Normal view

Received today — 14 February 2026

From young men looking for no-strings sex to the 92-year-old who lied about his age: older women on the truth about dating in later life

14 February 2026 at 07:00

Five women on both sides of the Atlantic reveal what it’s like trying to find a partner in your 60s, 70s, 80s and 90s

Stella Ralfini, 78-year-old beauty writer, London (pictured above)

Continue reading...

© Photograph: Christian Sinibaldi/The Guardian

© Photograph: Christian Sinibaldi/The Guardian

© Photograph: Christian Sinibaldi/The Guardian

Pension annuity sales hit record as average pot exceeds £80,000

14 February 2026 at 02:00

Rachel Reeves’s inheritance tax changes encourage more people to invest in previously unloved product

The government’s “inheritance tax raid” on pensions has helped drive sales of retirement annuities to new highs.

Industry data this week revealed they enjoyed a “record-breaking” 2025, with sales growing by 4% to £7.4bn and the average amount invested in an annuity surpassing £80,000 for the first time.

Continue reading...

© Photograph: Alamy/PA

© Photograph: Alamy/PA

© Photograph: Alamy/PA

Received yesterday — 13 February 2026

Survey: Most Security Incidents Involve Identity Attacks

13 February 2026 at 15:55

A survey of 512 cybersecurity professionals finds 76% report that over half (54%) of the security incidents that occurred in the past 12 months involved some issue relating to identity management. Conducted by Permiso Security, a provider of an identity security platform, the survey also finds 95% are either very confident (52%) or somewhat confident..

The post Survey: Most Security Incidents Involve Identity Attacks appeared first on Security Boulevard.

Why is Bezos trolling Musk on X with turtle pics? Because he has a new Moon plan.

13 February 2026 at 10:19

The founder of Amazon, Jeff Bezos, does not often post on the social media site owned by his rival Elon Musk. But on Monday, Bezos did, sharing a black-and-white image of a turtle emerging from the shadows on X.

The photo, which included no text, may have stumped some observers. Yet for anyone familiar with Bezos' privately owned space company, Blue Origin, the message was clear. The company’s coat of arms prominently features two turtles, a reference to one of Aesop’s Fables, "The Tortoise and the Hare," in which the slow and steady tortoise wins the race over a quicker but overconfident hare.

Bezos' foray into social media turtle trolling came about 12 hours after Musk made major waves in the space community by announcing that SpaceX was pivoting toward the Moon, rather than Mars, as a near-term destination. It represented a huge shift in Musk's thinking, as the SpaceX founder has long spoken of building a multi-planetary civilization on Mars.

Read full article

Comments

© Jeff Bezos/X

‘His favourite book was by Jordan Peterson, which was a massive ick’: how books perform on dating apps

13 February 2026 at 13:08

Mentions of reading in Tinder bios are up 29% in the last year. But is searching for a fellow fan of one’s favourite author really a shortcut to compatibility?

‘One of my Hinge prompts is: ‘What’s the best book you read this year?’ and I swipe left on anyone who says a book I don’t like,” says 29-year-old Ayo*. “Someone once replied with a book by Jordan Peterson, which was a massive ick.”

It’s a blunt approach to romance, but Ayo is far from alone. Books have long functioned as cultural shorthand for personality – signals of taste and worldview – but dating apps have accelerated and intensified that process. In an attention economy that rewards speed, these signifiers have to be legible at a glance.

Continue reading...

© Photograph: Blend Images/Alamy

© Photograph: Blend Images/Alamy

© Photograph: Blend Images/Alamy

Charli xcx: Wuthering Heights review – atonal, amorous anthems that more than stand apart from the film

13 February 2026 at 09:45

(Atlantic)
Casting off her Bratty cigarettes and sunglasses, the pop visionary channels the torments of Heathcliff and Cathy and the tumult of the Velvet Underground on her latest captivating pivot

In the catalogues of rock and pop artists, film soundtracks usually seem like interstitial releases. For every career highlight Shaft or Superfly, there’s a plethora of soundtrack albums that carry the tang of the side-hustle. It was doubtless flattering to be asked in the first place – who doesn’t want to feel like a polymath? – but the results are doomed to languish in the footnotes, alongside the compilations of B-sides and outtakes, where only diehard fans spend extended amounts of time.

