Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Show HN: NativeSwap – Low cost cross-chain swaps without wrappers or bridges

1 Connect Your Wallet Securely connect your preferred wallet (Ctrl, Metamask, or any Web3 wallet) to access your assets across blockchains. Your private keys remain in your control at all times. 2 Select Your Assets Choose your source and destination cryptocurrencies from our extensive list of supported assets. View real-time rates, fees, and estimated transaction times before proceeding with your swap. 3 Confirm Transaction Review the swap details, including exchange rate, fees, and destinati

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

Hundreds of organizations around the world suffered data breaches this week, as an array of hackers rushed to exploit a recently discovered vulnerability in older versions of the Microsoft file-sharing tool known as SharePoint. The string of breaches adds to an already urgent and complex dynamic: Institutions that are longtime SharePoint users can face increased risk by continuing to use the service, just as Microsoft is winding down support for a platform in favor of newer cloud offerings. Mic

Gig Speeds for Every American? Trump FCC Moves to Drop One of the Group’s Most Ambitious Goals

One of the federal government’s most ambitious broadband targets may soon be abandoned. On August 7, the FCC will vote on a proposal to drop its goal of gig speeds for every American. In March last year, the Democratic-led group voted to raise the definition of minimum broadband speeds from 25Mbps download and 3Mbps upload speed to 100/20Mbps. It also set a more ambitious long-term goal of increasing the benchmark to 1,000Mbps download and 500Mbps upload speed. Trump’s pick for FCC chair, Bren

What to know about ToolShell, the SharePoint threat under mass exploitation

Government agencies and private industry have been under siege over the past four days following the discovery that a critical vulnerability in SharePoint, the widely used document-sharing app made by Microsoft, is under mass exploitation. Since that revelation, the fallout and the ever-increasing scope of the attacks have been hard to keep track of. What follows are answers to some of the most common questions about the vulnerability and the ongoing exploitation of it, which collectively is be

Tesla profits pulled down by falling EV sales and regulatory credits

Falling EV sales combined with a lower average selling price, less revenue from regulatory credits, and a decline in solar and energy storage revenue took a toll on Tesla’s bottom line during the second quarter of 2025. And a 17% growth in revenue in its services business, which includes cash generated from its Supercharging network, wasn’t enough to close the gap. The company reported Wednesday revenue of $22.5 billion, a 12% decline from the same period last year. The company’s second quarter

Microsoft fixes three SharePoint zero-day exploits used in series of cyberattacks - how to patch them

Olemedia / Getty Images Microsoft has patched three critical zero-day SharePoint security flaws that have already been exploited by hackers to attack a larger number of vulnerable organizations. Responding to the exploits, the software giant initially issued fixes just for SharePoint Server Subscription Edition and SharePoint Server 2019 and then eventually rolled out a patch for SharePoint Server 2016 as well. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only

Tesla set to report second-quarter earnings after the bell

Elon Musk, chief executive officer of SpaceX and Tesla, attends the Viva Technology conference at the Porte de Versailles exhibition center in Paris, June 16, 2023. Tesla will report second-quarter results after the close of regular trading on Wednesday. Here's what Wall Street expects, according to an average of estimates compiled by LSEG: Earnings per share : 43 cents : 43 cents Revenue: $22.74 billion Revenue in the period is expected to drop 11% from a year earlier, marking a second str

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

Olemedia / Getty Images Microsoft has patched two critical zero-day SharePoint security flaws that have already been exploited by hackers to attack vulnerable organizations. Responding to the exploits, the software giant has issued fixes for SharePoint Server Subscription Edition and SharePoint Server 2019, but is still working on a patch for SharePoint Server 2016. Designated as CVE-2025-53771 and CVE-2025-53770, the two vulnerabilities apply only to on-premises versions of SharePoint, so org

Bitdefender Antivirus Review 2025: CNET's Editors' Choice for Best Antivirus

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 9.5 / 10 SCORE Bitdefender Antivirus $90 at Bitdefender $120 at Walmart Score Breakdown Performance 9 /10 Security 10 /10 Customer Support 9 /10 Usability 10 /10 Value 9 /10 Features 10 /10 Pros Very easy to use Fast scanning Minimal usage of computer processing power and other resources Comprehensive digital footprint visualization Excellent security

