anti-Virus - 5 Květen, 2026 - 10:30
If you can't bother to keep GitHub running, why should we bother with you?

Opinion  It's been another shabby week for Microsoft, and a shabbier one for its users. We learnt that Windows 11's epic habit of trying to corral customers into paid-for Microsoft services just got worse with a low-rent trick. Remote Desktop got a bit more secure, which is good, but in a way that suggests not too much user testing took place. As for GitHub… GitHub got two helpings of Chef Redmondo's Special Sauce.…

Kategorie: Viry a Červi

S 2nm procesem rozšiřuje TSMC kapacity o 45 % rychleji než se 3nm. Ještě zrychlí

CD-R server - 5 Květen, 2026 - 10:00
TSMC se daří se 2nm procesem zlepšovat výtěžnost i výrobní kapacity rychleji než s 3nm generací. Ještě však zrychlí: Každý rok chce otevřít 9 továren a dosáhnout 2× vyšší kapacity než u 3nm procesu…
Kategorie: IT News

Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

The Hacker News - 5 Květen, 2026 - 09:37
A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the "/papi/esearch/data/devops/
Kategorie: Hacking & Security

Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

The Hacker News - 5 Květen, 2026 - 09:37
A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the "/papi/esearch/data/devops/Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hyrox tlačí tělo do extrémů. V nejtvrdším fitness závodu už nestačí jen pocity, potřebujete senzory a přesná data

Živě.cz - 5 Květen, 2026 - 08:45
Hyrox dnes patří k nejrychleji rostoucím sportovním formátům. Jde o náročný sport, kombinující různé disciplíny. Ve Varšavě se v dubnu setkala světová špička Elite 15, ve které nechyběl ani český zástupce. Zajímavé bylo i spojení sportu a technologie.
Kategorie: IT News

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

The Hacker News - 5 Květen, 2026 - 08:35
Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-stage campaign, observed between April 14 and 16, 2026, targeted more than 35,000 users across over 13,000 organizations in 26 countries,
Kategorie: Hacking & Security

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

The Hacker News - 5 Květen, 2026 - 08:35
Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-stage campaign, observed between April 14 and 16, 2026, targeted more than 35,000 users across over 13,000 organizations in 26 countries, Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Kolem bitcoinu se dá vystavět úplně běžný byznys, který ale umí otevírat témata z kryptosvěta

Lupa.cz - články - 5 Květen, 2026 - 08:06
Mikina jako icebreaker? Může být, když nosíte bitcoin na sobě. V aktuálním dílu si povídáme o tom, jak vznikla minimalistická móda zaměřená na bitcoin, díky které se dál šíří osvěta.
Kategorie: IT News

Čínský vyzbrojený minivrtulníček připomíná spíše produkci Marvelu. Zatím je to jen prototyp, ale jednou má sloužit ve městech

Živě.cz - 5 Květen, 2026 - 07:45
Vypadá to spíše jako filmová rekvizita z produkce Marvelu a těžko říci, jestli neskončilo jen u makety, přinejmenším na sociálních sítích v a bezpečnostní blogosféře ale Superwing ZR-300 vzbudil ohromný zájem. A není divu, podle fotky a dostupných informací se totiž jedná o těžce vyzbrojený ...
Kategorie: IT News

Ryzen 5 5500X3D vs. 14 historických CPU včetně Pentia 4, Nehalem a Piledriver

CD-R server - 5 Květen, 2026 - 07:40
Dnes se podíváme nejen jak si vede Ryzen 5 5500X3D, ale jak si vede ve srovnání se staršími procesory - a to včetně kousků jako Pentium 4 651, FX-8350, Core i7-960X či Ryzen 3 1200…
Kategorie: IT News

Omarchy 3.7.0

AbcLinuxu [zprávičky] - 5 Květen, 2026 - 05:00
Omarchy je linuxová distribuce s dlaždicovým správcem oken Hyprland. Založena je na Arch Linuxu. Vydána byla v nové verzi 3.7.0 - The Gaming Edition. Z novinek lze vypíchnout příkaz omarchy a celou řadu herních možností.
Kategorie: GNU/Linux & BSD

Singapore boffins get diverse SIEMs singing in harmony with agentic rule translation

The Register - Anti-Virus - 5 Květen, 2026 - 04:12
Academics from Singapore and China have found a way to make AI useful for cyber-defenders, by creating a technique that translates rules from diverse Security Information and Event Managements (SIEMs) so they’re easier to consume across multiple systems. SIEMs collect log files from many sources and allow users to set rules that trigger alerts that a security operations center (SOC) considers in case they represent security incidents. Testing for an “impossible travel” scenario – in which the same user logs on from New York and London within an hour, suggesting credential theft or other skulduggery – is a common SIEM rule. Many organizations end up with multiple SIEMs, which means complexity for SOCs. Enter researchers from the National University of Singapore and China’s Fudan University, who recently presented a paper [PDF] titled “ARuleCon: Agentic Security Rule Conversion” in which they explain a technique they developed to translate rules so they’re consumable by multiple SIEMs. Lead author Ming Xu told The Register she and her colleagues developed ARuleCon because SIEMs use specific schemas for rules, so a rule created with one SIEM won’t work with another. While some vendors provide translation tools, they don’t offer support for many SIEMs: the authors say Microsoft’s tool shifts Splunk rules into Redmond’s Sentinel SIEM but can’t handle others. “Rule conversion can be performed manually by security experts, which are slow and imposes a heavy workload,” the paper observes. Tools like the Sigma framework aim to help manage and share rules across multiple platforms, but Ming and her co-authors think it, and other existing translation tools, don’t do well with complex or interlinked rules. It’s 2026 so it seems natural to try using an LLM to convert SIEM rules into different formats. The authors say that approach “typically yield a poor accuracy and lacks vendor-specific correctness” because training data used to build LLMs doesn’t include enough data about SIEM rule schemas. “These shortcomings call for a scalable, vendor-neutral, and reliable SIEM-rule conversion framework that retains existing rule value and eases SOC workloads,” the paper states, before explaining how ARuleCon gets the job done with an "agentic RAG [retrieval augmented generation] pipeline that retrieves authoritative official vendor documentation to address the convention/schema mismatches, and Python-based consistency check that running both source and target rules in controlled test environments to mitigate subtle semantic drifts." Long story short, the researchers developed agentic tech capable of translating SIEM rules created using Splunk, Microsoft Sentinel, IBM QRadar, Google Chronicle and RSA NetWitness. Not all the conversions are brilliant, but ARuleCon can translate the proprietary rule format each SIEM vendor uses to multiple rival platforms – and does it more accurately than a generic LLM. ARuleCon therefore makes it possible to export rules from one SIEM and use them in another. Ming told The Register she hopes the tool helps organizations to consider and plan SIEM consolidations or migrations, and emerge with SOCs that can more easily detect the signals of security threats and stop worrying about noise from multiple alerts. ®
Kategorie: Viry a Červi
Syndikovat obsah