But the release of House, the first single taken from Charli xcx’s soundtrack to Wuthering Heights, strongly suggested that its author saw Emerald Fennell’s take on Emily Brontë as a chance for a reset. In 2024’s Brat, she made an album you could genuinely call era-defining without fear of embarrassment: if an album makes an impact on the US presidential campaign and its title ends up refashioned as an adjective in the Collins English Dictionary, then it’s definitely era-defining.

Continue reading...

© Photograph: Paul Kooiker

© Photograph: Paul Kooiker

© Photograph: Paul Kooiker

Canada school deaths suspect created shooting simulator on gaming platform

13 February 2026 at 09:43

Roblox says it has removed account after massacre that left nine people including the shooter dead

The 18-year-old suspect in a high school shooting in British Columbia had previously created a mass shooting simulator on the gaming platform Roblox, it has been revealed.

The simulator, set in what appeared to be a virtual shopping mall, allowed users – represented as Roblox-style avatars – to pick up weapons and shoot other players, 404 Media reported on Thursday.

This article was amended on 14 February 2026. An earlier version said there was more than one attacker in the Christchurch attack and incorrectly named the platform the attacker streamed on as Twitch.

Continue reading...

© Photograph: Jennifer Gauthier/Reuters

© Photograph: Jennifer Gauthier/Reuters

© Photograph: Jennifer Gauthier/Reuters

The future for Tyr

13 February 2026 at 10:49

The team behind Tyr started 2025 with little to show in our quest to produce a Rust GPU driver for Arm Mali hardware, and by the end of the year, we were able to play SuperTuxKart (a 3D open-source racing game) at the Linux Plumbers Conference (LPC). Our prototype was a joint effort between Arm, Collabora, and Google; it ran well for the duration of the event, and the performance was more than adequate for players. Thankfully, we picked up steam at precisely the right moment: Dave Airlie just announced in the Maintainers Summit that the DRM subsystem is only “about a year away” from disallowing new drivers written in C and requiring the use of Rust. Now it is time to lay out a possible roadmap for 2026 in order to upstream all of this work.

↫ Daniel Almeida at LWN.net

A very detailed look at what the team behind Tyr is trying to achieve with their Rust GPU driver for Arm Mali chips.

The Law of Cyberwar is Pretty Discombobulated

13 February 2026 at 05:24
cyberwar, cyber, SLA, cyberattack, retailers, Ai, applications, sysdig, attack, cisco, AI, AI-powered, attacks, attackers, security, BreachRx, Cisco, Nexus, security, challenges, attacks, cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks

This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts.

The post The Law of Cyberwar is Pretty Discombobulated appeared first on Security Boulevard.

The tunnel runway at the Super Bowl – and the rise of the ‘unicorn bag’

13 February 2026 at 02:00

On game day, where fashion has become a huge part of athlete identity, professionals are reaching for codified displays of their wealth

Don’t get Fashion Statement delivered to your inbox? Sign up here

On Sunday night the Seattle Seahawks beat the New England Patriots in Super Bowl LX, Bad Bunny put on a spectacular half-time show, and multiple players all walked down the tunnel from the car park to the dressing rooms carrying the same logo’d bag. The bag in question, by luxury French brand Goyard, isn’t part of any official uniform – and isn’t really known outside of its 0.1% customer base. But it has become as ubiquitous a status symbol among American football players as their AirPods Max headphones and Richard Mille watches – and is part of a brave new world of tunnel fits.

Most primetime NFL games’ coverage start hours before kick-off, as photographers, fans and pundits alike pore over players’ sartorial choices just as they would their missed tackles and spectacular catches.

Continue reading...

© Photograph: Kathryn Riley/Getty Images

© Photograph: Kathryn Riley/Getty Images

© Photograph: Kathryn Riley/Getty Images

Received before yesterday

Elon Musk posted about race almost every day in January

12 February 2026 at 09:24

Many social media posts by Tesla CEO on his platform are indiscernible from those of white supremacists, say experts

Elon Musk’s longtime fixation on a white racial majority is intensifying. The richest man in the world posted about how the white race was under threat, made allusions to race science or promoted anti-immigrant conspiracy content on 26 out of 31 days in January, according to the Guardian’s analysis of his social media output. The posts, made on his platform X, reflect a renewed embrace of what extremism experts describe as white supremacist material.

