Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

CISA warns hackers are actively exploiting critical ‘Citrix Bleed 2’ security flaw

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2’ bug

U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to patch their systems. Security researchers have dubbed the bug “Citrix Bleed 2” for its similarity to a 2023 security flaw in Citrix NetScaler, a networking product that large companies and governments rely on for allowing their staff to remotely access apps and other resources on their internal netw

Security Bite: Fake iPhone virus pop-ups have made it on YouTube

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

Bitcoin surpasses $118K, its second all-time high, in less than 24 hours

Bitcoin achieved a new all-time high of $118,900 on Friday after exceeding its previous record, $113,822, on Thursday. At the time of this writing, Bitcoin’s price stands at around $117,400. This is a significant milestone for Bitcoin, as it highlights its resurgence, now higher than its low of around $76,000 in early April. It dropped to nearly $49,000 last August. Some analysts think that if it reaches $150,000, it’ll set off a buying frenzy. It’s important to note that Bitcoin, just like m

My favorite indoor security camera has no subscription fees and is 39% off for Prime Day

ZDNET's key takeaways The Eufy Security Indoor Cam S350 is available for purchase at $130. The S350 indoor camera features dual telephoto and wide-angle lenses with 360-degree motion tracking and optional local storage to avoid monthly fees. The only drawback I've found is that I wish the camera had a button to engage privacy mode manually, but you can schedule it as needed on the app. View now at Amazon The Eufy Security Indoor Cam S350 has no subscription fees and all the privacy settings y

AI chatbot’s simple ‘123456’ password risked exposing personal data of millions of McDonald’s job applicants

In Brief Security researchers found that they could access the personal information of 64 million people who had applied for a job at McDonald’s, in large part by logging into the company’s AI job hiring chatbot with the username and password “123456.” Ian Carroll and Sam Curry wrote in a blog post that “during a cursory security review of a few hours,” they found the password issue and another simple security vulnerability in an internal API, which allowed access to job applicants’ past conve

Alienware's 27-inch 280Hz QD-OLED monitor is now available for $550

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . Alienware has just released a pair of gaming monitors that offer affordability with very few compromises while using Dell's new AW30 design language. Announced earlier this year, the key model is the 27-inch AW2725D 280Hz QD-OLED QHD (2,560 x 1,440) monitor with one of the lowest price

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor

$8.8 trillion protected: How one CISO went from ‘that’s BS’ to bulletproof in 90 days

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat’s exclusive interview with Sam Evans, CISO of Clearwater Analytics, reveals why enterprise browsers are quickly becoming the frontline defense against shadow AI in its many forms. Evans faced a critical challenge in October 2023. Standing before Clearwater Analytics’ board, he had to confront concerns that employees might inadv

The best security cameras for 2025

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . If you're looking to keep an eye on your home, whether you're away for the weekend or just tucked into bed, a good security camera can give you peace of mind. The best security camera setups in 2025 do a lot more than just record footage — they offer smart alerts, crystal-clear video,

PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda. OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recent

Knox lands $6.5M to compete with Palantir in the federal compliance market

While highly sought after, federal software contracts frequently come with a hidden cost: Achieving government SaaS security compliance, known as FedRAMP, can take years and require substantial resources. Achieving this certification typically takes up to three years and costs more than $3 million, covering everything from security operations engineer salaries to security audits, according to Irina Denisenko, CEO of Knox. Denisenko (pictured above, second from left) launched Knox, a federal ma

Multi-Region Row Level Security in CockroachDB

Controlling who can access what data is more important than ever as organizations scale and modernize their data infrastructure. Enterprises are modernizing their critical databases, and they need fine-grained, built-in access controls that go beyond table-level permissions. That’s why, with the 25.2 release of CockroachDB , we’re introducing Row-Level Security — a powerful feature that allows you to define and enforce access policies at the row level, directly within the database. This form o

