I tested Gemini on Android Auto and now I can’t stop talking to it: 5 tasks it nails

I didn’t see much benefit for Google’s AI – until now. Here are my favorite ways to use the new Gemini integration in my car.

Latest news – ​Read More

Watch this video of how a job interviewer exposes a North Korean fake IT worker

An apparent North Korean worker was caught visibly stumped during a remote job interview when asked to insult the country’s leader.

Security News | TechCrunch – ​Read More

AI agents that automatically prevent, detect and fix software issues are here as NeuBird AI launches Falcon, FalconClaw

The mantra of the modern tech industry was arguably coined by Facebook (before it became Meta): “move fast and break things.”

But as enterprise infrastructure has shifted into a dizzying maze of hybrid clouds, microservices, and ephemeral compute clusters, the “breaking” part has become a structural tax that many organizations can no longer afford to pay. Today, three-year-old startup NeuBird AI is launching a full-scale offensive against this “chaos tax,” announcing a $19.3 million funding round alongside the release of its Falcon autonomous production operations agent.

The launch isn’t just a product update; it is a philosophical pivot. For years, the industry has focused on “Incident Response”—making the fire trucks faster and the hoses bigger. NeuBird AI is arguing that the only sustainable path forward is “Incident Avoidance”.

As Venkat Ramakrishnan, President and COO of NeuBird AI, put it in a recent interview: “Incident management is so old school. Incident resolution is so old school. Incident avoidance is what is going to be enabled by AI”.

By grounding AI in real-time enterprise context rather than just large language model reasoning, the company aims to move site reliability engineering and devops teams from a reactive posture to a predictive one.

The AI divide: a reality check on automation

Accompanying the launch is NeuBird AI’s 2026 State of Production Reliability and AI Adoption Report, a survey of over 1,000 professionals that reveals a massive disconnect between the boardroom and the server room.

While 74% of C-suite executives believe their organizations are actively using AI to manage incidents, only 39% of the practitioners—the engineers actually on-call at 2:00 AM—agree.

This 35-point “AI Divide” suggests that while leadership is writing checks for AI platforms, the technology is often failing to reach the frontline.

For engineers, the reality remains manual and grueling: the study found that engineering teams spend an average of 40% of their time on incident management rather than building new products.

Gou Rao, CEO of NeuBird AI, told VentureBeat that this is a persistent operational reality: “Over the past 18 months that we have been in production, this is not a marketing slide. We have concretely been able to demonstrate a massive reduction in time to incident response and resolution”.

The consequences of this “toil” are more than just lost productivity. Alert fatigue has transitioned from a morale issue to a direct reliability risk.

According to the report, 83% of organizations have teams that ignore or dismiss alerts occasionally, and 44% of companies experienced an outage in the past year tied directly to a suppressed or ignored alert. In many cases, the systems are so noisy that customers discover failures before the monitoring tools do.

Introducing NeuBird AI Falcon

NeuBird AI’s answer to this systemic failure is the Falcon engine. While the company’s previous iteration, Hawkeye, focused on autonomous resolution, Falcon extends that capability into predictive intelligence. “When we launched NeuBird AI in 2023, our first version of the agent was called Hawkeye,” Rao explains. “What we’re announcing next week at HumanX is our next-generation version of the agent, codenamed Falcon. Falcon is easily three times faster than Hawkeye and is averaging around 92% in confidence scores”.

This level of accuracy allows engineers to trust the agent’s output at face value. Falcon represents a significant leap over previous generative AI applications in the space, particularly in its ability to forecast failure. “Falcon is really good at preventive prediction, so it can tell you what can go wrong,” Rao says. “It’s pretty accurate on a 72-hour window, even better at 48 hours, and by 24 hours it gets really, really accurate”.

One of the standout features of the new release is the Advanced Context Map. Unlike static dashboards, this is a real-time view of infrastructure dependencies and service health. It allows teams to visualize the “blast radius” of an issue as it propagates across an environment, helping engineers understand not just what is broken, but why it is failing in the context of its neighbors.

‘Minority Report’ for incident management

While many AI tools favor flashy web interfaces, NeuBird AI is leaning into the developer’s native habitat with NeuBird AI Desktop. This allows engineers to invoke the production ops agent directly from a command-line interface to explore root causes and system dependencies.