“Whites are a rapidly dying minority,” Musk said on 22 January, a short time before taking the stage at the World Economic Forum in Davos, while reposting an Irish anti-immigrant influencer’s video about demographic change.

Continue reading...

© Photograph: Fabrice Coffrini/AFP/Getty Images

© Photograph: Fabrice Coffrini/AFP/Getty Images

© Photograph: Fabrice Coffrini/AFP/Getty Images

SpaceX takes down Dragon crew arm, giving Starship a leg up in Florida

11 February 2026 at 21:23

Launch Complex 39A at NASA's Kennedy Space Center in Florida is accustomed to getting makeovers. It got another one Wednesday with the removal of the Crew Access Arm used by astronauts to board their rides to space.

Construction workers first carved the footprint for the launch pad from the Florida wetlands more than 60 years ago. NASA used the site to launch Saturn V rockets dispatching astronauts to the Moon, then converted the pad for the Space Shuttle program. The last shuttle flight lifted off from Pad 39A in 2011, and the agency leased the site to SpaceX for use as the departure point for the company's Falcon 9 and Falcon Heavy rockets.

SpaceX started launching from Pad 39A in 2017, then installed a new Crew Access Arm on the pad's tower the following year, replacing the aging shuttle-era arm that connected to the hatches of NASA's orbiters. SpaceX added the new arm ahead of the first test flight of the company's human-rated Crew Dragon spacecraft in 2019. Astronauts started using the pathway, suspended more than 200 feet above the pad surface, beginning with the first crew flight on a Dragon spacecraft in 2020.

Read full article

Comments

© SpaceX

Survey: Widespread Adoption of AI Hasn’t Yet Reduced Cybersecurity Burnout

11 February 2026 at 15:41

A global survey of 1,813 IT and cybersecurity professionals finds that despite the rise of artificial intelligence (AI) and automation, cybersecurity teams still spend on average 44% of their time on manual or repetitive work. Conducted by Sapio Research on behalf of Tines, a provider of an automation platform, the survey also notes that as..

The post Survey: Widespread Adoption of AI Hasn’t Yet Reduced Cybersecurity Burnout appeared first on Security Boulevard.

Is Linux Mint Burning Out? Developers Consider Longer Release Cycle

11 February 2026 at 17:45
BrianFagioli writes: The Linux Mint developers say they are considering adopting a longer development cycle, arguing that the project's current six month cadence plus LMDE releases leaves too little room for deeper work. In a recent update, the team reflected on its incremental philosophy, independence from upstream decisions like Snap, and heavy investment in Cinnamon and XApp. While the release process "works very well" and delivers steady improvements, they admit it consumes significant time in testing, fixing, and shipping, potentially capping ambition. Mint's next release will be based on a new Ubuntu LTS, and the team says it is seriously interested in stretching the development window. The stated goal is to free up resources for more substantial development rather than constant release management. Whether this signals bigger technical changes or simply acknowledges bandwidth limits for a small team remains unclear, but it marks a notable rethink of one of desktop Linux's most consistent release rhythms.

Read more of this story at Slashdot.

Once-hobbled Lumma Stealer is back with lures that are hard to resist

11 February 2026 at 17:11

Last May, law enforcement authorities around the world scored a key win when they hobbled the infrastructure of Lumma, an infostealer that infected nearly 395,000 Windows computers over just a two-month span leading up to the international operation. Researchers said Wednesday that Lumma is once again “back at scale” in hard-to-detect attacks that pilfer credentials and sensitive files.

Lumma, also known as Lumma Stealer, first appeared in Russian-speaking cybercrime forums in 2022. Its cloud-based malware-as-a-service model provided a sprawling infrastructure of domains for hosting lure sites offering free cracked software, games, and pirated movies, as well as command-and-control channels and everything else a threat actor needed to run their infostealing enterprise. Within a year, Lumma was selling for as much as $2,500 for premium versions. By the spring of 2024, the FBI counted more than 21,000 listings on crime forums. Last year, Microsoft said Lumma had become the “go-to tool” for multiple crime groups, including Scattered Spider, one of the most prolific groups.

