Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ware Clear Filter

Ransomware gang Hunters International says it’s shutting down

The ransomware gang known as Hunters International announced on its dark web page Thursday that it is shutting down. “After careful consideration and in light of recent developments, we have decided to close the Hunters International project,” the hackers wrote in a post, without clarifying what specific developments it was referring to. “This decision was not made lightly, and we recognize the impact it has on the organizations we have interacted with.” The hackers also said they are offering

Israeli quantum startup Qedma just raised $26 million, with IBM joining in

Despite their imposing presence, quantum computers are delicate beasts, and their errors are among the main bottlenecks that the quantum computing community is actively working to address. Failing this, promising applications in finance, drug discovery, and materials science may never become real. That’s the reason why Google touted the error correction capacities of its latest quantum computing chip, Willow. And IBM is both working on delivering its own “fault-tolerant” quantum computer by 202

Hunters International ransomware shuts down, releases free decryptors

​The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer free decryptors to help victims recover their data without paying a ransom. "After careful consideration and in light of recent developments, we have decided to close the Hunters International project. This decision was not made lightly, and we recognize the impact it has on the organizations we have interacted with," the cybercrime gang says in a

U.S. lifts chip software curbs on China in sign of trade truce

The U.S. government has rescinded its export restrictions on chip-design software to China, three of the largest players in the space announced on Thursday. In separate statements, semiconductor software designers Siemens AG, Synopsys, and Cadence all said they received letters from the U.S. Department of Commerce informing them that the controls had been lifted. While Siemens is based in Germany, its chip design software subsidiary, Siemens EDA, is based in Oregon, U.S. As a result of export

The best laptops of 2025: I've tested dozens of laptops and these are the best ones

Laptops come in a variety of different form factors these days, with manufacturers playing into the different categories to develop an intended use case. For example, lightweight laptops are made to be carried around, and trade in some raw power for portability. 2-in-1 laptops come with touchscreens that allow for use as a tablet. The best form factor for you reflects how you think you'll use the device. Lightweight/ultraportable laptops Made for students, hybrid workers, and anyone who needs

U.S. lifts chip software curbs on China amid trade truce

The U.S. government has rescinded its export restrictions on chip-design software to China, semiconductor software companies Synopsys and Cadence announced Thursday. "Synopsys is working to restore access to the recently restricted products in China," the California-based software maker said in a statement. Its rival, Cadence, confirmed with CNBC that the U.S. Bureau of Industry and Security, which falls under the Department of Commerce, had reversed the export restrictions. "We are in the pr

11 Things I'll Never Put in the Dishwasher Again (and Neither Should You)

Whether you're breaking in a brand-new dishwasher or you've been riding the sudsy automation wave for years, the temptation is real: Just toss it all in and let the machine handle the mess. After all, it's summer -- you've got better things to do than stand over the sink scrubbing spoons. But before you go loading up the racks with wild abandon, it's worth hitting pause. Not everything is built to survive your dishwasher's steamy rinse cycle or turbo-charged dry. In fact, plenty of common kitch

DOJ investigates ex-ransomware negotiator over extortion kickbacks

An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals. The suspect is a former employee of DigitalMint, a Chicago-based incident response and digital asset services company that specializes in ransomware negotiation and facilitating cryptocurrency payments to receive a decryptor or prevent stolen data from being publicly released. The company claims to have conducted over 2,000

New macOS malware targets crypto and Web3 startups with fake Zoom update

North Korean hackers are behind a new and unusually sophisticated macOS malware campaign that targets the crypto industry using fake Zoom invites. Here’s how it works. Dubbed “NimDoor” by researchers at SentinelLabs, the attack is more sophisticated than the typical macOS threat, and it chains together AppleScript, Bash, C++, and Nim to exfiltrate data and maintain access in compromised systems. Here’s SentinelLabs’ executive summary of the hack: DPRK threat actors are utilizing Nim-compiled

NimDoor crypto-theft macOS malware revives itself when killed

North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a previously unseen signal-based persistence mechanism. The attack chain, which involves contacting victims via Telegram and luring them into running a fake Zoom SDK update, delivered via Calendly and email, resembles the one Huntress manag

Evolution of Minimum Viable Product

The Oxford dictionary definition of a Minimum Viable Product (MVP) is: An early, basic version of a product (such as a piece of technology, a computer program, etc.) which meets the minimum necessary requirements for use but can be adapted and improved in the future, esp. after customer feedback; Here's a proposed improved definition: An early, basic version of a product (such as a piece of technology, a computer program, etc.) which meets the minimum necessary requirements for use by its cre

Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones

A security vulnerability in a stealthy Android spyware operation called Catwatchful has exposed thousands of its customers, including its administrator. The bug, which was discovered by security researcher Eric Daigle, spilled the spyware app’s full database of email addresses and plaintext passwords that Catwatchful customers use to access the data stolen from the phones of their victims. Catwatchful is spyware masquerading as a child monitoring app that claims to be “invisible and cannot be

Hexagon fuzz: Full-system emulated fuzzing of Qualcomm basebands

Key takeaways 1. Due to Qualcomm’s proprietary architecture, a lack of security tooling exists around their baseband 2. Our tooling enables research on Hexagon baseband with significantly reduced engineering work 3. We release the first open-source toolchain for full-system emulated Hexagon firmware fuzzing at TROOPERS25 Overview Every phone has a cellular baseband processor to handle mobile communications (5G, 4G, GPS, and more). Qualcomm created a specific architecture for its baseband c

I am not a supplier (2022)

I am not a supplier 31 Dec 2022 - Thomas Depierre For the past few years, we have seen a lot of discussions around the concept of the Software Supply Chain. These discussions started around the time of LeftPad and escalated with multiple incidents in the past few years. The problem of all the work in this domain is that it forgets a fundamental point. Before we get there, I am going to define what is usually meant by Supply Chain and suppliers, why we are applying to software. And then why at

This Year the Squirtle Squad Is the Coolest SDCC Merch Around

July is upon us, and in nerd circles that means only one thing: San Diego Comic-Con is nearly here. And if SDCC is nearly here, then so are oodles of exclusive toys, plushies, and other sweet merchandise you can get your mitts on. We’ve already seen a few of the hottest toys at the convention this year, but today it’s Jazwares’ turn to show you something cool. Real cool. io9 has got your exclusive first look at the whole haul of exclusive items Jazwares will have at SDCC this year, bringing tog

Johnson Controls starts notifying people affected by 2023 breach

Building automation giant Johnson Controls is notifying individuals whose data was stolen in a massive ransomware attack that impacted the company's operations worldwide in September 2023. Johnson Controls is a multinational conglomerate that develops and manufactures industrial control systems, security equipment, HVAC systems, and fire safety equipment for buildings. The company employs over 100,000 people through its corporate operations and subsidiaries across 150 countries, reporting sales

Tesla sends driverless Model Y from factory to customer to promote its robotaxi tech

Just a few days after launching a limited robotaxi service in Austin, Texas, Tesla pulled off an additional stunt meant to show off the progress of its self-driving car software. The company let a Model Y SUV drive roughly 15 miles from Tesla’s factory to the apartment complex where the car’s new owner lives, completing what CEO Elon Musk called the first “autonomous delivery” of a customer car. The vehicle was supposedly equipped with the same software Tesla’s robotaxi Model Ys are using in Au

Next-gen procurement platform Levelpath nabs $55M

Levelpath, a procurement software startup founded by the duo behind Scout RFP, has raised $55 million in Series B funding led by Battery Ventures as the company looks to quadruple its revenue this year. The funding round also saw participation from existing investors, including Benchmark, which led Levelpath’s $14.5 million seed round, and Redpoint, the lead investor in the $30 million Series A round announced in 2023. The startup was founded by Stan Garber and Alex Yakubovich (pictured right)

Challenging the Status Quo to Revolutionize Computer Architecture

An interview with Gurindar Sohi, recipient of the 2025 Computer Pioneer Award Gurindar (Guri) Sohi, Vilas Research Professor, John P. Morgridge Professor, and E. David Cronon Professor of Computer Sciences, Computer Science Department, University of Wisconsin-Madison, Madison, Wis., U.S.A., has remained in the same office at the university since 1987 – almost 40 years. He jokes that it even still has some of its original furnishings, like the carpet. But what he does not make light of is the

Auth for B2B SaaS: it's not like auth for consumer software

Auth for business software (B2B) shouldn’t look the same as auth for consumer software (B2C). In many cases, it actually can’t work the same way. I’ll cover three important buckets of differences between B2B auth and B2C auth: Logical isolation and tenancy models Priorities and trade-offs Protocols and features By the way – let’s use auth loosely here and let it subsume related stuff like user management. Similarly, let’s just imagine away the vague grey area between consumers and businesses

