News
- The iPhone 17 series could cost $50 more than the iPhone 16 line
- This is reportedly due to tariffs, though the impact has apparently been reduced thanks to Apple negotiating lower component costs
- We've also seen photos of many possible iPhone 17 series colors
It’s looking increasingly likely that the iPhone 17 series will cost more than previous models, because while we haven't seen many price leaks yet, most of the ones we have seen point in that direction – including the latest one.
According to leaker @Jukanlosreve, the iPhone 17 series will cost roughly $50 (around £40 / AU$75) more than the iPhone 16 series.
If that's the case, the starting price of the iPhone 17 would be around $850 / £850 / AU$1,475, the starting price of the iPhone 17 Pro would be roughly $1,050 / £1,050 / AU$1,875, and the starting price of the iPhone 17 Pro Max would be approximately $1,250 / £1,250 / AU$2,225.
A Brief Note on iPhone 17 Series Price IncreaseA few days ago, Jefferies analysts revealed in their note that the iPhone 17 series could see a $50 price increase.Additionally, WSJ reported last May that Apple was considering raising prices for the iPhone 17 series.Apple's…August 4, 2025
We’re also expecting an iPhone 17 Air, and this has previously been said to cost around the same as the iPhone 16 Plus, which would mean $899 / £899 / AU$1,599, though possibly around $50 / £40 / AU$75 more if this latest price leak is right.
In any case, this $50 increase claim echoes a recent report from Jefferies analyst Edison Lee (via @DeItaone), who claimed that all models except the standard iPhone 17 would see this increase.
@Jukanlosreve for their part claims to have reached this figure through modeling how tariffs, “the weak dollar effect”, and Apple’s own efforts to reduce the cost of components will impact the price.
A full selection of shadesPotential price rises are never fun, but in more positive news, leaked photos of potentially every iPhone 17 series shade have emerged.
Which model and color will you choose this year? pic.twitter.com/AtDFutgSX0August 3, 2025
Shared by leaker Majin Bu, these show the iPhone 17 in black, white, pink, blue, and green shades, the iPhone 17 Air in black, white, blue, and a pale yellow, and the iPhone 17 Pro and Pro Max in black, white, blue, gray, and brown.
These colors largely match what we saw in another recent iPhone 17 colors leak, but the green and gray shades weren’t included there, and the color that looks brown here appeared more orange in that leak – so there’s still plenty of uncertainty around exactly which colors will be on offer.
We should know exactly what will be on offer fairly soon though, as the iPhone 17 series is likely to launch in the first half of September, so around a month from now.
You might also like- PDP has revealed a new version of one of its best controllers
- The Turtle Beach Victrix Pro BFG Reloaded features an enhanced fightpad module and Hall effect thumbsticks and triggers
- It's up for pre-order in the US, and out now in the UK
Turtle Beach's competitive gaming accessory brand Victrix has revealed the successor to one of its best controllers.
The Turtle Beach Victrix Pro BFG Reloaded is an overhauled version of the popular Victrix Pro BFG, already one of of the best PS5 controllers today. It retains all the modular functionality of the original but boasts an enhanced design with an improved fightpad module designed for a better claw grip.
It also comes with Hall effect thumbsticks and triggers right out of the box, two major upgrades that should improve precision and help reduce wear over the years.
In addition to the PlayStation variant, an Xbox version will also be available. Both come in either black or white colorways, and cost $209.99 / £179.99.
Although the controller is out now in the UK, it's currently exclusively available to attendees of EVO 2025 in the US. It's up for pre-order on the Turtle Beach website, though, for a wider September 28 release.
The Victrix Pro BFG stands apart from most controllers thanks to its unique modularity. It can be customized and tweaked via a range of interchangeable components, such as alternate d-pads, thumbstick caps, and gates.
It also boasts a range of high-end features, including remappable rear buttons, a hair-trigger mode, and a robust companion app.
You might also like...- Ransomware attacks are rising quickly in the US
- Hackers are focusing on data exfiltration
- Oil and gas is growing increasingly popular among threat actors
The US is now the ransomware capital of the world. The majority of the attacks are targeting US organizations, and in the last year, the number of attacks has dramatically spiked. These are the conclusions echoed in the 2025 Ransomware Report, published by cybersecurity experts Zscaler ThreatLabz.