US agency responsible for nuclear weapons was breached in Sharepoint hack [U]

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US. Update: Bloomberg reports that the National Nuclear Security Administration was among the organizations breached – see the end of the piece … Microsoft said that there were “active attacks targeting on-premises servers.” US fede

Managing EFI boot loaders for Linux: Controlling secure boot (2015)

Managing EFI Boot Loaders for Linux: Controlling Secure Boot by Rod Smith, [email protected] Originally written: 2/22/2015; last update: 3/4/2023 This Web page is provided free of charge and with no annoying outside ads; however, I did take time to prepare it, and Web hosting does cost money. If you find this Web page useful, please consider making a small donation to help keep this site up and running. Thanks! Donate $1.00 Donate $2.50 Donate $5.00 Donate $10.00 Donate another value

Topics: boot db key keys secure

OSS Rebuild: open-source, rebuilt to last

Today we're excited to announce OSS Rebuild, a new project to strengthen trust in open source package ecosystems by reproducing upstream artifacts. As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers. The project comprises: Automation to derive declarative build definitions for existing PyPI (Python), npm (JS/TS), and Crates.io (Rust) packages. SLSA Provenance for thousan

Microsoft says Chinese hacking groups are behind SharePoint attacks

Some of the attacks that targeted organizations using an exploit in Microsoft’s SharePoint server platform over the last few days have been linked to hacking groups affiliated with the Chinese government, according to a new Microsoft security blog. “As of this writing, Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting these vulnerabilities targeting internet-facing SharePoint servers,” Microsoft said on Tuesday. “In addition, we have obse

US Fairphone OS devs hit back against GrapheneOS security claims

What’s next for Murena, though? Well, the company confirmed that it will be making some improvements: Murena is taking security issues seriously, and our policy about integration of security patches in /e/OS is very comparable to or even better in some cases than many of mobile OS vendors in the smartphone industry. However, as part of our ongoing efforts to continuously improve we have decided to reduce the integration time of monthly security updates in /e/OS. Therefore we’ll progressively u

Tailscale says Zero Trust is broken, and that might be a good thing

Zero Trust has been a buzzword at every enterprise tech conference for years (only recently being replaced with AI), but Tailscale’s new State of Zero Trust 2025 report makes it clear that most organizations still have no idea what it means or how to do it. They surveyed 1,000 IT, security, and engineering leaders. Only 1% of those surveyed said they’re happy with their current access setup. That stat says a lot about the confusion in the marketplace. Some of my favorite gear eufyCam 2C Upgrade

OSS Rebuild: open-source, Rebuilt to Last

Today we're excited to announce OSS Rebuild, a new project to strengthen trust in open source package ecosystems by reproducing upstream artifacts. As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers. The project comprises: Automation to derive declarative build definitions for existing PyPI (Python), npm (JS/TS), and Crates.io (Rust) packages. SLSA Provenance for thousan

Fairphone software devs hit back against GrapheneOS security claims

What’s next for Murena, though? Well, the company confirmed that it will be making some improvements: Murena is taking security issues seriously, and our policy about integration of security patches in /e/OS is very comparable to or even better in some cases than many of mobile OS vendors in the smartphone industry. However, as part of our ongoing efforts to continuously improve we have decided to reduce the integration time of monthly security updates in /e/OS. Therefore we’ll progressively u

Microsoft just upgraded Sentinel with an AI-powered data lake - here's how it works

NurPhoto/Contributor/Getty Microsoft is launching a new agentic AI system to help cybersecurity professionals manage and protect their organizations' data, the company said Tuesday. Microsoft Sentinel, a proprietary Security Incidents and Event Management (SEIM) platform, which debuted in 2019, now comes with a data lake -- that is, a centralized repository that can store structured and unstructured data without any kind of reformatting. Also: Microsoft fixes two SharePoint zero-days under at

