proxy

Tech Optimizer
March 24, 2026
Gold Lapel has introduced a PostgreSQL proxy that enhances database query performance by acting as an intermediary between applications and PostgreSQL databases. The proxy monitors live queries, identifies issues, and implements optimizations such as creating materialised views, introducing various index types, and rewriting queries. It supports over ten optimization strategies, seven programming languages, four frameworks, and three ORMs, and is available for Linux, macOS, Windows, and Docker. The software includes features like prepared statement caching, in-memory result caching, connection pooling, automatic read replica routing, and security measures including TLS. An observability layer provides a live web dashboard and audit timeline. The pricing model is USD 9 per month per instance, with a site license available for unlimited instances. Gold Lapel has also released a 19-chapter technical book on PostgreSQL performance optimization. The company was founded by Stephen Gibson and is based in San Francisco.
Winsage
March 18, 2026
The latest update for Copilot has transformed it into a WebView-based application, marking it as a hybrid app rather than fully native. The new Copilot (version 146.0.3856.63) operates as a web application, evidenced by multiple sub-processes in the Task Manager that are characteristic of Microsoft Edge. The version number of Copilot aligns closely with that of Microsoft Edge. The revamped Copilot functions as a web app within a desktop shell but loads content from copilot.microsoft.com. Despite its web-based nature, it performs comparably to its native predecessor and launches more quickly. Microsoft had previously announced a "native" version of Copilot, which was misleading as it still relied on web components. In 2025, Microsoft began distributing a truly native Copilot app, free of web components, which started in March 2025. However, the Copilot has now reverted to a web-based format for users in the Windows Insider Program, with plans to extend this change to non-Insiders soon.
AppWizard
March 11, 2026
A newly identified Android malware called BeatBanker disguises itself as a Starlink application on fake Google Play Store websites. It functions as a banking trojan and includes Monero mining capabilities, allowing it to steal credentials and manipulate cryptocurrency transactions. Researchers at Kaspersky traced BeatBanker to campaigns targeting users in Brazil. The latest version uses the BTMOB RAT for remote access, enabling keylogging, screen recording, camera access, GPS tracking, and credential capture. BeatBanker is distributed as an APK file that decrypts and loads hidden code into memory, conducting environment checks before activation. It presents a fake Play Store update screen to trick users into granting permissions for additional payloads. To avoid detection, it delays malicious operations and plays a nearly inaudible MP3 file to maintain persistent activity. The malware uses a modified version of the XMRig miner to mine Monero on Android devices, connecting to mining pools through encrypted TLS connections. It can start or stop mining based on device conditions and uses Firebase Cloud Messaging to relay device information to its command-and-control server. Currently, BeatBanker infections have only been observed in Brazil, but there are concerns about its potential spread. Users are advised to avoid side-loading APKs from untrusted sources and to review app permissions regularly.
AppWizard
March 11, 2026
Advanced Browsing Protection (ABP) in Messenger enhances user privacy by warning users about potentially harmful links shared in end-to-end encrypted communications. It analyzes links using on-device models and a dynamic watchlist of millions of potentially malicious sites, utilizing cryptographic techniques to maintain user privacy. ABP is based on a cryptographic primitive called private information retrieval (PIR), which minimizes the information a server learns from client queries. The system also employs oblivious pseudorandom functions (OPRFs) and manages URL queries through a privacy-preserving URL-matching scheme. The server groups links by domain, allowing clients to request a single bucket for domain-specific path components, and generates a ruleset to balance bucket sizes. To safeguard client queries, AMD's SEV-SNP technology creates a confidential virtual machine (CVM) that processes hash prefixes securely, generating attestation reports for integrity verification. The use of Oblivious RAM and Oblivious HTTP (OHTTP) enhances privacy by preventing exposure of memory access patterns and stripping identifying information from client requests. The lifecycle of an ABP request includes pre-processing phases where the server updates the URL database and computes rulesets, followed by client requests that involve calculating bucket identifiers, sending encrypted requests through a proxy, and checking for unsafe URLs based on server responses.
