OpenWrt 25.12.0 ships with new package manager, built-in upgrade tool, support for 2200+ devices

OpenWrt 25.12.0 is now available for download. The release incorporates over 4,700 commits since branching from OpenWrt 24.10. Package manager changes One of the most significant structural changes in 25.12.0 is the replacement of the opkg package mana… Continue reading OpenWrt 25.12.0 ships with new package manager, built-in upgrade tool, support for 2200+ devices

More AI tools, more burnout! New research explains why

Workflows built around multiple AI agents and constant tool switching are adding cognitive strain across large enterprises. A recent Harvard Business Review analysis describes this pattern as “AI brain fry,” a form of mental fatigue tied to intensive u… Continue reading More AI tools, more burnout! New research explains why

Open-source tool Sage puts a security layer between AI agents and the OS

Autonomous AI agents running on developer workstations execute shell commands, fetch URLs, and write files with little or no inspection of what they are doing. Open-source project Sage inserts an interception layer between an AI agent and those operati… Continue reading Open-source tool Sage puts a security layer between AI agents and the OS

Product Showcase: Fing Desktop puts network visibility on your screen

Phones, laptops, smart TVs, cameras, and smart home equipment all use the same network. Knowing what’s connected helps users manage performance and security. Fing Desktop provides tools that identify devices, test connectivity, and analyze network acti… Continue reading Product Showcase: Fing Desktop puts network visibility on your screen

Submarine cables move to the center of critical infrastructure security debate

The cables running along the ocean floor carry the overwhelming majority of the world’s cross-border data traffic, and for most of their operational history they have attracted little strategic attention. That is changing. A new sector report fro… Continue reading Submarine cables move to the center of critical infrastructure security debate

New cyber module strengthens risk planning for health organizations

The Administration for Strategic Preparedness and Response’s (ASPR) new cybersecurity module in the Risk Identification and Site Criticality (RISC) 2.0 Toolkit helps organizations identify critical gaps, prioritize investments, and make informed decisi… Continue reading New cyber module strengthens risk planning for health organizations

Cursor Automations turns code review and ops into background tasks

Cursor Automations, the always-on agent platform from Cursor, is expanding with a new generation of autonomous systems that streamline code review, incident response, and other engineering workflows. The platform runs AI agents on schedules or in respo… Continue reading Cursor Automations turns code review and ops into background tasks

What happens when AI teams compete against human hackers

A cybersecurity competition produced what may be the largest controlled dataset comparing AI-augmented teams to human-only teams on professional-grade offensive security tasks. The event, called NeuroGrid, ran for 72 hours on the Hack The Box platform … Continue reading What happens when AI teams compete against human hackers