“Falcon has a desktop mode which allows it to interact with a developer’s local tools,” Rao noted. “We’re getting a lot more traction from a hands-on developer audience, especially as people go to Claude Desktop and Cursor. They’re completing the loop by using production agents talking to their coding agents”.

This integration enables a “multi-agent” workflow where an engineer can use NeuBird AI’s agent to diagnose a root cause in production and then hand off that diagnosis to a coding agent like Claude Code to implement the fix.

During a live demo, Rao showcased how the agent could be set to “Sentinel Mode,” constantly sweeping a cluster for risks. If it detects an anomaly—such as a projected 5% spike in AWS costs or a misconfigured Kubernetes pod—it can flag the specific engineer on-call who has the domain expertise to fix it.

“This is like ‘Minority Report for Incident Management’,” one financial services executive reportedly told the team after a demo.

Context engineering: a gateway for security

A primary concern for enterprises deploying AI is security—ensuring large language models don’t go “crazy” or exfiltrate sensitive data. NeuBird AI addresses this through a proprietary approach to “context engineering”.

“The way we implemented our agent is that the large language models themselves are never actually touching the data directly,” Rao explains. “We become the gateway for how the context can be accessed”. This means the model is the reasoning engine, but NeuBird AI is the middleman that wraps the data.

Furthermore, the company has implemented strict guardrails on what the agent can actually execute. “We’ve created a language that confines and restricts the agent from what it can do,” says Rao. “If it comes up with something anomalous, or something we don’t know, it won’t run. We won’t do it”.

This architectural choice allows NeuBird AI to remain model-agnostic. If a newer model from Anthropic or Google outperforms the current reasoning engine, NeuBird AI can simply switch it out without requiring the customer to change their platform. “Customers don’t want to be tied to a specific way of reasoning,” Rao asserts. “They want to be tied to a platform from which they can get the value of an agentic system”.

Displacing the “army”: displacing expensive observability

One of the most radical claims NeuBird AI makes is that agentic systems can actually reduce the amount of data enterprises need to store in the first place. Currently, teams rely on massive storage platforms with complex query languages.

“People use very complex observability tools like Datadog, Dynatrace, and Sysdig,” Rao says. “This is the norm today, which is why it takes an army of people to solve a problem. What we’ve been able to demonstrate with agentic systems is that you don’t need to store all that data in the first place”. Because the agent can reason across raw data sources, it can identify which signals are junk and which are critical. This shift, Rao argues, “reduces human toil and effort while simultaneously reducing your reliance on these insanely expensive observability tools”.

The practical impact of this “incident avoidance” was recently demonstrated at Deep Health. Rao recounts how their agent detected a systemic issue that was invisible to traditional tools: “Our agent was able to go in and prevent an issue from happening which would have caused this company, Deep Health, a major production outage. The customer is completely beside themselves and happy about what it could do”.

FalconClaw: operationalizing ‘tribal knowledge’

One of the most persistent problems in IT operations is the loss of “tribal knowledge”—the hard-won expertise of senior engineers that exists only in their heads. NeuBird AI is attempting to solve this with FalconClaw, a curated, enterprise-grade skills hub compatible with the OpenClaw ecosystem.

FalconClaw allows teams to capture best practices and resolution steps as “validated and compliant skills”. The tech preview launched today with 15 initial skills that work natively with NeuBird AI’s toolchain.

According to Francois Martel, Field CTO at NeuBird AI, this turns hard-won expertise into a reusable asset that the AI can use automatically.

It’s an attempt to standardize how agents interact with infrastructure, moving away from proprietary “black box” systems toward a multi-agent world where different AI tools can share a common set of operational abilities.

Scaling the moat: funding and leadership

The $19.3 million round was led by Xora Innovation, a Temasek-backed firm, with participation from Mayfield, M12, StepStone Group, and Prosperity7 Ventures. This brings NeuBird AI’s total funding to approximately $64 million.

The investor interest is fueled largely by the pedigree of the founding team. Gou Rao and Vinod Jayaraman previously co-founded Portworx, which was acquired by Pure Storage, and Ocarina Networks, acquired by Dell. They have recently bolstered their leadership with Venkat Ramakrishnan, another Pure Storage veteran, as President and COO.

