Explore real-world engineering experiences from top tech companies.
Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
This article covers TA416, a China-aligned threat actor, resuming targeted campaigns against European government and diplomatic entities since mid-2025 using PlugX malware and OAuth-based phishing techniques.
Microsoft Defender Security Research Team details PHP-based web shells on Linux servers that use HTTP cookies as a stealthy command-and-control channel.
North Korean threat actors (UNC1069) compromised the Axios npm package via a targeted social engineering attack against its maintainer, Jason Saayman.
This article argues that third-party risk management (TPRM) has become a critical security challenge and a growth opportunity for MSPs and MSSPs.
A new variant of the SparkCat malware has been discovered on both the Apple App Store and Google Play Store, targeting cryptocurrency wallet recovery phrases via OCR.
Drift, a Solana-based decentralized exchange, lost $285 million in a sophisticated attack using durable nonces and social engineering, with evidence linking it to North Korean threat actors.
This is the second post in the Ranking Engineer Agent blog series exploring the autonomous AI capabilities accelerating Meta’s Ads Ranking innovation. The previous post introduced Ranking Engineer Agent’s ML exploration capability, which autonomously designs, executes, and analyzes ranking model experiments. This post covers how to optimize the low-level infrastructure that makes those models run [...] Read More... The post KernelEvolve: How Meta’s Ranking Engineer Agent Optimizes AI Infrastructure appeared first on Engineering at Meta.
This article covers a large-scale credential harvesting campaign exploiting CVE-2025-55182, a critical Next.js vulnerability, to compromise 766 hosts across multiple cloud providers.
This post explains how Dropbox improved storage efficiency in Magic Pocket, their immutable exabyte-scale blob store, after a fragmentation incident caused by a new service.
Google Cloud announces the release of Gemma 4, its most capable open model family built from Gemini 3 research under Apache 2.0 license.
Honeylove, a fashion-tech company, shares how they use Google BigQuery and Gemini to unify data, automate insights, and improve product quality and service efficiency.
Cisco has released patches for two critical vulnerabilities (CVSS 9.8) affecting the Integrated Management Controller (IMC) and Smart Software Manager On-Prem (SSM On-Prem).