Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Palo Alto Networks stock falls 8% after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell more than 8% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock dipped about 2%. Palo Alto CEO and chair

Nightfall launches ‘Nyx,’ an AI that automates data loss prevention at enterprise scale

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Nightfall AI launched the industry’s first autonomous data loss prevention platform Wednesday, introducing an AI agent that automatically investigates security incidents and tunes policies without human intervention — a breakthrough that could reshape how enterprises protect sensitive information in an era of expanding cyber threats. The S

AI vs. AI: Prophet Security raises $30M to replace human analysts with autonomous defenders

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Prophet Security, a startup developing autonomous artificial intelligence systems for cybersecurity defense, announced Tuesday it has raised $30 million in Series A funding to accelerate what its founders describe as a fundamental shift from human-versus-human to “agent-versus-agent” warfare in cybersecurity. The Menlo Park-based company’s

The Tea App Data Breach: What Happened, and What Was Exposed

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings, suffered a major security breach last week. The company confirmed Friday that it "identified authorized access to one of our systems" that exposed thousands of user images. And now we know that DMs were accessed during the breach, too. Tea's preliminary findings from the end of last week showed the data breach exposed approximately 72,000 images: 13,000 images of selfies and photo identification that peo

Trump caving on Nvidia H20 export curbs may disrupt his bigger trade war

The next front in Donald Trump's trade war will be chip tariffs—which could come by next month—but national security experts are warning that the president may have already made a huge misstep that threatens to disrupt both US trade and national security. In a letter Monday to Department of Commerce Secretary Howard Lutnick, 20 policymakers and professionals with a background in national security policy urged Trump to reverse course and block exports of Nvidia's H20 chips to China. In April, t

Google won’t say if UK secretly demanded a backdoor for user data

The U.K. government is reportedly backing down from its earlier demand that Apple builds a secret backdoor allowing its authorities access to customer data worldwide, following a harsh rebuke from the U.S. government. But one U.S. senator wants to know if other tech giants, like Google, have also received secret backdoor demands from the U.K. government, and Google has so far refused to say. Earlier this year, The Washington Post reported that the U.K. Home Office sought a secret court order i

What's the Difference Between Megabits and Megabytes? Here's What You Need to Know

Knowing how your home internet works may rely on understanding these two key terms: Megabits and Megabytes. Internet terminology is often maddeningly confusing. Case in point: Megabits and megabytes. Both refer to units of digital information, but the difference is subtle enough to cause plenty of confusion. Knowing the difference between the two terminologies can make all the difference when picking out an internet plan or figuring out how quickly you can download a file. Don’t worry -- we’ll c

Trump’s cybersecurity cuts putting nation at risk, warns New York cyber chief

During the first few months of the new Trump administration, the White House slashed cybersecurity budgets, staff, and initiatives. And some, including cybersecurity experts and legislators, are not happy about it. One of them is Colin Ahern, the chief cyber officer for the state of New York. In a recent interview with TechCrunch, Ahern said that both he and New York Governor Kathy Hochul are worried that the Trump administration’s cuts to cybersecurity are putting the country at risk. “We wor

Here are the eight Apple security layers protecting your data

9to5Mac is brought to you by Incogni: Protect your personal info from prying eyes. With Incogni, you can scrub your deeply sensitive information from data brokers across the web, including people search sites. Incogni limits your phone number, address, email, SSN, and more from circulating. Fight back against unwanted data brokers with a 30-day money back guarantee. Apple has a reputation for prioritizing the privacy of its customers, and that commitment begins right at the chip design level.