Takedowns are hard

The FBI and an international coalition of its counterparts took action early last year. In May, they said they seized 2,300 domains, command-and-control infrastructure, and crime marketplaces that had enabled the infostealer to thrive. Recently, however, the malware has made a comeback, allowing it to infect a significant number of machines again.

Read full article

Comments

© Getty Images

US decides SpaceX is like an airline, exempting it from Labor Relations Act

11 February 2026 at 15:05

The National Labor Relations Board abandoned a Biden-era complaint against SpaceX after a finding that the agency does not have jurisdiction over Elon Musk's space company. The US labor board said SpaceX should instead be regulated under the Railway Labor Act, which governs labor relations at railroad and airline companies.

The Railway Labor Act is enforced by a separate agency, the National Mediation Board, and has different rules than the National Labor Relations Act enforced by the NLRB. For example, the Railway Labor Act has an extensive dispute-resolution process that makes it difficult for railroad and airline employees to strike. Employers regulated under the Railway Labor Act are exempt from the National Labor Relations Act.

In January 2024, an NLRB regional director alleged in a complaint that SpaceX illegally fired eight employees who, in an open letter, criticized CEO Musk as a “frequent source of embarrassment." The complaint sought reinstatement of the employees, back pay, and letters of apology to the fired employees.

Read full article

Comments

© Getty Images | Kevin Dietsch

Mild, wild and Wuthering Heights-inspired: the sexiest toys and gifts for Valentine’s Day

11 February 2026 at 10:00

Our expert shares saucy gifts for every experience level and relationship status – from feather ticklers to Fairtrade massage bars

The best vibrators, tested

I won’t beat around the bush (although I will suggest some devices that can do that for you very efficiently): Valentine’s Day is coming up, so you may well be looking for some saucy gift suggestions for your other half.

As an award-winning expert who’s worked in the sexual wellbeing and pleasure sector for more than two decades, I’ve trialled thousands of vibrators and stimulators, lotions and potions, and a whole A-Z of BDSM bits and bobs. In fact, I have an entire loft room in my house dedicated to storing all my X-rated testers, samples and prototypes. I’m a trustworthy source when it comes to sauciness, so here are my top Valentine’s gift suggestions, whether mild or wild – all tried and tested. From a turmeric latte massage bar to a crotchless teddy, let’s get stuck in.

Continue reading...

© Composite: Guardian

© Composite: Guardian

© Composite: Guardian

SpaceX's next-gen Super Heavy booster aces four days of "cryoproof" testing

10 February 2026 at 18:35

The upgraded Super Heavy booster slated to launch SpaceX's next Starship flight has completed cryogenic proof testing, clearing a hurdle that resulted in the destruction of the company's previous booster.

SpaceX announced the milestone in a social media post Tuesday: "Cryoproof operations complete for the first time with a Super Heavy V3 booster. This multi-day campaign tested the booster's redesigned propellant systems and its structural strength."

Ground teams at Starbase, Texas, rolled the 237-foot-tall (72.3-meter) stainless-steel booster out of its factory and transported it a few miles away to Massey's Test Site last week. The test crew first performed a pressure test on the rocket at ambient temperatures, then loaded super-cold liquid nitrogen into the rocket four times over six days, putting the booster through repeated thermal and pressurization cycles. The nitrogen is a stand-in for the cryogenic methane and liquid oxygen that will fill the booster's propellant tanks on launch day.

Read full article

Comments

© SpaceX

Survey Sees Little Post-Quantum Computing Encryption Progress

10 February 2026 at 17:15

A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this point in time are preparing to adopt post-quantum cryptography. Conducted by the Ponemon Institute on behalf of Entrust, a provider of..

The post Survey Sees Little Post-Quantum Computing Encryption Progress appeared first on Security Boulevard.

“The original vi is a product of its time (and its time has passed)”

10 February 2026 at 18:28

For me, vim is a combination of genuine improvements in vi’s core editing behavior (cf), frustrating (to me) bits of trying too hard to be smart (which I mostly disable when I run across them), and an extension mechanism I ignore but people use to make vim into a superintelligent editor with things like LSP integrations.