Using proprietary data, as well as samples and information collected from the wider internet, Zscaler’s researchers determined that 50% of all ransomware attacks in the last year happened in the United States, “significantly outpacing” Canada (5%) and the UK (4%).
Even when you combine all the attacks reported across the top 15 most-targeted countries, there are fewer than 3,671 that were reported in the US.
Stealing without encryptingThe number of attacks is also increasing. Year-on-year, it is up by 146% in the US, with manufacturing (1,063), technology (922), and healthcare (672) being the most-targeted industries, mostly for the potential for operational disruption, the sensitive of the stolen data, and the risk of regulatory pressure and reputational damage. Companies in the oil and gas sector saw a “staggering” increase in ransomware attacks - 900% year-on-year.
Zscaler also said that ransomware actors are increasingly abandoning the encryption part of the attack, and are focusing solely on data theft. In the last year, 10 of the biggest ransomware groups exfiltrated 238 TB of data, up 92% from last year’s 123 TB.
Right now, the biggest names in the ransomware space are RansomHub (833 victims), Akira (520), and Clop (488), but the number of threat actors is also rising. In the last year alone, the researchers identified 34 newly active ransomware families, bringing the total number up to 425.
Ransomware “flourishes” in environments with fragmented security, limited visibility, implicit trust, and outdated legacy architectures, Zscaler stresses, urging businesses to mitigate these threats by adopting a cloud-native, AI-driven, zero-trust architecture.
You might also like- US Authorities Issue RansomHub Ransomware Alert
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
If you’re not including And Just Like That… season 3 in your best HBO Max shows of 2025 list, I can hardly blame you. Since its debut in 2021, the Sex and the City (SATC) sequel has had a rocky ride on screen, frequently being lambasted on social media for how it’s changed the core personalities of Carrie (Sarah Jessica Parker), Charlotte (Kristen Davis) and Miranda (Cynthia Nixon). While Miranda left Steve (David Eigenberg) in the dust and transformed into a legal intern lesbian, Charlotte felt out of touch with her helicopter parenting of kids Rock (Alexa Swinton) and Lily (Cathy Ang).
I couldn’t even tell you who any of the middling replacements for Samantha (Kim Cattrall) are, with Cattrall herself making the career move of a lifetime by staying well away from this absolutely underwhelming car crash (well, all except for that excruciating season 2 finale cameo). The point is, none of our other stars come anywhere near her, but as much as we might want Samantha’s miraculous return in the season 3 finale to scold everyone for making such terrible television, it’s not going to happen.
So, what will happen, or perhaps the more important question is: what needs to happen? If you’ve been managing to stay awake while watching the HBO Max show, you’ll have noticed Carrie is slowly edging closer to the version of herself she used to be in Sex and the City. She’s easily the biggest stumbling block in And Just Like That… (ATLJ), and if we have to watch two more episodes until it’s over, she better have the best damn fictional U-turn TV has ever seen.
And Just Like That has been rough on everyone, but Carrie Bradshaw needs to come full circleSpoilers for And Just Like That… season 3 episodes 9 and 10 ahead.
If you’re a seasoned SATC watcher like me, you’ll have probably thought Carrie was the worst of the quartet in the 90s too… and you’d be right. Never taking responsibility for her own actions and feelings, and instead placing the blame anywhere else, she was too frustrating to consistently warm to (even if she was dressed immaculately). Watching her make the same mistakes over again was relatable and somewhat charming for the first few seasons, but after six seasons, two standalone movies and now three seasons of a sequel series, it all wears awfully thin.
That doesn’t mean Carrie hasn’t been through it in AJLT: she’s been through the fictional death of husband Big (Ron Galotti), the real-life death of Willie Garson, who played BFF Stanford, and she’s picked back up a tired-out situationship with Aidan (John Corbett). We’ve got to have some kind of sympathy for her, right? Wrong! For the bulk of ATLJ, Carrie’s been a burden on her friends, an even bigger burden on us, and the biggest burden of all to herself. All those years of living life in the city on screen, and she doesn’t seem to have learned a single lesson from them.
