Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: logs Clear Filter

Adding OR logic forced us to confront why users preferred raw SQL

Where This Story Begins In 2022, we had three different query interfaces. Logs had a custom search syntax with no autocomplete. Traces only had predefined filters - no query builder at all. Metrics had a raw PromQL input box where you'd paste queries from somewhere else and hope they worked. Each system spoke a different language. An engineer debugging a production issue had to context-switch not just between data types, but between entirely different mental models of how to query data. When

Keeping secrets out of logs (2024)

Keeping Secrets Out of Logs tl;dr: There's no silver bullet, but if we put some "lead" bullets in the right places, we have a good shot at keeping sensitive data out of logs. "This is the blog version of a talk I gave at LocoMocoSec 2024. It’s mostly a lightly edited transcript with some screenshots, so if you’d prefer, you can watch the "This is the blog version of a talk I gave at LocoMocoSec 2024. It’s mostly a lightly edited transcript with some screenshots, so if you’d prefer, you can wat

Blogs used to be different

Blogs used to be very different. 06 Sep, 2025 I saw someone earlier post about how intrusive it felt to read a personal blog post. They made a point that folks like them who have grown up on short form microblogging like Twitter and Tumblr have a big leap to make when reading longer form blogposts. Not sure how many folks have that same issue but from the blogs I've read in the last decade, there has been a huge shift in content. Ten years ago if you were blogging on Tumblr or Wordpress you w

Show HN: Gonzo – A Go-based TUI for log analysis (OpenTelemetry/OTLP support)

Gonzo - The Go based TUI for log analysis A powerful, real-time log analysis terminal UI inspired by k9s. Analyze log streams with beautiful charts, AI-powered insights, and advanced filtering - all from your terminal. See it in action Main Dashboard Stats and Info Everyone loves a heatmap ✨ Features 🎯 Real-Time Analysis Live streaming - Process logs as they arrive from stdin, files, or network - Process logs as they arrive from stdin, files, or network OTLP native - First-class support

Topics: ai gonzo log logs model

Okta open-sources catalog of Auth0 rules for threat detection

Okta has open-sourced ready-made Sigma-based queries for Auth0 customers to detect account takeovers, misconfigurations, and suspicious behavior in event logs. Auth0 is Okta's identity and access management (IAM) platform used by organizations for login, authentication, and user management services. By releasingg the detection rules, the company aims to help security teams quickly analyze Auth0 logs for suspicious activity that could indicate intrusion attempts, account takeovers, the creation

Obsidian is too much for me, so I switched to this free alternative

Tushar Mehta / Android Authority I take a LOT of notes, and in pursuit of the most promising solution, I have tried note-taking apps such as Evernote and OneNote, dabbled with celebrated knowledge management systems like Notion, and even tried to wrap my head around the infinite possibilities of Obsidian. But the overwhelming number of entry fields in these apps has prevented me from relying on them consistently. Time and again, I have found myself returning to simpler remedies, such as Google

From terabytes to insights: Real-world AI obervability architecture

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Consider maintaining and developing an e-commerce platform that processes millions of transactions every minute, generating large amounts of telemetry data, including metrics, logs and traces across multiple microservices. When critical incidents occur, on-call engineers face the daunting task of sifting through an ocean of data to unravel

OpenAI offers 20 million user chats in ChatGPT lawsuit. NYT wants 120 million.

OpenAI is preparing to raise what could be its final defense to stop The New York Times from digging through a spectacularly broad range of ChatGPT logs to hunt for any copyright-infringing outputs that could become the most damning evidence in the hotly watched case. In a joint letter Thursday, both sides requested to hold a confidential settlement conference on August 7. Ars confirmed with the NYT's legal team that the conference is not about settling the case but instead was scheduled to set

Proton fixes Authenticator bug leaking TOTP secrets in logs

Proton fixed a bug in its new Authenticator app for iOS that logged users' sensitive TOTP secrets in plaintext, potentially exposing multi-factor authentication codes if the logs were shared. Last week, Proton released a new Proton Authenticator app, which is a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android, and iOS. The app is used to store multi-factor authentication TOTP secrets that can be used to generate one-time passcodes for authenticatio

When root meets immutable: OpenBSD chflags vs. log tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

Show HN: Timep – a next-gen profiler and flamegraph-generator for bash code

timep timep is an efficient and state-of-the-art trap-based time profiler for bash code. timep generates a per-command execution time profile for the bash code being profiled. As it generates this profile, timep logs command runtimes+metadata hierarchically based on both function and subshell nesting depth, mapping and recreating the complete full call-stack tree for the bash code being profiled. BUILTIN FLAMEGRAPH GENERATOR: One standout feature of timep is that, in addition to the time profi

Judge Rules That Newspaper Is Allowed to Search Through Users' ChatGPT Logs

Amid its long-running copyright infringement lawsuit against OpenAI, the paper of record will soon have access to all of OpenAI's user archives — including the stuff that was deleted. As Ars Technica reports, the federal judge presiding over the lawsuit by the New York Times against OpenAI has granted the newspaper and its co-plaintiffs, the New York Daily News and the Center for Investigative Reporting, access to the AI company's logs to see exactly how much copyright was infringed. In its pr

Judge Says Requiring ChatGPT to Save Chat Logs Is Not a ‘Mass Surveillance Program’

OpenAI and some of its users have objected to a court order that requires the company to indefinitely maintain all of ChatGPT’s chat logs as part of an ongoing copyright lawsuit, claiming that holding onto such records amounts to a “nationwide mass surveillance program.” The court was not moved. Judge Ona Wang, who initially issued the order to retain all data from the popular chatbot, rejected multiple requests to overturn the decision—though OpenAI has vowed to continue to fight the order, acc

A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims

A trove of chat logs allegedly belonging to the Black Basta ransomware group has leaked online, exposing key members of the prolific Russia-linked gang. The chat logs, which include over 200,000 messages spanning from September 18, 2023, to September 28, 2024, were shared with threat intelligence company Prodaft by a leaker. The cybersecurity firm says the leak comes amid “internal conflict” within the Black Basta group after some members allegedly failed to provide its victims with functional

Obscura VPN – Privacy that's more than a promise

Unlike VPNs with a “no-logs” policy, Obscura is provably private by design. Even “no-logs” VPNs see both your identity and your internet activity, meaning you have to blindly trust their pinky-promise for privacy. This is exactly why some privacy-conscious folks will tell you not to use a VPN at all. Obscura is different – we never see your decrypted internet packets. It’s simply impossible for us to log your internet activity, even if we were compelled to, or if our servers were compromised.