Some of the improvements and additions to vi’s core editing may be things that Bill Joy either didn’t think of or didn’t think were important enough. However, I feel strongly that some or even many of omitted features and differences are a product of the limited environments vi had to operate in. The poster child for this is vi’s support of only a single level of undo, which drastically constrains the potential memory requirements (and implementation complexity) of undo, especially since a single editing operation in vi can make sweeping changes across a large file (consider a whole-file ‘:…s/../../’ substitution, for example).

↫ Chris Siebenmann

I have only very limited needs when it comes to command-line text editors, and as such, I absolutely swear by the simplicity of nano. In other words, I’m probably not the right person to dive into the editor debate that’s been raging for decades, but reading Siebenmann’s points I can’t help but agree. In this day and age, defaulting an editor that has only one level of undo is insanity, and I can’t imagine doing the kind of complex work people who use command-line editors do while being limited to just one window.

As for the debate about operating systems that symlink the vi command to vim or a similar improved variant of vi, I feel like that’s the wrong thing to do. Much like how I absolutely despise how macOS hides its UNIX-y file system structure from the GUI, leading to bizarre ls results in the terminal, I don’t think you should be tricking users. If a user enters vi, it should launch vi, and not something that kind of looks like vi but isn’t. Computers shouldn’t be lying to users.

If they don’t want their users to be using vi, they shouldn’t be installing vi in the first place.

Romeo Is a Dead Man review – a misfire from a storied gaming provocateur

10 February 2026 at 09:11

PlayStation 5 (version tested), Xbox, PC; Grasshopper Manufacture/Marvelous Inc
After some dumb fun hacking at zombies, legendary developer Suda51’s first original game in a decade sadly only delivers a host of incoherent disappointments

Ever since he baffled GameCube owners with 2005’s Killer7, Japanese game director Suda51 has had a reputation for turning heads. From parodying the banality of open-world games with 2007’s No More Heroes to collaborating with James Gunn for 2012’s pulpy Lollipop Chainsaw, his games often offer a welcome reprieve from soulless, half-a-billion-dollar-budget gaming blockbusters. It was with considerable excitement that I fired up Suda’s first new game in 10 years.

The game kicks off with a slick cartoon that shows our hero, Romeo Stargazer, being eaten by a zombie. Hastily resurrected by his zany scientist grandfather, Romeo returns from the brink imbued with new powers – and then we’re off. Almost immediately I am bombarded by an impenetrable wall of proper-noun nonsense. It’s like this for the next 20 hours.

Continue reading...

© Photograph: GRASSHOPPER MANUFACTURE INC.

© Photograph: GRASSHOPPER MANUFACTURE INC.

© Photograph: GRASSHOPPER MANUFACTURE INC.

Versa SASE Platform Now Prevents Sensitive Data From Being Shared With AI

10 February 2026 at 09:00

Versa has enhanced its SASE platform by integrating text analysis and optical character recognition (OCR) capabilities to better identify sensitive data and improve cybersecurity. The updates aim to provide deeper insights for teams dealing with AI-related data risks, reduce false positives, and enable effective incident response through AI-driven alert correlation.

The post Versa SASE Platform Now Prevents Sensitive Data From Being Shared With AI appeared first on Security Boulevard.

Linux 7.0 Kernel Confirmed By Linus Torvalds, Expected In Mid-April 2026

9 February 2026 at 17:45
An anonymous reader writes: Linus Torvalds has confirmed the next major kernel series as Linux 7.0, reports Linux news website 9to5Linux.com: "So there you have it, the Linux 6.x era has ended with today's Linux 6.19 kernel release, and a new one will begin with Linux 7.0, which is expected in mid-April 2026. The merge window for Linux 7.0 will open tomorrow, February 9th, and the first Release Candidate (RC) milestone is expected on February 22nd, 2026."

Read more of this story at Slashdot.

Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX

9 February 2026 at 14:18

Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, clunky security hardware and toward a seamless, browser-native defense. The acquisition, which did not include financial terms, integrates SquareX’s browser detection and response technology into Zscaler’s Zero Trust Exchange platform. Unlike traditional..

