AI servers are rewriting the power rulebook The root cause, Panasonic noted in the statement, is the electrical behavior of AI workloads. Unlike conventional server applications, AI inference and training draw large amounts of electricity in short bursts to sustain GPU processing, causing peak power levels to spike rapidly and voltages to fluctuate. “Peak power levels for such servers can rise rapidly, and voltages can often become unstable,” the statement said. “Securing stable, highly reliable power supplies is an absolute necessity for AI data centers.” Vertiv warned in its 2025 Data Center Trends predictions that AI racks must handle loads…
Author: admin
Cisco on Wednesday announced patches for a dozen high- and medium-severity vulnerabilities in IOS and IOS XE, most of which could be exploited to cause denial-of-service (DoS) conditions. The patches were rolled out as part of Cisco’s semiannual IOS and IOS XE security advisory bundle. While none of the bugs appear to have been exploited in the wild, technical information on four of them has been published. The publicly disclosed issues, tracked as CVE-2026-20110, CVE-2026-20112, CVE-2026-20113, and CVE-2026-20114, are medium-severity defects affecting Cisco Catalyst 9300 Series switches. According to OPSWAT, which discovered and reported the security defects, attackers could chain…
Automated traffic grew 23.5% year over year in 2025 — about eight times faster than human traffic, which rose 3.1%, according to HUMAN Security’s State of AI Traffic report. AI-driven traffic appears to be a major contributor to that growth, with average monthly volume increasing 187% year over year, while traffic from AI agents and agentic browsers (e.g., OpenAI’s Atlas, Perplexity’s Comet) grew nearly 8,000% year over year. Automated traffic is defined in the report as: “All internet traffic generated by software systems rather than human users, including traditional automation such as search engine crawlers, monitoring bots, and conventional scraping…
The Big Spring Sale is in full swing, and if you were hoping to take advantage of one of Amazon’s many smartwatch deals, there’s one discount that deserves some extra attention. The Galaxy Watch 8 Classic, a versatile wearable with a rotating bezel and loads of Samsung smarts, just scored a rare 26% discount as part of the sale, knocking the price down to $369.99. That’s only $20 more than the base model Galaxy Watch 8!One of our favorite Android smartwatches scores a rare discount during the Big Spring Sale✅Recommended if: you want a stylish, timeless-looking smartwatch that doesn’t skimp on premium…
Ravie LakshmananMar 26, 2026Browser Security / Vulnerability Cybersecurity researchers have disclosed a vulnerability in Anthropic’s Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page. The flaw “allowed any website to silently inject prompts into that assistant as if the user wrote them,” Koi Security researcher Oren Yomtov said in a report shared with The Hacker News. “No clicks, no permission prompts. Just visit a page, and an attacker completely controls your browser.” The issue, codenamed ShadowPrompt, chains two underlying flaws: An overly permissive origin allowlist in the extension that allowed…
Most SEO failures aren’t caused by bad SEOs. They’re caused by organizations that don’t have the systems to support them. That’s the argument Ash Nallawalla has been building across five books and over 24 years of enterprise SEO experience in Australia. As a visibility governance consultant based in Melbourne, Ash has worked in-house for some of Australia’s biggest brands, and seen firsthand what happens when no one above the SEO team understands what they do or why it matters. On IMHO, I spoke with Ash about why he believes visibility needs to be governed at board level, how his maturity…
OpenAI’s public Safety Bug Bounty program focuses on AI abuse and safety risks across its products. The goal is to support safe and secure systems and reduce the risk of misuse that could lead to harm. This program complements the Security Bug Bounty. It accepts reports of abuse and safety risks that do not meet the criteria for a security vulnerability. Submissions are reviewed by teams from both programs based on scope and ownership. Safety Bug Bounty program overview The program focuses on AI-specific scenarios such as agentic risks, including MCP, exposure of OpenAI proprietary information, and risks to account…
It’s not uncommon to explore different ways to store your data. While the cloud is a frequent go-to option because it’s just so convenient, a lot of folks have been looking for alternate solutions with similar functionality in order to save money in the long run. Naturally, you can go with a connected storage solution, or something more fleshed out like a NAS. As you might suspect, we like the latter option more, since it provides a lot more longevity when it comes to the life of the product. TerraMaster is a solid choice Credit: TERRAMASTER Now, we know there are…
“While the scale-up domain today is largely serviced by passive copper, data rates and rack densities are necessitating a shift to alternatives,” Naji wrote. “While many of the optical providers like Marvell (following its acquisition of Celestial AI), Broadcom, and Nvidia believe that co-packaged optic is the right solution, others point to pluggable copper, microLEDs, linear optics, and near-packaged optics as potentially better alternatives for scaling up (for their power efficiency, flexibility, and cost). We expect that as connections slowly shift away from copper over the five years, there will be a broad mix of these solutions that succeed, depending…
The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents. The security issue received a critical score of 9.3 out of 10 and can be leveraged for remote code execution, allowing threat actors to build public flows without authentication. The agency added the issue to the list of Known Exploited Vulnerabilities, describing it as a code injection vulnerability. Researchers at application security company Endor Labs claim that hackers started exploiting CVE-2026-33017 on March 19, about 20 hours after the vulnerability advisory became public. No public proof-of-concept (PoC)…