Microsoft Is Giving Windows 10 Users Free Security Updates for a Year, but There's a Catch

As Microsoft gets ready to sunset Windows 10, security support is scheduled to end in October. You can get a one-year extended security update for $30. But if you want to stick with Windows 10 for another year, you might be better off with Microsoft's free option -- you'll just need to use cloud backup and connect it with your OneDrive account. The ability to get free updates on Windows 10 is a pretty big deal because it is still the most widely used Windows OS, accounting for just over 53% of

The Useless UseCallback

28.07.2025 — React, JavaScript, useCallback, Performance — 5 min read #1: The Uphill Battle of Memoization #2: The Useless useCallback I thought I'd written enough about memoization by now, but I feel there is one pattern I'm seeing a lot lately that makes me think otherwise. So today, I want to look at useCallback , and to some extent useMemo , in situations where I think they are totally pointless. Why memoize? There's usually only two reasons to create a memoized version of a function wi

Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data

Attackers could use a recently patched macOS vulnerability to bypass Transparency, Consent, and Control (TCC) security checks and steal sensitive user information, including Apple Intelligence cached data. TCC is a security technology and a privacy framework that blocks apps from accessing private user data by providing macOS control over how their data is accessed and used by applications across Apple devices. Apple has fixed the security flaw tracked as CVE-2025-31199 (reported by Microsoft'

New York state cyber chief calls out Trump for cybersecurity cuts

During the first few months of the new Trump administration, the White House slashed cybersecurity budgets, staff, and initiatives. And some, including cybersecurity experts and legislators, are not happy about it. One of them is Colin Ahern, the chief cyber officer for the state of New York. In a recent interview with TechCrunch, Ahern said that both he and New York Governor Kathy Hochul are worried that the Trump administration’s cuts to cybersecurity are putting the country at risk. “We wor

Amazon's AI coding assistant exposed nearly 1 million users to potential system wipe

A hot potato: Earlier this month, a hacker compromised Amazon's generative AI coding assistant, Amazon Q, which is widely used through its Visual Studio Code extension. The breach wasn't just a technical slip, rather it exposed critical flaws in how AI tools are integrated into software development pipelines. It's a moment of reckoning for the developer community, and one Amazon can't afford to ignore. The attacker was able to inject unauthorized code into the assistant's open-source GitHub rep

‘Talamasca: The Secret Order’ Lures You Deeper Into the World of ‘Interview With the Vampire’

Vampires, witches, and demons, beware: the Talamasca, a secret group that fans of Interview With the Vampire will already have an inkling about, has you under surveillance. But can the watchers themselves be trusted? The first teaser trailer for Talamasca: The Secret Order, AMC’s latest show in its Anne Rice Immortal Universe, suggests that even those on the inside should definitely watch their backs. The trailer heavily features a very blonde Elizabeth McGovern doing her best to recruit Nichol

I Asked Crime Experts When Home Break-Ins Usually Happen and the Answers Stunned Me

Modern home security cameras and smart systems are well-equipped to watch over our homes -- I should know, I've spent years testing more models than I can count. The biggest advantage is that they can watch your home when you're not there, like on a summer vacation or asleep at night. But when is your home the most vulnerable? I took a look. It turns out that burglars tend to break into houses or look for vulnerabilities at a few specific times. Knowing when can help you stay safer and pick the

The best password managers for Android of 2025: Expert tested

Bitwarden consistently features as one of my top password manager recommendations across numerous platforms, and Android is no different. Why we like it: With Bitwarden, you can sync unlimited credentials across as many devices as you want for free, so it's easy to access your logins, credit cards, identities, and notes wherever you need them. Saving and autofilling work well in mobile apps and browsers via biometric unlock with your fingerprint or face. Review: Bitwarden Bitwarden is open so

Amazon AI coding agent hacked to inject data wiping commands

A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code. Amazon Q is a free extension that uses generative AI to help developers code, debug, create documentation, and set up custom configurations. It is available on Microsoft’s Visual Code Studio (VCS) marketplace, where it counts nearly one million installs. As reported by 404 Media, on July 13, a hacker using the alias ‘lkmanka58’ added unapproved code on

Tea App Breach Exposes 72,000 Selfies, ID Photos and Other User Images

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Tea App Users' Faces and IDs Reportedly Posted to 4chan in Security Breach

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Tea App Users' Faces and IDs Reportedly Posted to 4chan in Security Breach

