TLDR IT 2026-05-11
AI Attack Surface Expands β οΈ, Your ERP's New Coworker π€, Critical Infrastructure Gets a Wake-Up Call β‘
Fake OpenAI repository on Hugging Face pushes infostealer malware (3 minute read)
A malicious Hugging Face repository, Open-OSS/privacy-filter, impersonated OpenAI to distribute Rust-based infostealer malware. The repository reached 244,000 downloads before removal. The malware targets browser data, cryptocurrency wallets, and credentials, using anti-analysis techniques to evade detection. Victims should reimage machines and rotate all compromised credentials immediately.
Microsoft's Kenya Data Center Hits a Payment Wall (3 minute read)
Microsoft and G42's planned $1B East Africa data center has stalled over payment guarantee demands from the Kenyan government. The project has not been canceled, but the dispute shows how AI/cloud infrastructure expansion is increasingly tied to energy, sovereign risk, and long-term capacity commitments.
CISA Tells Critical Infrastructure to Prepare for Isolation (4 minute read)
CISA's new CI Fortify guidance urges critical infrastructure operators to plan for disruptive cyberattacks by building isolation and recovery capabilities before a crisis. The guidance is especially relevant for IT and security teams responsible for systems that may need to keep running even when vendors, networks, or cloud services are degraded.
Earnings analysis: Palantir's 145% rule and the SaaS reacceleration trend (8 minute read)
Major tech firms reported $540 billion in revenue and $700 billion in AI capex, marking an aggressive quarter. Palantir achieved a 145% Rule of 40, while SaaS firms like Atlassian and Twilio show reacceleration. Success now requires both base monetization and net new customer acquisition via AI integration.
Exposed AI Services Create a New Attack Surface (5 minute read)
Researchers scanned more than 1M exposed AI services and found weak defaults, misconfigurations, and public exposure across AI infrastructure. AI infra is being deployed like experimental software, but it is increasingly connected to real data and production systems.
Enterprise AI Has an Identity Problem (5 minute read)
A Hacker News piece argues that AI agents are already operating inside enterprise environments faster than IAM and governance systems can track them. The core issue is not just model risk, but delegated authority: which apps, tokens, workflows, and agents can act on behalf of users or systems.
π€
Launches & Partnerships
ServiceNow + NVIDIA Bring Governance to Autonomous AI Agents (4 minute read)
ServiceNow and NVIDIA unveiled βProject Arc,β an autonomous desktop AI agent that can execute complex enterprise tasks while being monitored and governed through ServiceNow AI Control Tower and NVIDIA OpenShell. The partnership also extends AI governance into data centers via NVIDIA's Enterprise AI Factory and launches open-source benchmarks to measure enterprise AI agent performance.
Anthropic Signs $1.8B Akamai Cloud Deal (2 minute read)
Anthropic reportedly signed a $1.8B cloud computing deal with Akamai to support growing demand for its AI software. The deal adds another signal that AI infrastructure demand is spilling beyond the usual hyperscaler relationships.
Integrating AI agents with enterprise ERP systems via CLI and MCP protocols (6 minute read)
AI agents require data access, code environments, and integration layers to automate ERP tasks. While MCP offers structured tool discovery, CLI excels at handling high-volume data. SAP's new API policy restricts third-party agents, forcing developers to utilize alternative integration methods like SFTP, email, and screen automation.
βFull-stack AIβ sounds appealing, but the IT reality is more complex (7 minute read)
Full-stack AI marketing often ignores the reality of diverse, legacy-heavy IT environments. Organizations struggle to integrate turnkey AI stacks with existing VMs, containers, and proprietary systems, proving that bespoke, hybrid infrastructure designs remain essential for modern enterprise operations.
Curated news ποΈ and trends π in IT strategy π», information security π, and cloud computing βοΈ.
Join 587,000 readers for
one daily email