Cybersecurity researchers at Check Point today disclosed details of two recently patched potentially dangerous vulnerabilities in Microsoft Azure services that, if exploited, could have allowed hackers to target several businesses that run their web and mobile apps on Azure. —Mohit Kumar

The WireGuard virtual private networking (VPN) protocol is coming to the Linux kernel, much to the delight of Linux creator Linus Torvalds. —Jack Wallen

Monoliths are the future because the problem people are trying to solve with microservices doesn’t really line up with reality. Just to be honest – and I’ve done this before, gone from microservices to monoliths and back again. Both directions. —Kelsey Hightower

The cellular carriers are in full 5G marketing mode. If you believe the TV commercials, you’d now think that the country is blanketed by 5G, as each cellular carrier claims a bigger coverage area than their competitors. However, almost all of their claims are marketing hype. What’s the reality of 5G coverage in 2020? —Doug Dawson

Given the level of public interest in Ethos’ acquisition of Public Interest Registry (“PIR”) from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. —Nora Abusitta-Ouri

Most of us, when we go to a website and see the little lock at the top of the browser, don’t think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. —Anthony Rutkowski

A new version of RawCap has been released today. This portable little sniffer now supports writing PCAP data to stdout and named pipes as an alternative to saving the captured packets to disk. We have also changed the target .NET Framework version from 2.0 to 4.7.2, so that you can run RawCap on a modern Windows OS without having to install a legacy .NET Framework. —Erik Hjelmvik

The server processor market has gotten a lot more crowded in the past several years, which is great for customers and which has made it both better and tougher for those that are trying to compete with industry juggernaut Intel. And it looks like it is going to be getting a little more crowded with several startups joining the potential feeding frenzy on Intel’s Xeon profits. —Timothy Prickett Morgan

What is your information security program defending? This is a deceivingly difficult question for most. When I ask this at typical organizations, the answer is often disheartening. The standard response is “everything.” The word everything causes my skepticism radar to start chirping like a Chernobyl Geiger counter. —Kevin Kurzawa

In the last decade, we’ve witnessed the global expansion of AI, largely in an algorithm — Deep Learning — coupled with Big Data. Deep Learning and Big Data excel at tasks like visual object recognition. Once difficult AI problems like recognizing faces in photos became easier so companies like Google and Facebook began offering AI-powered photo recognition services. Suddenly “the machine” could spot pictures of your friends and you and suggest new groups, new tags, or — hey! — a new conversation.