For investors like Phil Inagaki of Xora, the value lies in NeuBird AI’s “best-in-class results across accuracy, speed and token consumption”. As cloud costs continue to spiral, the ability of an AI agent to not only fix bugs but also optimize infrastructure capacity is becoming a “must-have” rather than a “nice-to-have”. NeuBird AI claims its agent can save enterprise teams more than 200 engineering hours per month.

The path to ‘self-healing’ infrastructure

As the State of Production Reliability report notes, current incident management practices are “no longer sustainable”. With 61% of organizations estimating that a single hour of downtime costs $50,000 or more, the financial stakes of staying in a reactive loop are enormous.

NeuBird AI’s launch of Falcon and FalconClaw marks a definitive attempt to break that loop. By focusing on prevention and the “context engineering” required to make AI trustworthy for enterprise production, the company is positioning itself as the critical intelligence layer for the modern stack.

While the “AI Divide” between executives and practitioners remains a significant hurdle for the industry, NeuBird AI is betting that as engineers see the value of a cli-driven, 92%-accurate agent that can “see around corners,” the skepticism will fade. For the site reliability engineers currently drowning in a flood of non-actionable alerts, the arrival of a reliable ai teammate couldn’t come soon enough.

NeuBird AI Falcon is available starting today, with organizations able to sign up for a free trial at neubird.ai.

Security | VentureBeat – ​Read More

Convicted spyware maker Bryan Fleming avoids jail at sentencing

The pcTattletale founder escapes a custodial sentence following the first successful prosecution of a spyware maker in the U.S. for over a decade.

Security News | TechCrunch – ​Read More

How I set up Claude Code in iTerm2 to launch all my AI coding projects in one click

Managing multiple Claude Code projects doesn’t have to be chaotic. My iTerm2 setup dramatically reduces friction in my daily AI-assisted coding workflows – here’s how.

Latest news – ​Read More

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro.
Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named “msimg32.dll,”

The Hacker News – ​Read More

North Korean Hackers Target High-Profile Node.js Maintainers

The threat actor behind the Axios supply chain attack has been aiming at other maintainers in its social engineering campaign.

The post North Korean Hackers Target High-Profile Node.js Maintainers appeared first on SecurityWeek.

SecurityWeek – ​Read More

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka Sodinokibi) ransomware-as-a-service (RaaS) operation.
The threat actor, who went by the alias UNKN, functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS cybercrime forum. He 

The Hacker News – ​Read More

Why my Raspberry Pi boards suddenly cost as much as a laptop now – and I’m not surprised

We live in a time when two 16GB Raspberry Pi 5 boards cost the same as a MacBook Neo. Here’s how to save up during the ongoing AI boom.

Latest news – ​Read More

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.

Shchukin was named as UNKN (a.k.a. UNKNOWN) in an advisory published by the German Federal Criminal Police (the “Bundeskriminalamt” or BKA for short). The BKA said Shchukin and another Russian — 43-year-old Anatoly Sergeevitsch Kravchuk — extorted nearly $2 million euros across two dozen cyberattacks that caused more than 35 million euros in total economic damage.

Daniil Maksimovich SHCHUKIN, a.k.a. UNKN, and Anatoly Sergeevitsch Karvchuk, alleged leaders of the GandCrab and REvil ransomware groups.

Germany’s BKA said Shchukin acted as the head of one of the largest worldwide operating ransomware groups GandCrab and REvil, which pioneered the practice of double extortion — charging victims once for a key needed to unlock hacked systems, and a separate payment in exchange for a promise not to publish stolen data.

Shchukin’s name appeared in a Feb. 2023 filing (PDF) from the U.S. Justice Department seeking the seizure of various cryptocurrency accounts associated with proceeds from the REvil ransomware gang’s activities. The government said the digital wallet tied to Shchukin contained more than $317,000 in ill-gotten cryptocurrency.