The post Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX appeared first on Security Boulevard.

AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation

9 February 2026 at 12:22
CISOs Pump Up Political Prowess

The cybersecurity landscape is undergoing a fundamental shift as chief information security officers (CISOs) shift their 2026 budgets to artificial intelligence (AI) and realign traditional defense strategies. Nearly 80% of senior security executives are prioritizing AI-driven solutions to counter increasingly sophisticated threats, a new report from Glilot Capital Partners reveals. The survey, which polled leaders..

The post AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation appeared first on Security Boulevard.

Why would Elon Musk pivot from Mars to the Moon all of a sudden?

9 February 2026 at 09:38

As more than 120 million people tuned in to the Super Bowl for kickoff on Sunday evening, SpaceX founder Elon Musk turned instead to his social network. There, he tapped out an extended message in which he revealed that SpaceX is pivoting from the settlement of Mars to building a "self-growing" city on the Moon.

"For those unaware, SpaceX has already shifted focus to building a self-growing city on the Moon, as we can potentially achieve that in less than 10 years, whereas Mars would take 20+ years," Musk wrote, in part.

Elon Musk tweet at 6:24 pm ET on Sunday. Credit: X/Elon Musk

This is simultaneously a jolting and practical decision coming from Musk.

Read full article

Comments

© Mark Felix/Bloomberg via Getty Images

Adventures in Guix packaging

8 February 2026 at 16:24

We talked about Nemin’s first impressions of the Guix System as someone coming from a Nix environment, but today they’ve got a follow-up article diving into the experience of creating new packages for Guix.

I spent about a week packaging WezTerm and learning the ropes of being a Guix contributor along the way.

During the packaging process I stumble many times, only to stand back up and figure out a solution. I also explain some of my complaints about the peculiarities of the process, but also provide plenty of praise about of how much the system tries to enable you to do your job. Finally, I also touch on how positive the experience of the code review was.

↫ Nemin’s blog

These are the kinds of content a rather niche system like Guix needs. Guix isn’t exactly one of the popular picks out there, so having level-headed, honest, but well-written introductions to its core concepts and user experience, written by a third party is going to do wonders for people interested in trying it out.

I spent years meeting strangers for masochistic hook-ups. Was I a sex addict?

8 February 2026 at 07:00

After a sexually frustrating marriage led to divorce, I chased increasingly extreme BDSM encounters. But I never felt truly satisfied. Had I been looking for the wrong thing all along?

To everyone else, it probably looked like a regular summer’s evening. Couples and families enjoying the beer garden, people playing cricket on the green – and I was being handcuffed in the passenger seat of a 4x4 by a man I barely knew.

My name is Leesa, and I’m a recovered sex addict.

Continue reading...

© Photograph: Amit Lennon/The Guardian

© Photograph: Amit Lennon/The Guardian

© Photograph: Amit Lennon/The Guardian

NASA stage show explores "outer" outer space with Henson's Fraggles

6 February 2026 at 09:55

Move over Snoopy, because NASA has a new character helping to promote its deep space exploration plans. His name is Uncle Traveling Matt.

No really, move over.

Fraggle Rock: A Space-y Adventure has taken over the same theater the Kennedy Space Center Visitor Complex in Florida previously used for All Systems Are Go, featuring the comic strip beagle. The new stage show stars the Jim Henson Company's subterranean Muppets as they discover outer (outer) space for the first time.

Read full article

Comments

© Kennedy Space Center Visitor Complex

Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing

6 February 2026 at 11:27
SlashNext vm2 sandbox bucket travel

Microsoft has released LiteBox, an experimental open-source library OS designed to sandbox applications while reducing their exposure to host systems. Written in Rust and published under the MIT license, LiteBox reflects the company’s efforts to upgrade software security as confidential computing gains adoption. LiteBox takes a different path from traditional virtualization or container technologies. Rather..

The post Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing appeared first on Security Boulevard.

Fraud Prevention Is a Latency Game

6 February 2026 at 10:44

There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review it and decide if it’s legitimate before the payment clears or if the account could be compromised. That window happens in a blink, often one-tenth of a second or less. During that time, models must..