The best Apple AirTag accessories for 2025

AirTags can also help you keep track of larger bags and luggage, and you could easily slip one into an interior pocket and call it a day. But if you’d rather hook the tracker to the outside, you’ll need something a bit larger and more flexible than a standard key ring. Belkin’s Secure Holder with Strap is a good option: it comes in different colors and it’s budget friendly at only $13. The case opens up into two pieces, allowing you to sit the AirTag inside the circle and twist and snap the two

Crowdstrike’s massive cyber outage 1-year later: lessons enterprises can learn to improve security

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now As we wrote in our initial analysis of the CrowdStrike incident, the July 19, 2024, outage served as a stark reminder of the importance of cyber resilience. Now, one year later, both CrowdStrike and the industry have undergone significant transformation, with the catalyst being driven by 78 minutes that changed everything. “The first anniv

Global hack on Microsoft Sharepoint hits U.S., state agencies, researchers say

Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack on government agencies and businesses in the past few days, breaching U.S. federal and state agencies, universities, energy companies and an Asian telecommunications company, according to state officials and private researchers. The U.S. government and partners in Canada and Australia are investigating the compromise of SharePoint servers, which provide a platform for sharing and managing d

SecretSpec: Declarative Secrets Management

Announcing SecretSpec: Declarative Secrets Management We've supported .env integration for managing secrets, but it has several issues: Apps are disconnected from their secrets - applications lack a clear contract about which secrets they need - applications lack a clear contract about which secrets they need Parsing .env is unclear - comments, multiline values, and special characters all have ambiguous behavior across different parsers - comments, multiline values, and special characters al

Best Home Security Systems in 2025: Protect Your Home and Your Family

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or one that is professionally installed and monitored. When you consider the equipment, installation, monitoring options and other features you want, you'll probably reach a DIY-versus-pro system decision along the way. Here are some more parameters to

Microsoft Sharepoint server vulnerability puts an estimated 10,000 organizations at risk

A major zero-day security vulnerability in Microsoft's widely used SharePoint server software has been exploited by hackers, causing chaos within businesses and government agencies, multiple outlets have reported. Microsoft announced that it had released a new security patch "to mitigate active attacks targeting on-premises [and not online] servers," but the breach has already effected universities, energy companies, federal and state agencies and telecommunications firms. The SharePoint flaw i

This clever feature from Apple’s next iPad is something Android tablets also need

Aamir Siddiqui / Android Authority TL;DR Apple’s upcoming iPad Pro M5 will reportedly include two front cameras — one on the landscape edge and another on the portrait edge. The change will allow users to better use both portrait and landscape orientations for selfies or calls. Android tablets should also adopt this approach for its practical benefits. Most big launches are done for this year, but we still have two heavyweights to look forward to in the coming months. Google will launch the

10,000+ companies at risk from Microsoft Sharepoint security flaw

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US … Microsoft said that there were “active attacks targeting on-premises servers.” US federal and state agencies are among the organizations said to have been affected. Security researchers cited by Bloomberg said that the vulnerab

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry’s growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking

HPE warns of hardcoded passwords in Aruba access points

Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface. Aruba Instant On Access Points are compact, plug-and-play wireless (Wi-Fi) devices, designed primarily for small to medium-sized businesses, offering enterprise-grade features (guest networks, traffic segmentation) with cloud/mobile app management. The security issue, tracked as CVE-2025-37103 and rated

Microsoft SharePoint zero-day exploited in RCE attacks, no patch available

A critical zero-day vulnerability in Microsoft SharePoint, tracked as CVE-2025-53770, has been actively exploited since at least July 18th, with no patch available and at least 85 servers already compromised worldwide. In May, Viettel Cyber Security researchers chained two Microsoft SharePoint flaws, CVE-2025-49706 and CVE-2025-49704, in a "ToolShell" attack demonstrated at Pwn2Own Berlin to achieve remote code execution. While Microsoft patched both ToolShell flaws as part of the July Patch T

Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack

A PoisonSeed phishing campaign is bypassing FIDO2 security key protections by abusing the cross-device sign-in feature in WebAuthn to trick users into approving login authentication requests from fake company portals. The PoisonSeed threat actors are known to employ large-volume phishing attacks for financial fraud. In the past, distributing emails containing crypto seed phrases used to drain cryptocurrency wallets. In the recent phishing attack observed by Expel, the PoisonSeed threat actors