Bitcoin rises to fresh record above $112,000, helped by Nvidia-led tech rally

The logo of the cryptocurrency Bitcoin can be seen on a coin in front of a Bitcoin chart. Bitcoin hit a fresh record on Wednesday afternoon as an Nvidia -led rally in equities helped push the price of the cryptocurrency higher into the stock market close. The price of bitcoin was last up 1.9%, trading at $110,947.49, according to Coin Metrics. Just before 4:00 p.m. ET, it hit a high of $112,052.24, surpassing its May 22 record of $111,999. The flagship cryptocurrency has been trading in a tig

Try 1Password for free to save $20 (and all your unique passwords) for Prime Day

Using 1Password to remember every username and password that accumulates is easily one of the best quality-of-life improvements you can make in your digital world. In addition to saving all your passwords and secure information, 9to5Mac readers can also try 1Password free for 14 days and take home a $20 credit as a Prime Day exclusive! 1Password is hands-down the best fix for fumbling with passwords because it’s private, cross-platform, and the absolute leader in password management features. 1

Google reveals details on Android’s Advanced Protection for Chrome

Google is sharing more information on how Chrome operates when Android mobile users enable Advanced Protection, highlighting strong security improvements. The tech giant recently extended its Advanced Protection Program to the device level with the release of Android 16, aimed at offering a robust, holistic security posture for high-risk individuals likely to be targeted by sophisticated spyware attacks. Starting Android 16, Advanced Protection can be activated from the settings, strengthening

Perplexity Comet

The Web Should Work For You We believe curiosity is a superpower. It’s the spark that propels humanity forward. Yet, the web—our greatest source of information—was never designed to nurture curiosity; instead we’ve been asked to “browse” it through a one-way lens. That’s why we made Comet. Comet gives curious minds a thought partner for every aspect of online life. Comet moves every tab or task into a simple space for asking more of the world. With Comet, the web becomes a tool of curiosity, h

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

If you want a job at McDonald’s today, there’s a good chance you'll have to talk to Olivia. Olivia is not, in fact, a human being, but instead an AI chatbot that screens applicants, asks for their contact information and résumé, directs them to a personality test, and occasionally makes them “go insane” by repeatedly misunderstanding their most basic questions. Until last week, the platform that runs the Olivia chatbot, built by artificial intelligence software firm Paradox.ai, also suffered fr

Increasingly Paranoid OpenAI Has Installed Fingerprint Scanners and Airgapped Systems to Prevent Secrets Escaping

As the United States embroils itself in a self-inflicted "arms race" with China, tech companies are ratcheting up the paranoia to extreme levels. Take ChatGPT's creator OpenAI, which is reportedly clamping down hard on physical security after it says it was "targeted" by Chinese AI rivals. Per the Financial Times, the company has gone as far as installing fingerprint "biometric access controls" around its offices, as well as electronically-dependent security airlocks, similar to the kind found

iPod Linux (2017)

Welcome to the home of the ! iPodLinux is an open source venture into porting Linux onto the iPod (https://www.apple.com/ipod/). So far, we have successfully ported a customized uClinux (http://www.uclinux.org) kernel to the iPod, and written a simple user interface for it dubbed podzilla. Additional applications and modules have been written, adding many capabilities not found in Apple's firmware. iPodLinux is currently safe to install on 1st, 2nd, and 3rd generation iPods. Software Developmen

ESIM Security

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology. This section of our website presents initial information regarding the project. Notes We broke security of Kigen(*) eUICC card with GSMA consumer certificates installed into it. The eUICC card makes it possible to install the so called eSIM profiles into target chip. eSIM profiles are software representations of mobile subsc

iPod Linux – Linux for Your iPod

Welcome to the home of the ! iPodLinux is an open source venture into porting Linux onto the iPod (https://www.apple.com/ipod/). So far, we have successfully ported a customized uClinux (http://www.uclinux.org) kernel to the iPod, and written a simple user interface for it dubbed podzilla. Additional applications and modules have been written, adding many capabilities not found in Apple's firmware. iPodLinux is currently safe to install on 1st, 2nd, and 3rd generation iPods. Software Developmen

