Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: war Clear Filter

UK government wants ransomware victims to report breaches so it can carry out ‘targeted disruptions’ against hackers

The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible. On Tuesday, the U.K.’s interior ministry, the Home Office, published a proposal with the aim of changing the British government’s strategy to counter ransomware. Among the three key proposals is a reporting requirement, which would aid authorities in identifying and disrupting hacking operati

Towards A Unified Quantum Platform

Since its conception in the 1980s, quantum computing (QC) has presented academia and industry with numerous challenges as the technology has scaled. While QC systems have grown exponentially, with qubit numbers per system increasing from single digits to more than a thousand, a byproduct of this growth is a fragmented software and hardware ecosystem that makes further progress more difficult. Researchers have recently addressed this issue by creating a unified software and hardware platform to s

CISA and FBI warn of escalating Interlock ransomware attacks

CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks. Today's advisory was jointly authored with the Department of Health and Human Services (HHS) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) and it provides network defenders with indicators of compromise (IOCs) collected during investigations of incidents as recent as June 2025, along with mitigation meas

UK government wants ransomware victims to report cyberattacks so it can disrupt the hackers

The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible. On Tuesday, the U.K.’s interior ministry, the Home Office, published a proposal with the aim of changing the British government’s strategy to counter ransomware. Among the three key proposals is a reporting requirement, which would aid authorities in identifying and disrupting hacking operati

Microsoft says Chinese hacking groups exploited SharePoint vulnerability in attacks

Microsoft CEO Satya Nadella speaks during an event commemorating the 50th anniversary of the company at Microsoft headquarters in Redmond, Washington, on April 4, 2025. Microsoft Corp., determined to hold its ground in artificial intelligence, will soon let consumers tailor the Copilot digital assistant to their own needs. Microsoft on Tuesday said Chinese hacking groups were part of the recent attacks on its SharePoint collaboration software. As early as July 7, the Chinese nation-state actor

UK to ban public sector orgs from paying ransomware gangs

The United Kingdom's government is planning to ban public sector and critical infrastructure organizations from paying ransoms after ransomware attacks. The list of entities that would have to follow the new proposed legislation includes local councils, schools, and the publicly funded National Health Service (NHS). "Ransomware is estimated to cost the UK economy millions of pounds each year, with recent high-profile ransomware attacks highlighting the severe operational, financial, and even l

What will become of the CIA?

In December, 1988, as the Soviet Union was beginning to come apart, Senator Bill Bradley, a member of the Senate Select Committee on Intelligence, convened a closed-door hearing with several of the C.I.A.’s top Soviet experts. These were analysts, not operatives. They did not run spies or weapons, or shoot poisoned darts at people; mostly, they sat at their desks at Langley, reading Pravda or studying photographs of Soviet military parades. The hearing found them in a melancholy mood, pondering

I replaced my work PC with this Dell laptop, and it was one of my best decisions

Alienware 18 Area-51 Laptop ZDNET's key takeaways The Alienware 18 Area-51 retails for $3,199. It is a gaming laptop that delivers an unbelievable performance thanks to its powerful hardware and equally powerful cooling system. Traveling with the computer will prove difficult because of its weight; you'll also have to pay quite a bit for the system. View now at Dell View now at Best Buy more buying choices Alienware 18 Area-51 is a very fitting name for this computer because it is out of this

What Will Become of the CIA?

In December, 1988, as the Soviet Union was beginning to come apart, Senator Bill Bradley, a member of the Senate Select Committee on Intelligence, convened a closed-door hearing with several of the C.I.A.’s top Soviet experts. These were analysts, not operatives. They did not run spies or weapons, or shoot poisoned darts at people; mostly, they sat at their desks at Langley, reading Pravda or studying photographs of Soviet military parades. The hearing found them in a melancholy mood, pondering

Kevin Feige Unveils Some of the MCU’s Big Next Moves

The grind never stops at Marvel Studios, and Kevin Feige has gone and revealed some juicy nuggets about what is and isn’t to come in the MCU. The longtime producer recently talked to press about Marvel’s next moves, and he was naturally asked about Blade. We’re now on the six-year anniversary of Mahershala Ali being announced for the role, and he recently told press to pester Marvel about the film’s infamously troubled production. To Deadline and other outlets, Feige confirmed that yes, there h

Installing apps on Linux? 4 ways it's different than any other OS - and mistakes to avoid

Elyse Betters Picaro / ZDNET When I first started using Linux in the late 90s, there was really only one way to install an application. You would download the app, unpack the archive, run the ./configure command, build the app with make, and then install it with make install. Inevitably, when you ran through that course, you would stumble because of dependencies and have to locate the dependency, run through the same process as you just did (only with the new software), and then find out the ne

Java was not underhyped in 1997 (2021)

Java Criminally Underhyped? Not Back in 1997. Earlier today, a fun little moment of Twitter serendipity alerted me to an article by Jackson Roberts, a computer science student at the University of Colorado, entitled “Java is criminally underhyped”. It’s a really interesting article, and Jackson’s observations correlate with a lot of my own thinking about languages and platforms, although I am squarely in the .NET / CLR camp on that particular front. But Jackson ends his article: I am curious

Warframe's The Old Peace Expansion Revealed: A Perilous Trip to Tau Unfolds Soon

Warframe's last few updates have been a narrative tour de force through time and space, weaving together disparate threads from the far-flung past of the year 1999 and the fairytale void-dimension of Duviri. Core to these expansions is the conflict with the Eldritch threat known only as the Indifference. As it comes closer to piercing the veil of our reality and escaping the void, it's up to the Tenno to navigate lost memories -- rediscovering forgotten allies, a peace that was doomed to fail a