Tea, a women's safety dating app that surged to the top of the free iOS App Store listings this week, has been the subject of a major security breach. The company confirmed Friday that it has "identified authorized access to one of our systems" that exposed thousands of user images. According to Tea's preliminary findings, the breach allowed access to approximately 72,000 images, broken down into two groups: 13,000 images of selfies and photo identification that people had submitted during acco

Earth’s Unusual Rapid Spin Could Prompt First-Ever ‘Negative Leap Second’

The Earth has been spinning unusually fast recently. Last year on July 4, our planet set a record by completing a full spin 1.66 milliseconds (0.00166 seconds) faster than usual, according to timeanddate.com. One year later, on July 10, 2025, Earth completed a daily rotation that scientists estimate was 1.36 milliseconds faster than usual, giving us another particularly short day. Other shorter (but ever-so-slightly longer) days occurred on July 9 and July 22, although the exact margins have yet

New Koske Linux malware hides in cute panda images

A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. Researchers from cybersecurity company AquaSec analyzed Koske and described it as "a sophhisticated Linux threat." Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks. Koske’s purpose is to deploy CPU and

Microsoft: SharePoint flaws exploited in Warlock ransomware attacks

A China-based hacking group is deploying Warlock ransomware on Microsoft SharePoint servers vulnerable to widespread attacks targeting the recently patched ToolShell zero-day exploit chain. Non-profit security organization Shadowserver is currently tracking over 420 SharePoint servers that are exposed online and remain vulnerable to these ongoing attacks. "Although Microsoft has observed this threat actor deploying Warlock and Lockbit ransomware in the past, Microsoft is currently unable to co

OpenAI prepares to launch GPT-5 in August

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Earlier this year, I heard that Microsoft engineers were preparing server capacity for OpenAI’s next-generation GPT-5 model, arriving as soon as late May. After some additional testing and delays, sources familiar with OpenAI’s plans tell me that GPT-5 is now expected to launch as early as next month. OpenAI CEO Sam Altman recently revealed on X that “we are releasing GPT-5 so

Some VMware perpetual license owners are unable to download security patches

Some VMware perpetual license holders are currently unable to download security patches, The Register reported today. The virtualization company has only said that these users will receive the patches at “a later date,” meaning users are uncertain how long their virtualization environments will be at risk. Since Broadcom bought VMware and ended perpetual license sales in favor of bundled subscription-based SKUs, some organizations have opted against signing up for a subscription and are running

Microsoft fixes SharePoint zero-day exploits used in cyberattacks and ransomware - how to patch them

Kiryl Pro motion / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that hackers have already exploited to attack more vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019, and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE‑2025‑53771 and CVE‑2025‑53770, the two vulnerabilities apply only to on‑premis

OpenAI prepares to launch GPT-5 in August

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Earlier this year, I heard that Microsoft engineers were preparing server capacity for OpenAI’s next-generation GPT-5 model, arriving as soon as late May. After some additional testing and delays, sources familiar with OpenAI’s plans tell me that GPT-5 is now expected to launch as early as next month. OpenAI CEO Sam Altman recently revealed on X that “we are releasing GPT-5 so

Microsoft: SharePoint servers also targeted in ransomware attacks

A China-based hacking group is deploying Warlock ransomware on Microsoft SharePoint servers vulnerable to widespread attacks targeting the recently patched ToolShell zero-day exploit chain. Non-profit security organization Shadowserver is currently tracking over 420 SharePoint servers that are exposed online and remain vulnerable to these ongoing attacks. "Although Microsoft has observed this threat actor deploying Warlock and Lockbit ransomware in the past, Microsoft is currently unable to co

SecurityPal combines AI and experts in Nepal to speed enterprise security questionnaires by 87X or more

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now When a tech vendor wants to sell into a large enterprise — or when that enterprise wants to buy software from a tech vendor or AI model provider — each side may be required by the other to prove they will handle shared data responsibly in the form of mandatory surveys and questionnaires. Regulations such as GDPR, the soon-to-be effected EU