However, that’s slowly started to change. Just before breaking up with Aidan (finally) and striking up a sexy new attraction to Duncan (Jonathan Clarke), we see Miranda confront Carrie about her evasive defences after Charlotte’s house party in season 3 episode 9. Miranda points out the amount of continued distrust between Carrie and Aidan, and for a split second, AJLT becomes the closest thing we’ve ever seen to a true SATC revival. Finally cutting ties with what isn’t serving her is the healthiest move Carrie has made in years, but can she sustain it?
Here’s my pitch for the AJLT season 3 ending. Miranda stays with Joy (Dolly Wells) and continues to build a healthy relationship (nothing wrong with these two, so live and let live). Harry’s (Evan Handler) prostate cancer is cleared, leaving Charlotte space to thrive as the good friend and mother we know her to be, and the others… well, they can do whatever they like as we won’t be paying attention.
But Carrie needs to dump any and all men, work on herself in the therapeutic ways she’d always dismissed in SATC, and actually start to be a good person. We can’t bow out in good conscience if she still remains a threat to New York City’s female friendships, and there will truly be no evolution in her character if she leaves in an even worse state than when she started. In the most dramatic case, the best thing for Carrie would be to get out of New York completely, which could mean moving back to England with Duncan. Frankly, I don’t care where in the world she ends up, both Carrie and AJLT need to not be insufferable the first time ever in its final moments. I know it’s hard, but pretty please?
You might also like- The DCU's most unlikely TV show is reportedly moving forward at HBO Max as Booster Gold finds its showrunner
- HBO’s Harry Potter TV show is supposed to be a fresh start, but Nick Frost’s Hagrid says otherwise
- Superman's most surprising cameo has got me asking 3 big questions about James Gunn's next DCU project
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Strands hints and answers for Monday, August 4 (game #519).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #520) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… We have a winner!
NYT Strands today (game #520) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
- VINE
- WARD
- WING
- TEAK
- SWEET
- GRIN
• Spangram has 10 letters
NYT Strands today (game #520) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 6th row
Last side: right, 1st row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #520) - the answers(Image credit: New York Times)The answers to today's Strands, game #520, are…
- BINGO
- GIVEAWAY
- DRAWING
- SWEEPSTAKES
- LOTTERY
- SPANGRAM: LUCKY BREAK
- My rating: Hard
- My score: 1 hint
It was possibly my LUCKY BREAK that I saw the spangram before anything else today, and immediately went in search of words associated with games of chance.
Not sure what DRAWING is in there for, but I guess numbers are drawn in lotteries and BINGO, so we’ll allow it.
Incredibly, I got SWEEPSTAKES without the S as a non-game word before I realized my error. A good job today’s search wasn’t too taxing.
Yesterday's NYT Strands answers (Monday, August 4, game #519)- RAZOR
- CAPE
- CLIPPERS
- COMB
- TRIMMER
- AFTERSHAVE
- SPANGRAM: BARBERSHOP
Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: NYT Connections hints and answers for Monday, August 4 (game #785).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #786) - today's words(Image credit: New York Times)Today's NYT Connections words are…
- DRESS
- SCARF
- SUBWAY
- GRATE
- PIPE
- TUBE
- CUBE
- ZIP
- HEALTH
- CARROT
- UNDERGROUND
- SECRET
- METRO
- MINCE
- COAL
- SLICE
What are some clues for today's NYT Connections groups?
- YELLOW: Urban trains
- GREEN: Veg reduction
- BLUE: The weather outside is frightful
- PURPLE: Password
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #786) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
- YELLOW: SUBTERRANEAN TRANSIT
- GREEN: MAKE INTO SMALLER PIECES WHILE COOKING
- BLUE: USED TO DECORATE A SNOWMAN
- PURPLE: CODE
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #786) - the answers(Image credit: New York Times)The answers to today's Connections, game #786, are…
- YELLOW: SUBTERRANEAN TRANSIT METRO, SUBWAY, TUBE, UNDERGROUND
- GREEN: MAKE INTO SMALLER PIECES WHILE COOKING CUBE, GRATE, MINCE, SLICE
- BLUE: USED TO DECORATE A SNOWMAN CARROT, COAL, PIPE, SCARF
- PURPLE: CODE DRESS, HEALTH, SECRET, ZIP
- My rating: Hard
- My score: Perfect
Did you know that if you were to lay all the track of the New York SUBWAY from end to end it would reach all the way to Chicago?