Switzerland says government data stolen in ransomware attack

The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix. The hackers have stolen data from Radix systems and later leaked it on the dark web, the Swiss government says. The exposed data is being analyzed with the help of the country’s National Cyber Security Centre (NCSC) to determine which government agencies are impacted and to what effect. “The foundation Radix has been

Xbox Needs to Get Weirder or Die Trying

Xbox is in a weird place right now, and I’m not the only one who thinks so. In fact, people with more important opinions on the subject than myself seem to agree: if Microsoft doesn’t get its shit together on hardware, the box as we know it is cooked. Laura Fryer, the former director of the Xbox Advanced Technology Group for the original Xbox project back in May 2000 and former executive producer for Microsoft Games Studios up until the Xbox 360 days, put it bluntly in a recent video. “Obviousl

I replaced my work PC with this Dell laptop - now I'm wondering why I waited so long

ZDNET's key takeaways The Alienware 18 Area-51 normally retails for $3,199. It is a gaming laptop that delivers an unbelievable performance thanks to its powerful hardware and equally powerful cooling system. Traveling with the computer will prove difficult because of its weight; you'll also have to pay quite a bit for the system. View now at Dell View now at Best Buy more buying choices Alienware 18 Area-51 is a very fitting name for this computer because it is out of this world. It's a high

Are software professionals truly an endangered species? It's complicated

islander11/Getty Images Industry eyebrows were raised recently at New York Federal Reserve Bank data showing software engineering graduates face higher unemployment rates than art history majors. The unemployment rates for computer engineering and computer science were 7.5% and 6.7% respectively. By contrast, the unemployment rates for art history and social services majors were 3% and 1.7% respectively. Also: The best AI for coding in 2025 (including a new winner - and what not to use) In a

Avira Antivirus Review 2025: Effective Software, But Privacy Protection Is Lacking

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 7.2 / 10 SCORE Avira Antivirus Buy at Avira Score Breakdown Performance 8 /10 Security 7 /10 Customer Support 5 /10 Usability 8 /10 Value 7 /10 Features 8 /10 Pros Free version available Performance-improving tools such as the Software Updater for Windows and Junk Cleaner for MacOS Fast, efficient antivirus scans Cons No identity theft features and minim

I replaced my work PC with this Alienware laptop - now I'm wondering why I hadn't done this sooner

ZDNET's key takeaways The Alienware 18 Area-51 normally retails for $3,199. It is a gaming laptop that delivers an unbelievable performance thanks to its powerful hardware and equally powerful cooling system. Traveling with the computer will prove difficult because of its weight; you'll also have to pay quite a bit for the system. View now at Dell View now at Best Buy more buying choices Alienware 18 Area-51 is a very fitting name for this computer because it is out of this world. It's a high

Many ransomware strains will abort if they detect a Russian keyboard installed (2021)

In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian. So many readers had questions in response to the tweet that I thought it was worth a blog post exploring this one weird cyber defense trick.

Show HN: Octelium – FOSS Alternative to Teleport, Cloudflare, Tailscale, Ngrok

Octelium Table of Contents What is Octelium? Octelium is a free and open source, self-hosted, unified platform for zero trust resource access that is primarily meant to be a modern alternative to remote access VPNs and similar tools. It is built to be generic enough to not only operate as a zero-config remote access VPN (i.e. alternative to OpenVPN Access Server, Twingate, Tailscale, etc...), a ZTNA platform (i.e. alternative to Cloudflare Access, Teleport, Google BeyondCorp, etc...), a sca

Scaling smarter: How enterprise IT teams can right-size their compute for AI

This article is part of VentureBeat’s special issue, “The Real Cost of AI: Performance, Efficiency and ROI at Scale.” Read more from this special issue. AI pilots rarely start with a deep discussion of infrastructure and hardware. But seasoned scalers warn that deploying high-value production workloads will not end happily without strategic, ongoing focus on a key enterprise-grade foundation. Good news: There’s growing recognition by enterprises about the pivotal role infrastructure plays in e

Google quietly introduced precise Bluetooth tracking on the Pixel Watch 3

is a senior reporter who’s been covering and reviewing the latest gadgets and tech since 2006, but has loved all things electronic since he was a kid. With the Wear OS 5.1 update that was released last March, Google quietly introduced a new feature called Channel Sounding for the Pixel Watch 3 that could improve the accuracy of pinpointing the location of other devices using its existing Bluetooth hardware. But while Channel Sounding is now supported by the smartwatch, it’s not yet in use becau