Tech Optimizer
March 1, 2026
Users are increasingly focused on the effectiveness of their security software alongside the number of streaming services they use. Leading VPN providers are responding by offering comprehensive packages that combine VPN capabilities with antivirus features. Surfshark has introduced Surfshark One, which integrates its VPN service with proprietary antivirus software. This solution is designed to provide a comprehensive cybersecurity experience within a single application. To access the antivirus feature, users must subscribe to the Surfshark One plan, which offers quick and full scans, customizable scanning options, and scheduled scans. Detected threats are quarantined and deleted after 60 days. The antivirus includes Cloud Protect for continuous defense against malware, updating its database every three hours, and provides 24/7 malware protection. Surfshark One also includes additional tools such as Alternative ID for safeguarding user information, Surfshark Alert for notifications about compromised sensitive information, and Surfshark Search for ad-free browsing. Surfshark's VPN offers access to over 4,500 servers and supports unlimited devices. Surfshark One differs from other VPN packages by providing essential tools for post-compromise care and customizable security settings. Competitors like ExpressVPN and NordVPN offer tiered pricing structures with advanced security features in higher-tier plans. To acquire Surfshark One, users can visit the Surfshark website and choose from various subscription plans. The cost difference between the Surfshark Starter plan and Surfshark One is minimal, with Surfshark One starting at .49 per month. Surfshark One+ includes additional features like personal data removal and identity theft coverage. Only a few providers currently offer both VPN and antivirus capabilities, including Surfshark, Private Internet Access, and CyberGhost.
AppWizard
January 31, 2026
Google has dismantled the IPIDEA residential proxy network, which had exploited millions of devices for cybercrime. This operation resulted in the liberation of approximately nine million Android devices and the removal of hundreds of compromised applications. IPIDEA's infrastructure was integrated into various software development kits (SDKs), allowing it to covertly enlist devices into its proxy pool. Google updated its Play Protect system to identify and eliminate affected applications and collaborated with partners to disrupt the network's underlying systems. The efforts led to a significant decrease in hijacked devices available for exploitation.
Tech Optimizer
January 26, 2026
AlloyDB for PostgreSQL is a fully managed database service designed for enterprise workloads, combining PostgreSQL's strengths with Google Cloud technology for enhanced performance, scalability, and availability. A new feature, managed connection pooling, addresses the challenges of inefficient database connection management, which can lead to performance degradation, resource exhaustion, and reliability issues. Managed connection pooling maintains a cache of active database connections, allowing applications to reuse connections instead of creating new ones for each request, thus reducing latency and resource consumption. This feature is tightly integrated into AlloyDB, simplifying operations and optimizing performance and security. It offers two configurable pooling modes: transaction mode, which maximizes reuse for short transactions, and session mode, which maintains a connection for the entire session. Enabling managed connection pooling can increase transactions per minute by up to five times, support over three times more concurrent connections, decrease connection latency, and improve reliability during traffic spikes. UKG, a provider of HR solutions, has adopted this feature to enhance the performance and scalability of their applications. To enable managed connection pooling, users can activate it in the Google Cloud console and connect applications using standard PostgreSQL drivers to the designated port.
Winsage
December 18, 2025
A newly identified cyber threat cluster called LongNosedGoblin has been linked to cyber espionage attacks targeting governmental entities in Southeast Asia and Japan, with activities traced back to at least September 2023. The group uses Group Policy to spread malware and employs cloud services like Microsoft OneDrive and Google Drive for command and control. Key tools include NosyHistorian, NosyDoor, NosyStealer, NosyDownloader, and NosyLogger, which perform functions such as collecting browser history, executing commands, and logging keystrokes. ESET first detected LongNosedGoblin's activities in February 2024, identifying malware on a governmental system. The attacks showed a targeted approach, with specific tools affecting select victims. Additionally, a variant of NosyDoor was found targeting an organization in an EU country, indicating a possible connection to other China-aligned threat groups.
Search