I know this because today’s Connections sent me down a Wikipedia rabbit hole looking at the world’s SUBTERRANEAN TRANSIT systems.
Anyway, I digress. This was a great game for me, as I completed it in color order and it made me feel smarter than I am.
This was mainly down to getting USED TO DECORATE A SNOWMAN – giving us this group in the middle of the summer is a bit sneaky, but seeing COAL and CARROT beside each other I knew what we were looking for.
Yesterday's NYT Connections answers (Monday, August 4, game #785)- YELLOW: ARTHROPODS APHID, BEETLE, MITE, TICK
- GREEN: TREES BEECH, CEDAR, PINE, YEW
- BLUE: [LETTER] (IS) FOR __ APPLE, COOKIE, EFFORT, VENDETTA
- PURPLE: WORDS THAT SOUNDS LIKE TWO LETTERS DECAY, EASY, GEO, ZITI
NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Monday's puzzle instead then click here: Quordle hints and answers for Monday, August 4 (game #1288).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1289) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 4*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1289) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 1.
Quordle today (game #1289) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1289) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1289) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• R
• S
• A
• B
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1289) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1289, are…
- ROAST
- SLICK
- AUDIT
- BILLY
I made a right mess of things today, only just escaping with a last gasp guess of BILLY – not that I had any other possibilities left.
I’d not heard of it before, but a billy is a kind of can or pot.
Daily Sequence today (game #1289) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1289, are…
- TAROT
- STEEP
- SLEEP
- SHORN
- Quordle #1288, Monday, 4 August: MACAW, SINCE, COLON, CHIRP
- Quordle #1287, Sunday, 3 August: MOTIF, LEERY, LOFTY, BURST
- Quordle #1286, Saturday, 2 August: WARTY, PUPAL, CLEAR, SLICE
- Quordle #1285, Friday, 1 August: ACTOR, MEALY, WIDTH, ADOBE
- Quordle #1284, Thursday, 31 July: STYLE, VALET, AGONY, ALLOY
- Quordle #1283, Wednesday, 30 July: DEBAR, ADMIN, FOLIO, USAGE
- Quordle #1282, Tuesday, 29 July: BATCH, TOPIC, MURKY, BUNCH
- Quordle #1281, Monday, 28 July: CANDY, TRYST, SHIRT, FORGO
- Quordle #1280, Sunday, 27 July: TRAWL, BALER, PIANO, MINCE
- Quordle #1279, Saturday, 26 July: MUDDY, SAINT, KINKY, POLAR
- Quordle #1278, Friday, 25 July: BONUS, RESIN, CEDAR, MADAM
- Quordle #1277, Thursday, 24 July: AGONY, VERVE, GLEAN, MINUS
- Quordle #1276, Wednesday, 23 July: OZONE, PENCE, ROOMY, WIDER
- Quordle #1275, Tuesday, 22 July: OPTIC, GIDDY, VOCAL, ADULT
- Quordle #1274, Monday, 21 July: KNEED, SNAIL, PINTO, FEAST
- Quordle #1273, Sunday, 20 July: GRACE, COUNT, EGRET, GIANT
- Quordle #1272, Saturday, 19 July: EARLY, CLICK, TRITE, SPREE
- Quordle #1271, Friday, 18 July: CINCH, FOYER, FUDGE, TAFFY
- Quordle #1270, Thursday, 17 July: CRESS, TABOO, POWER, HATER
An AI Accelerator is a deep learning or neural processor created specifically for inference and to improve the performance of an AI task. While Graphics Processing Units (GPUs) are the most common type, other specialized accelerators include Tensor Processing Units (TPUs), Data Processing Units (DPUs), Field-Programmable Gate Arrays (FPGAs), and Application-Specific Integrated Circuits (ASICs).
With so many acronyms to remember (and even more accelerator types left unnamed), we will focus on GPUs because their highly parallel architecture makes them incredibly versatile for a wide range of AI workloads.