The post Fraud Prevention Is a Latency Game appeared first on Security Boulevard.

Rocket Report: SpaceX probes upper stage malfunction; Starship testing resumes

6 February 2026 at 07:00

Welcome to Edition 8.28 of the Rocket Report! The big news in rocketry this week was that NASA still hasn't solved the problem with hydrogen leaks on the Space Launch System. The problem caused months of delays before the first SLS launch in 2022, and the fuel leaks cropped up again Monday during a fueling test on NASA's second SLS rocket. It is a continuing problem, and NASA's sparse SLS launch rate makes every countdown an experiment, as my colleague Eric Berger wrote this week. NASA will conduct another fueling test in the coming weeks after troubleshooting the rocket's leaky fueling line, but the launch of the Artemis II mission is off until March.

As always, we welcome reader submissions. If you don't want to miss an issue, please subscribe using the box below (the form will not appear on AMP-enabled versions of the site). Each report will include information on small-, medium-, and heavy-lift rockets, as well as a quick look ahead at the next three launches on the calendar.

Blue Origin "pauses" New Shepard flights. Blue Origin has "paused" its New Shepard program for the next two years, a move that likely signals a permanent end to the suborbital space tourism initiative, Ars reports. The small rocket and capsule have been flying since April 2015 and have combined to make 38 launches, all but one of which were successful, and 36 landings. In its existence, the New Shepard program flew 98 people to space, however briefly, and launched more than 200 scientific and research payloads into the microgravity environment.

Read full article

Comments

© SpaceX

The Other Offense and Defense

6 February 2026 at 02:00
super bowl, offense, defense,

Alan discovers how the Super Bowl acts as a live-fire exercise in cybersecurity, requiring seamless coordination to manage massive attack surfaces and ensure integrity and trust in real time.

The post The Other Offense and Defense appeared first on Security Boulevard.

OpenAI Launches Trusted Access for Cyber to Expand AI-Driven Defense While Managing Risk

Trusted Access for Cyber

OpenAI has announced a new initiative aimed at strengthening digital defenses while managing the risks that come with capable artificial intelligence systems. The effort, called Trusted Access for Cyber, is part of a broader strategy to enhance baseline protection for all users while selectively expanding access to advanced cybersecurity capabilities for vetted defenders.   The initiative centers on the use of frontier models such as GPT-5.3-Codex, which OpenAI identifies as its most cyber-capable reasoning model to date, and tools available through ChatGPT. 

What is Trusted Access for Cyber? 

Over the past several years, AI systems have evolved rapidly. Models that once assisted with simple tasks like auto-completing short sections of code can now operate autonomously for extended periods, sometimes hours or even days, to complete complex objectives.   In cybersecurity, this shift is especially important. According to OpenAI, advanced reasoning models can accelerate vulnerability discovery, support faster remediation, and improve resilience against targeted attacks. At the same time, these same capabilities could introduce serious risks if misused.  Trusted Access for Cyber is intended to unlock the defensive potential of models like GPT-5.3-Codex while reducing the likelihood of abuse. As part of this effort, OpenAI is also committing $10 million in API credits to support defensive cybersecurity work.

Expanding Frontier AI Access for Cyber Defense 

OpenAI argues that the rapid adoption of frontier cyber capabilities is critical to making software more secure and raising the bar for security best practices. Highly capable models accessed through ChatGPT can help organizations of all sizes strengthen their security posture, shorten incident response times, and better detect cyber threats. For security professionals, these tools can enhance analysis and improve defenses against severe and highly targeted attacks.  The company notes that many cyber-capable models will soon be broadly available from a range of providers, including open-weight models. Against that backdrop, OpenAI believes it is essential that its own models strengthen defensive capabilities from the outset. This belief has shaped the decision to pilot Trusted Access for Cyber, which prioritizes placing OpenAI’s most capable models in the hands of defenders first.  A long-standing challenge in cybersecurity is the ambiguity between legitimate and malicious actions. Requests such as “find vulnerabilities in my code” can support responsible patching and coordinated disclosure, but they can also be used to identify weaknesses for exploitation. Because of this overlap, restrictions designed to prevent harm have often slowed down good-faith research. OpenAI says the trust-based approach is meant to reduce that friction while still preventing misuse.