Supabase MCP can leak your entire SQL database

Model Context Protocol (MCP) has emerged as a standard way for LLMs to interact with external tools. While this unlocks new capabilities, it also introduces new risk surfaces. In this post, we show how an attacker can exploit Supabase’s MCP integration to leak a developer’s private SQL tables. The Problem LLMs are often used to process data according to pre-defined instructions. The system prompt, user instructions, and the data context is provided to the LLM as text. [ SYSTEM PROMPT ] You ar

TSA Will Reportedly Let You Keep Your Shoes on at Security Checks

In an age of seemingly endless bad news, there appears to be one positive development to report: you won’t have to take your shoes off at airports anymore. The New York Times reports that the Transportation Security Administration has nixed the rule that requires passengers to remove their shoes while heading through security. The development was first announced by Gate Access, a newsletter that is written by a former TSA officer. The Times says a “source familiar with the matter who spoke on c

Best Indoor Security Cameras for 2025: Tested in Our Own Homes

Google's AI detection remains top-notch. Google/Amazon Field of view Look for views that match the unique needs of your space and where you plan on placing the camera. Most high-quality indoor cameras have around a 130-degree field of view — and some of our picks go beyond that — but you don’t need to break out a protractor. That’s plenty of coverage to get a great view of a room when placed in a corner or centered against a far wall. For the best coverage or to cover multiple angles from a ce

Supabase MCP leaks your entire SQL Database, a lethal trifecta attack

Supabase MCP can leak your entire SQL database (via) Here's yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data back out to an attacker. In this case, General Analysis identify all three components in a single MCP - the Supabase MCP. They imagine a scenario where a developer asks Cursor, running the Supabase MCP, to "use cursor’s agent to list the latest support

TSA to finally end its dumb shoe removal policy for airport security

is transportation editor with 10+ years of experience who covers EVs, public transportation, and aviation. His work has appeared in The New York Daily News and City & State. A key pillar of post-9/11 airport security theater may finally be going away. Multiple outlets are reporting that the Transportation Security Administration will start allowing passengers at a few select airports to keep their shoes on while going through security checkpoints. No longer will we have to gaze upon our fellow

Popular UV Manicure Lamps Might Be Frying Your Skin at the Molecular Level

UV LED nail lamps are very trendy right now, allowing people to quickly wrap up their manicures at the salon or in the comfort of their own home. But it now appears that these products can come at a potentially serious cost. Scientists in Argentina led the study, which examined how the UV dose emitted by a modern manicure lamp affected common skin molecules. They found that just a few minutes of exposure altered these molecules in ways that could be harmful to skin. Though the long-term health

Topics: led manicure nail skin uv

Cybersecurity’s Unsung Heroes: Elevating Neurodiverse Talent in the Digital Age

They aren’t your average hires. They don’t glide through job interviews or thrive in open-plan offices. But when it comes to pattern recognition, threat modeling, or zero-day hunting, neurodiverse individuals often outperform their peers. And yet, they remain largely untapped in the cybersecurity workforce. If we’re serious about fortifying digital defense systems, it’s time we stop overlooking the neurodiverse minds that already think in ways most cybersecurity frameworks are only beginning to

An Unknown Entity Has Voice Cloned the Secretary of State and Is Calling High Level Officials

In a perfect example of why it's an absolutely terrible idea for high-level government officials to use personal cell phones, text messaging platforms, and apps like Signal, secretary of state Marco Rubio has fallen victim to a scammer who's been using AI to clone his voice and writing style. As the Washington Post reports, a July 3 State Department cable revealed that an impostor posing as Rubio had "contacted at least five non-Department individuals, including three foreign ministers, a US go