How to design an actually good flash flood alert system

Flash floods have wrought more havoc in the US this week, from the Northeast to the Midwest, just weeks after swollen rivers took more than 130 lives across central Texas earlier this month. Frustrations have grown in the aftermath of that catastrophe over why more wasn’t done to warn people in advance. Local officials face mounting questions over whether they sent too many or sent too few mobile phone alerts to people. Some Texans have accused the state of sending out too many alerts for injur

Section 174 is reversed, mostly

Hi, this is Gergely with a bonus, free issue of the Pragmatic Engineer Newsletter. In every issue, I cover Big Tech and startups through the lens of senior engineers and engineering leaders. Today, we get into one out of four topics from last week’s The Pulse issue, which full subscribers received seven days ago. If you’ve been forwarded this email, you can subscribe here. Since early 2024, a tax change in the US named “Section 174” has been plaguing tech companies in the country. It was introd

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

The UK National Cyber Security Centre (NCSC) has formally attributed ‘Authentic Antics’ espionage malware attacks to APT28 (Fancy Bear), a threat actor already linked to Russia’s military intelligence service (GRU). The NCSC revealed in a detailed technical analysis of the Authentic Antics malware dated May 6th that it is stealing credentials and OAuth 2.0 tokens that allow access to a target's email account. The malware was observed in use in 2023 and runs inside the Outlook process and produ

RealPage goes from setting rent to collecting it

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. RealPage, the algorithmic rent-setting software company, has announced plans to acquire Livble, a service that lets people pay their monthly rent in installments. Livble describes itself as a “flexible” rent payment solution. Renters can split payments into up to four installments throughout the month. The service bills itself as helping tenants “a

The Laws That Changed the Jedi and Republic Forever

“For a over a thousand generations, the Jedi Knights were the guardians of peace and justice in the Old Republic,” Obi-Wan Kenobi tells Luke Skywalker in A New Hope. In the decades of Star Wars storytelling since, countless tales have fleshed out that connection between the Galactic Republic and the Jedi Order’s service of it, from its highest highs to the lows that tore them both apart in the fires of the Empire’s rise. But while a thousand generations span much of the unseen ancient history o

New Phobos ransomware decryptor lets victims recover files for free

The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with BleepingComputer confirming that it successfully decrypts files. Phobos is a ransomware-as-a-service operation that launched in December 2018, enabling other threat actors to join as affiliates and utilize their encryption tool in attacks. In exchange, any ransom payments were split between the affiliate and the operators. While the ransomware operation did not receiv

In the long run, GPL code becomes irrelevant (2015)

I wrote this in response to a comment thread on hackernews Defending GCC considered futile. There's been a megathread in the last week about whether Emacs should support LLVM, with Richard Stallman and now Eric Raymond joining the frey. Personally, I use a BSD license for all my code and contribute to BSD/Apache licensed software whenever I can. I do it because I think opensource will eventually eat the world anyway, and I think when it does a BSD/Apache implementation of any given piece of sof

WhatsApp should prepare to stop operating in Russia, official says

A Russian lawmaker who regulates the IT industry said WhatsApp should prepare to stop offering its services in the country. Anton Gorelkin, the deputy head of the lower house of parliament's IT committee, said that it's very likely that WhatsApp will be placed on a list of restricted software, as Reuters reports. WhatsApp owner Meta is designated as an extremist organisation in Russia, which has banned Facebook and Instagram since 2022. This week, President Vladimir Putin issued a directive for

NordPass vs. Bitwarden: Which password manager is best?

Password managers are essential tools for creating and securely storing login credentials and other sensitive data you want to have at your fingertips. There are plenty of solid password management solutions on the market, so it can be difficult to know which combination of features, cost, and user experience is best for your situation. In our head-to-head comparison of NordPass and Bitwarden, the former gets our vote for its top-notch interface and privacy-focused features, while Bitwarden is

Daisy Ridley’s Husband Cast in Adaptation of Former Reylo ‘Star Wars’ Fan Fiction

The behind-the-scenes story of an upcoming romantic comedy could, on its own, be a pretty fascinating movie. Here’s the pitch. A young Star Wars fan writes a piece of Reylo (that’s Rey and Kylo Ren for the non-shippers out there) alternative universe fanfiction. The fan is approached about turning the story into a novel, only, it can’t be specific to Star Wars anymore. So the names change, but the intention and romance stay the same. That book becomes a smash hit bestseller, Hollywood comes call

Google's Nest Aware Just Got Pricier. Here's How Much It'll Cost You

Subscribers to Google's Nest Aware smart home system can expect a price increase starting next month. The basic Nest Aware monthly subscription will increase from $8 per month to $10 per month. The Nest Aware Plus subscription will increase from $15 per month to $20 per month. The price increase will go into effect whenever your next bill on or after Aug. 15 arrives, according to the email. It could also go into effect after your promotional period, if you currently have a special limited-time

GitHub abused to distribute payloads on behalf of malware-as-a-service

Researchers from Cisco’s Talos security team have uncovered a malware-as-a-service operator that used public GitHub accounts as a channel for distributing an assortment of malicious software to targets. The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise networks that rely on the code repository for the software they develop. GitHub removed the three accounts that hosted the malicious payloads shortly after being notified

Microsoft Teams voice calls abused to push Matanbuchus malware

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. Matanbuchus is a malware-as-a-service operation seen promoted on the dark web first in early 2021. It was advertised as a $2,500 Windows loader that executes malicious payloads directly in memory to evade detection. In June 2022, threat analyst Brad Duncan reported that the malware loader was being used to deliver Cobalt Strike beacons in a large-scale