How Trusted Access for Cyber Works 

Frontier models like GPT-5.3-Codex are trained with protection methods that cause them to refuse clearly malicious requests, such as attempts to steal credentials. In addition to this safety training, OpenAI uses automated, classifier-based monitoring to detect potential signals of suspicious cyber activity. During this calibration phase, developers and security professionals using ChatGPT for cybersecurity tasks may still encounter limitations.  Trusted Access for Cyber introduces additional pathways for legitimate users. Individual users can verify their identity through a dedicated cyber access portal. Enterprises can request trusted access for entire teams through their OpenAI representatives. Security researchers and teams that require even more permissive or cyber-capable models to accelerate defensive work can apply to an invite-only program. All users granted trusted access must continue to follow OpenAI’s usage policies and terms of use.  The framework is designed to prevent prohibited activities, including data exfiltration, malware creation or deployment, and destructive or unauthorized testing, while minimizing unnecessary barriers for defenders. OpenAI expects both its mitigation strategies and Trusted Access for Cyber itself to evolve as it gathers feedback from early participants. 

Scaling the Cybersecurity Grant Program 

To further support defensive use cases, OpenAI is expanding its Cybersecurity Grant Program with a $10 million commitment in API credits. The program is aimed at teams with a proven track record of identifying and remediating vulnerabilities in open source software and critical infrastructure systems.   By pairing financial support with controlled access to advanced models like GPT-5.3-Codex through ChatGPT, OpenAI seeks to accelerate legitimate cybersecurity research without broadly exposing powerful tools to misuse. 

AI companies want you to stop chatting with bots and start managing them

5 February 2026 at 17:47

On Thursday, Anthropic and OpenAI shipped products built around the same idea: instead of chatting with a single AI assistant, users should be managing teams of AI agents that divide up work and run in parallel. The simultaneous releases are part of a gradual shift across the industry, from AI as a conversation partner to AI as a delegated workforce, and they arrive during a week when that very concept reportedly helped wipe $285 billion off software stocks.

Whether that supervisory model works in practice remains an open question. Current AI agents still require heavy human intervention to catch errors, and no independent evaluation has confirmed that these multi-agent tools reliably outperform a single developer working alone.

Even so, the companies are going all-in on agents. Anthropic's contribution is Claude Opus 4.6, a new version of its most capable AI model, paired with a feature called "agent teams" in Claude Code. Agent teams let developers spin up multiple AI agents that split a task into independent pieces, coordinate autonomously, and run concurrently.

Read full article

Comments

© demaerre via Getty Images

With GPT-5.3-Codex, OpenAI pitches Codex for more than just writing code

5 February 2026 at 16:47

Today, OpenAI announced GPT-5.3-Codex, a new version of its frontier coding model that will be available via the command line, IDE extension, web interface, and the new macOS desktop app. (No API access yet, but it's coming.)

GPT-5.3-Codex outperforms GPT-5.2-Codex and GPT-5.2 in SWE-Bench Pro, Terminal-Bench 2.0, and other benchmarks, according to the company's testing.

There are already a few headlines out there saying "Codex built itself," but let's reality-check that, as that's an overstatement. The domains OpenAI described using it for here are similar to the ones you see in some other enterprise software development firms now: managing deployments, debugging, and handling test results and evaluations. There is no claim here that GPT-5.3-Codex built itself.

Read full article

Comments

© OpenAI

Orchid Security Adds Ability to Audit Behaviors by Identity

5 February 2026 at 11:30

Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data captured from unmanaged applications with audit logs data collected from third-party identity and access management..

The post Orchid Security Adds Ability to Audit Behaviors by Identity appeared first on Security Boulevard.

Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI

5 February 2026 at 09:00

As the enterprise world shifts from chatbots to autonomous systems, Operant AI on Thursday launched Agent Protector, a real-time security solution designed to govern and shield artificial intelligence (AI) agents. The launch comes at a critical inflection point for corporate technology. Gartner predicts that by the end of 2026, 40% of enterprise applications will feature..

The post Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI appeared first on Security Boulevard.

❌