GPU accelerationGPUs are an in-demand commodity throughout the IT industry. Manufacturers like NVIDIA and AMD are powering the world's insatiable appetite for artificial intelligence and machine learning applications.
An AI GPU accelerator is responsible for making hundreds of thousands of calculations in parallel, and it's used in every facet of AI, large language models (LLMs), data analytics, and high-performance computing.
Such widespread adoption not only highlights their critical role in advancing modern technology but also explains why GPU demand continues to outpace supply. This leads us to a crucial question: Can your cloud hosting provider truly deliver the AI GPU hosting you need? Let's dive into what that really means with 5 things you need to know.
1: Pick the GPU your workload requiresThis might sound like common sense, but it’s important to understand the GPU accelerator hardware available from your hosting provider. GPUs are not created equal; they vary massively in specification and capability.
It's important to know what VRAM does, what tensor cores are, and what an NVLink interconnect does; otherwise, it's very easy to overspec and overpay for GPU resources if you don't understand exactly what's needed.
Understand your workload: Do you want to train your own AI model, use private LLMs, or perhaps need a chatbot application? Different AI tasks require different GPU specifications.
Understand data size and IO: AI models are typically trained on huge datasets, so you need a GPU that can process data at a good rate, and you need underlying storage, ideally NVMe SSDs that can keep up to prevent bottlenecks.
Consider future scalability: Ask yourself: Will your AI project grow? You need a hosting provider that can grow with you because you may need a bigger server (more memory, faster CPU) in the near future.
Get developer feedback when choosing a framework: Does the hosting environment support your preferred framework tools out of the box? Ask your devs what they want to use; popular AI frameworks include TensorFlow, PyTorch, and JAX.
2: Choose a provider with the necessary hardware platformGPUs are very important for AI workloads, but it's also important to consider the underlying hardware and ensure that it's fit for purpose. Network architecture and interconnects are critical for maximizing the performance of AI accelerators when hosted in the cloud.
Don't forget the importance of CPUs: CPUs are still critical for AI as they control the throughput of data to all aspects of the cloud platform. You need a provider that uses the latest CPU architectures, such as Intel Xeon or AMD EPYC, and examines the number and the speed of the CPU cores.
Go beyond high-speed networking: Fiber-optic connected networking is essential for AI platforms to function with low latency. There are 3 types of networking commonly deployed:
InfiniBand provides very low-latency and high-bandwidth communication between nodes (servers) containing GPUs. This is ideal for large-scale distributed AI clusters.
NVLink is NVIDIA's high-speed interconnect for direct GPU-to-GPU communication within a single server. It's needed for multi-GPU setups and is great for preventing bottlenecks.
High-Bandwidth Ethernet (e.g., 100GbE+) offers affordable performance for distributed AI and high-performance storage.
Latency: The ultimate goal is to choose the best hardware that will achieve the lowest latency. This is crucial because rapid GPU IO prevents bottlenecks and improves efficiency.
3: Embedded cloud AI ecosystemOne major benefit of GPU hosting is the fact that it's easy to integrate with existing services from a provider. Pick managed services that work for you. Popular integrations include hooking into cloud storage layers, picking managed security services, and backups.
If you are a business, server management options are a great way to ensure optimal performance and uptime, letting you focus on developing your AI application whilst the provider manages the underlying infrastructure, load balancing, MFA, Antivirus, Intrusion Prevention, and DDoS Protection behind the scenes.
4: Cost optimizationIt's essential to keep on top of your operational expenditure, especially when using GPU accelerators. Costs can spiral if you make inefficient deployment decisions, overspecify your server requirements, or leave resources running idle around the clock. Costs vary significantly, so shop around and pick a provider that offers the hardware you need for a cost that is sustainable.
Cloud GPU hosting is the way forward (unless you can afford about $40,000 for a decent-spec GPU), do not forget about all the cooling and power requirements too. Remember to optimize your instance sizing, monitor and turn off idle resources, and take advantage of multi-instance GPU capabilities, where providers essentially slice up a GPU into smaller and very affordable partitions.
5: Support, reliability, and complianceThese factors underline a provider's ability to deliver GPU hosting that meets the needs of modern business. You may run into blockers or issues that could prevent you from releasing on schedule. Having 24x7x365 support skilled in AI/ML available for when things go wrong is vital to business continuity.
