Google CloudAnnouncing the MCP Toolbox Java SDK
Announcing the MCP Toolbox Java SDK for Java/Spring Boot that delivers type-safe, stateful multi-agent orchestration with declarative tool mappings to databases and zero-config security for enterprise AI workloads.
Google CloudCoruna: The Mysterious Journey of a Powerful iOS Exploit Kit
A concise, high-signal technical overview of Coruna, a powerful iOS exploit kit with five exploit chains and 23 exploits, its observed use across targeted and broad campaigns, and the defensive implications for iOS security, patching, lockdown mode, and threat intelligence.
Supporting additional payment methods for agentic commerce
A technical description of expanding agentic payments via Shared Payment Tokens (SPTs) and agentic network tokens, enabling BNPL options (Affirm, Klarna) and Mastercard/Visa integration through Stripe to let AI agents initiate customer-approved payments across multiple sellers.
CloudflareSee risk, fix risk: introducing Remediation in Cloudflare CASB
Remediation in Cloudflare CASB enables one-click fixes for risky file sharing directly from the Cloudflare One dashboard, moving from detection to action across Microsoft 365 and Google Workspace with auditable, serverless workflows that remove risky sharing without deleting files.
CloudflareFrom reactive to proactive: closing the phishing gap with LLMs
LLM-enabled threat mapping shifts phishing defense from reactive detection to proactive prevention by identifying invisible gaps (exemplified by Sales Outreach) and accelerating targeted model development at scale.
CloudflareHow Cloudy translates complex security into human action
Cloudy translates complex security telemetry across Cloudflare Email Security and CASB into real-time, human-readable guidance embedded in Phishnet and workflow, turning detections into actionable insights for end users and SOCs while reducing noise.
CloudflareEvolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less
Cloudflare's Threat Intelligence Platform evolves into an ETL-free, edge-first solution that combines a sharded SQLite-backed architecture with edge GraphQL to deliver real-time threat visualization, automated defense, and a unified intelligence workflow.
CloudflareIntroducing the 2026 Cloudflare Threat Report
An in-depth look at the 2026 Cloudflare Threat Report, explaining how attackers optimize throughput via Measures of Effectiveness (MOE), AI-driven methods, living-off-the-land cloud tooling, PhaaS, and cloud-based abuse, and how autonomous defense can drive MOE to zero.
Apple MLOn the Impossibility of Separating Intelligence from Judgment: The Computational Intractability of Filtering for AI Alignment
Explores the inseparability of intelligence and judgment in AI alignment, proving the computational intractability of effective input and output filtering under cryptographic hardness assumptions and outlining practical mitigation and data-filtering implications.
Dear Duolingo: Why do some languages have gender?
A concise technical overview of grammatical gender as an abstract noun-class system, tracing its evolution from Latin to Romance languages and its implications for grammar and language learning.
DatabricksTutorial: How to ship AI/BI Dashboard changes safely at scale with Databricks Asset Bundles
A practical guide to shipping AI/BI dashboards at scale with Databricks Asset Bundles, applying production-grade discipline—versioning, CI/CD, review, and environment-aware deployment to safely develop, test, deploy, and rollback dashboard changes.
Google CloudFrom network APIs to network AI agents — building the agentic future of connectivity with Nokia
Nokia's Network as Code (NaC) integrated with Google Cloud's Gemini-powered agentic AI stack transforms network APIs into autonomous, intent-driven AI agents that observe, reason about, and optimize 5G networks at the edge through zero-code orchestration.