The Gandcrab ransomware affiliate program first surfaced in January 2018, and paid enterprising hackers huge shares of the profits just for hacking into user accounts at major corporations. The Gandcrab team would then try to expand that access, often siphoning vast amounts of sensitive and internal documents in the process. The malware’s curators shipped five major revisions to the GandCrab code, each corresponding with sneaky new features and bug fixes aimed at thwarting the efforts of computer security firms to stymie the spread of the malware.

On May 31, 2019, the GandCrab team announced the group was shutting down after extorting more than $2 billion from victims. “We are a living proof that you can do evil and get off scot-free,” GandCrab’s farewell address famously quipped. “We have proved that one can make a lifetime of money in one year. We have proved that you can become number one by general admission, not in your own conceit.”

The REvil ransomware affiliate program materialized around the same as GandCrab’s demise, fronted by a user named UNKNOWN who announced on a Russian cybercrime forum that he’d deposited $1 million in the forum’s escrow to show he meant business. By this time, many cybersecurity experts had concluded REvil was little more than a reorganization of GandCrab.

UNKNOWN also gave an interview to Dmitry Smilyanets, a former malicious hacker hired by Recorded Future, wherein UNKNOWN described a rags-to-riches tale unencumbered by ethics and morals.

“As a child, I scrounged through the trash heaps and smoked cigarette butts,” UNKNOWN told Recorded Future. “I walked 10 km one way to the school. I wore the same clothes for six months. In my youth, in a communal apartment, I didn’t eat for two or even three days. Now I am a millionaire.”

As described in The Ransomware Hunting Team by Renee Dudley and Daniel Golden, UNKNOWN and REvil reinvested significant earnings into improving their success and mirroring practices of legitimate businesses. The authors wrote:

“Just as a real-world manufacturer might hire other companies to handle logistics or web design, ransomware developers increasingly outsourced tasks beyond their purview, focusing instead on improving the quality of their ransomware. The higher quality ransomware—which, in many cases, the Hunting Team could not break—resulted in more and higher pay-outs from victims. The monumental payments enabled gangs to reinvest in their enterprises. They hired more specialists, and their success accelerated.”

“Criminals raced to join the booming ransomware economy. Underworld ancillary service providers sprouted or pivoted from other criminal work to meet developers’ demand for customized support. Partnering with gangs like GandCrab, ‘cryptor’ providers ensured ransomware could not be detected by standard anti-malware scanners. ‘Initial access brokerages’ specialized in stealing credentials and finding vulnerabilities in target networks, selling that access to ransomware operators and affiliates. Bitcoin “tumblers” offered discounts to gangs that used them as a preferred vendor for laundering ransom payments. Some contractors were open to working with any gang, while others entered exclusive partnerships.”

REvil would evolve into a feared “big-game-hunting” machine capable of extracting hefty extortion payments from victims, largely going after organizations with more than $100 million in annual revenues and fat new cyber insurance policies that were known to pay out.

Over the July 4, 2021 weekend in the United States, REvil hacked into and extorted Kaseya, a company that handled IT operations for more than 1,500 businesses, nonprofits and government agencies. The FBI would later announce they’d infiltrated the ransomware group’s servers prior to the Kaseya hack but couldn’t tip their hand at the time. REvil never recovered from that core compromise, or from the FBI’s release of a free decryption key for REvil victims who couldn’t or didn’t pay.

Shchukin is from Krasnodar, Russia and is thought to reside there, the BKA said.

“Based on the investigations so far, it is assumed that the wanted person is abroad, presumably in Russia,” the BKA advised. “Travel behaviour cannot be ruled out.”

There is little that connects Shchukin to UNKNOWN’s various accounts on the Russian crime forums. But a review of the Russian crime forums indexed by the cyber intelligence firm Intel 471 shows there is plenty connecting Shchukin to a hacker identity called “Ger0in” who operated large botnets and sold “installs” — allowing other cybercriminals to rapidly deploy malware of their choice to thousands of PCs in one go. However, Ger0in was only active between 2010 and 2011, well before UNKNOWN’s appearance as the REvil front man.

A review of the mugshots released by the BKA at the image comparison site Pimeyes found a match on this birthday celebration from 2023, which features a young man named Daniel wearing the same fancy watch as in the BKA photos.

Images from Daniil Shchukin’s birthday party celebration in Krasnodar in 2023.

Krebs on Security – ​Read More