Look for strong uptime guarantees and providers that back up their claims with service credits if the unexpected happens. They should also demonstrate proven redundancy capabilities, disaster recovery, and a proactive approach to monitoring to safeguard your expensive GPU operations.
Beyond that, ensure your chosen provider meets all necessary compliance standards for your industry, whether it's GDPR, HIPAA, or SOC 2. Understand where your data will reside and confirm the provider has strong security controls like encryption and proper access management in place. Finally, always clarify the shared responsibility model so you know exactly what security aspects the provider handles versus what falls to you.
Key takeawaysChoosing the right cloud GPU hosting means looking beyond just raw power. It's about picking a provider that meets your specific requirements, delivers strong, flexible server infrastructure, and offers comprehensive tools for integration.
By optimizing costs and prioritizing critical areas like expert support, reliability, and adherence to compliance standards, you ensure your operations run efficiently and without unexpected hitches.
We've featured the best cloud storage.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
There’s growing interest in making AI more practical, especially through techniques like retrieval-augmented generation (RAG). And it’s not just AI developers or enterprise tech teams who see the value. Anyone working with large volumes of information benefits from systems that quickly surface the right reference points.
By retrieving real, relevant information, RAG helps AI stay accurate, current, and context-aware. AWS, for example, highlights RAG as a key way to enrich GenAI with the latest research, data, and updates.
There’s a lot of potential here. But from a mainstream business perspective, even the most advanced RAG-powered systems are often disconnected from the true core of enterprise knowledge: internal documents, workflows, and operational content.
To be truly enterprise-grade, AI must connect directly to the materials that power day-to-day work—contracts, invoices, business reports, onboarding docs, customer records. In other words: your document management (DM) platform.
Analyst momentumIndustry leaders agree that robust document management is foundational for successful enterprise GenAI. Gartner recently noted that GenAI outcomes rely on “relevant, high-quality, and secure information for grounding,” all of which hinge on strong enterprise content foundations.
Bain & Company echoed the point at Nvidia’s 2025 AI Developer Conference, declaring that in every successful AI deployment, “data remains the biggest challenge and the biggest opportunity.” The message is clear: without enterprise-grade content, there is no enterprise-grade AI.
Anyone familiar with enterprise content management (ECM) won’t be surprised. While much of the GenAI conversation focuses on model selection, the real game-changer lies in the data layer—and increasingly, document management is the backbone of that layer.
Modern document management isn’t just about storing or indexing files. It’s about maintaining a live, contextualized, and navigable knowledge graph of an organization’s operational memory. Enterprises have long archived, tagged, and secured content—but today, the documents themselves are more dynamic, and the tools interpreting them are more intelligent and deeply integrated.
Modern DM lets the AI query your dataThat’s because modern business documents can be structured or semi-structured or unstructured, come in multiple formats, and are scattered across diverse systems like ERP, CRM, legal systems, HR systems and email platforms. This complexity demands smarter, more connected approaches to unlock their true value.
This is exactly where AI shines, but only if your documents are accessible, integrated, and well-managed. Strong document management isn’t just a nice-to-have; it’s the foundation for successful and responsible GenAI deployment.
Techniques like RAG deliver the most value when paired with a robust document management system. In fact, RAG is at its most powerful when layered with metadata search, giving users a precise way to drill into their organization’s information space.
No large language model (LLM) is trained on your company’s unique documents, so it can’t deliver truly domain-specific answers on its own. But when you pair RAG with a modern document management platform, AI can query your internal data directly, cite the exact sources, and explain how it arrived at its conclusions. That’s something generic ChatGPT-style systems simply can’t do.
Better context through DMThat’s because RAG combines the generative power of an LLM with real, enterprise-specific data; in this case, your documents, to create a “superhuman search.” Instead of relying solely on pre-trained knowledge, RAG retrieves relevant content from your own knowledge base and injects it into the AI’s response in real time.
The result? Sharper accuracy, fewer hallucinations, and, most importantly, answers grounded in your business reality, not internet generalities. The more organized, contextualized, and accessible your enterprise content is, the more effective your RAG implementation will be. But that value only materializes if your documents are in good shape to begin with.
That’s why mature document management is essential. Rather than chasing monolithic AI platforms, leading enterprises are building modular AI pipelines—combining various AI algorithms for intelligent document understanding with document intelligence, document automation, document collaboration and of course, RAG—anchored by a strong document management foundation.
In this model, document management isn’t a back-office utility. It’s what enables the shift to this superhuman search, where any business user can ask, What are the payment terms on our top five vendor contracts from last year? and get a precise, contextualized answer in seconds.
But none of this works without good data. And in today’s enterprise, that starts with good document management.
AI isn’t wizardry—it depends on strong content foundations. It can’t fix what’s disorganized or hidden. But with the right structure in place, techniques like RAG unlock real value, turning static files into dynamic, intelligent conversations.
In today’s information-saturated world, the ability to transform enterprise content into intelligent conversation is what enables AI to deliver real strategic advantage.
We've featured the best document scanning app.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
- Attackers can build bigger campaigns faster with generative AI
- They're also attacking enterprise agentic AI tools
- Humans are still a major weak point
New research from CrowdStrike confirms that hackers are exploiting AI to help them deliver more aggressive attacks in less time, with the tech also democratizing lesser-skilled hackers to more advanced code.
However, besides this, they're also exploiting the same AI systems that are being used by enterprises – according to CrowdStrike, hackers are targeting the tools used to build AI agents, allowing them to gain access, steal credentials, and deploy malware.
CrowdStrike is most worried about agentic AI systems, suggesting that they've now become a "core part of the enterprise attack surface."
Attackers are honing in on enterprise AIThe security company says it observed "multiple" hackers exploiting vulnerabilities in the tools used to build AI agents, which marks a major shift from patterns of old. Until now, humans have almost always been the primary entry point into a company, but now, CrowdStrike is worried that "autonomous workflows and non-human identities [are] the next frontier of adversary exploitation."
"We’re seeing threat actors use GenAI to scale social engineering, accelerate operations, and lower the barrier to entry for hands-on-keyboard intrusions," Head of Counter Adversary Operations Adam Meyers explained.
Funklocker and SparkCat are two examples of GenAI-built malware in the real world, while DPRK-nexus Famous Chollima has also been observed using generative AI to automate its insider attack program across all phases. Scattered Spider, a group believed to consist of UK and US nationals, even managed to deploy ransomware within 24 hours of accessing systems.
"Adversaries are treating these agents like infrastructure, attacking them the same way they target SaaS platforms, cloud consoles, and privileged accounts," Meyers added.
Still, even though technologies like AI are playing an increasing role in speeding up attacks, CrowdStrike found that four in five (81%) interactive intrusions were malware-free – relying on human hands on keyboards to stay undetected.
You might also like- We've listed the best endpoint protection software
- Consider using the best firewalls for added security
- The AI-powered future of ransomware is coming soon - here's what we need to look out for
We live in a time of great flux, and, true to form, the cybersecurity industry keeps growing in complexity and scope. The AI revolution of the past 2 years has seen many enterprises scrambling to equip security leaders with the tools required to combat an increasingly borderless attack surface, not to mention growing governance and regulatory requirements demanding significant attention.
Few would envy CISOs faced with these circumstances. Still, while change can be challenging to navigate, the current security climate feels like the perfect time to embrace measures that will improve software quality and reduce risk for years to come.
I work with some of the most talented, resilient security professionals on the planet, and many of them are reinforcing their security programs to flex with the contemporary threat landscape, with their development cohorts positioned as the heart of risk reduction and vulnerability elimination.
Here is what they do differently, time and time again.
Developers have precision guidance and the right tools to prioritize securityOne aspect of cybersecurity rarely discussed in depth, is the notion that code-level vulnerabilities are, at their core, a human-driven issue. They are so often perpetuated by poor coding patterns and bad habits that developers have picked up throughout their careers, and these shortcuts can have devastating consequences
Make no mistake: The blame does not lie with the development teams in any organization; it is indeed the fault of the industry as a whole, and our lack of suitable response to their upskilling need.
Bug bounties and security champion programs do go some way in creating security culture pillars within an enterprise, but this is rarely enough on its own. Every day I work with CISOs who are rising above the status quo, and they prioritize an approach that takes developers on the security journey, typically with executive buy-in for these internal programs.
Their developers thrive in an environment where Just-in-Time, relevant learning pathways are emphasized, as are tools complementary to their tech stacks. This helps to break down the significant barriers developers face in contributing meaningfully to organizational security goals, and paves the way for fair security-related KPI outcomes, as well.
They are assessed on security readiness and incentivized to improveIt is rather alarming that today, we live in a world that is essentially powered by software. The recent CrowdStrike outage proved just how easily a bug can bring critical infrastructure to its knees. Despite this, developers do not have a formal security certification or verification process that clears them to work on these vital and often precarious systems the same way an architect or mechanical engineer might.
Security leaders within organizations that are committing to a higher standard of software security resilience are taking steps not just to upskill the development cohort but routinely assess their security readiness. Perhaps a Java developer has proven themselves security-confident, but they want to be deployed on a Ruby-on-Rails project, where the skills may not necessarily translate.
A modernized security program can assess the individual, identify knowledge gaps, and pair that developer with the upskilling required to be successful, ultimately allowing them to expand their career horizons on the job, leading to higher job satisfaction and better security outcomes.
We must get to a place where data-driven insights inform rapid, high-impact company decisions; after all, the cybersecurity industry doesn’t sleep, and threat actors already have an unfair advantage over security leaders struggling with everything from the skills shortage to code monoliths that are an increasing burden within the codebase.
There is an organization-wide focus on software security and qualityOne of the biggest pushes towards higher software security standards has come from CISA’s Secure-by-Design guidelines. This global movement was formed across multiple world governments, including the United States, United Kingdom, Australia, Canada, and Germany.
These guidelines promote the importance of shipping secure software from the start, and seek to establish ultimate ownership of security with software vendors, as opposed to their end-users. This is a significant break from the status quo, but, if executed well, it will assist in reducing cyber risk across the board.
The best security leaders are heeding this call, and pledging their commitment to higher software standards. For most enterprises, success will require a cultural shift that prioritizes role-based security awareness, and ongoing, hands-on support for the development cohort. However, there is no better time to get serious about uplifting internal security programs, and the sooner we do, the sooner we can point to meaningful improvements.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
- From mid-July 2025, there's been an uptick in malicious logins
- Researchers speculate criminals found a zero-day
- Users are advised to strengthen their cybersecurity posture
There is a chance SonicWall SSL VPN devices are carrying a zero-day vulnerability that Akira’s cybercriminals discovered, and are now using in the wild.
As of mid-July this year, cybersecurity researchers Arctic Wolf Labs observed an uptick in malicious logins, all coming through SonicWall SSL VPN instances. Since some of the endpoints were fully patched at the time of the intrusion, the researchers speculate that they might contain a zero-day flaw.
However, they haven’t ruled out the possibility that the attackers just obtained a set of active login credentials from somewhere and used them to gain access.
On the FBI's radarIn any case, organizations that suffered these malicious logins also got infected with the Akira ransomware soon after.
"A short interval was observed between initial SSL VPN account access and ransomware encryption," the researchers explained. "In contrast with legitimate VPN logins which typically originate from networks operated by broadband internet service providers, ransomware groups often use Virtual Private Server hosting for VPN authentication in compromised environments."
Until SonicWall comes forward with a patch, or at least an explanation, businesses using these VPNs are advised to enforce multi-factor authentication (MFA), delete inactive and unused firewall accounts, and make sure their passwords are fresh, strong, and unique.
Akira is a ransomware strain that first appeared in March 2023, targeting businesses across various sectors. It is known for gaining the initial foothold through compromised VPN credentials and exposed services.
The group targets both Windows and Linux systems, and is known for dismantling backups to hinder recovery. As of mid-2025, Akira has been responsible for attacks on hundreds of organizations globally, including Stanford University, Nissan Australia, and Tietoevry. The group usually directs its victims to contact them via a Tor-based website.
The FBI and CISA have issued warnings about its activity, urging organizations to implement stronger network defenses and multifactor authentication.
Via The Hacker News
You might also like- SonicWall tells admins to patch worrying SSLVPN flaw immediately
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers