Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

Red team AI now to build safer, smarter models tomorrow

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Editor’s note: Louis will lead an editorial roundtable on this topic at VB Transform this month. Register today. AI models are under siege. With 77% of enterprises already hit by adversarial model attacks and 41% of those attacks exploiting prompt injections and data poisoning, attackers’ tradecraft is outpacing existing cyber defenses.

Google services are experiencing a partial outage

Users have also reported issues with Spotify, Discord, Snapchat and more. Update: At about 2:30PM ET, Google posted that "All product impacts except Google Meet have recovered. Google engineers continue to work on full mitigation." However, reports of issues have remained high for some other platforms. Original story: Google reported disruptions to several of its services today. According to the company's app status page, Gmail, Google Calendar, Google Chat, Google Cloud Search, Google Docs,

Frequent reauth doesn't make you more secure

Frequent reauth doesn't make you more secure You're happily working away, fingers flying, deep in flow, and suddenly, boink, your session has expired. You sigh, re-enter your password (again), complete an MFA challenge (again), maybe approve an email notification (again), and finally — access restored. Until next time. This wasn't so bad when it was just passwords; we all got pretty fast at retyping our passwords. But all those MFA challenges really slow us down. And MFA fatigue attacks, a gro

Microsoft fixes first known zero-click attack on an AI agent

TL;DR: Microsoft has patched a critical zero-click vulnerability in Copilot that allowed remote attackers to automatically exfiltrate sensitive user data simply by sending an email. Dubbed "EchoLeak," the security flaw is being described by cybersecurity researchers as the first known zero-click attack targeting an AI assistant. EchoLeak affected Microsoft 365 Copilot, the AI assistant integrated across several Office applications, including Word, Excel, Outlook, PowerPoint, and Teams. Accordin

Can You Legally Record Audio or Video on Your Security Camera? I Focus on These Rules

If you're thinking about installing a new security camera in your home, a legal question appears: Is it legal for you to record audio and video anywhere you want in your home? Are there limitations or the possibility of lawsuits from your neighbors? This is something I've thought about a lot as I've tested security cameras in all parts of my home for years. Owners must know when and where it's legal to record everything from their front yard and streets to friends, babysitters, and pet sitters.

Conveyor uses AI to automate the painful process of vendor security reviews and RFPs with AI

Selling software to companies is such a time-consuming process. Even after customers are convinced a product is right for their organization, they still need to ensure the software meets all their security requirements. Chas Ballew realized just how painfully slow and tedious the vendor security and compliance review process was when he was running Aptible, a hosting platform for healthcare companies that he co-founded in 2013. “What we saw was that every time one of our customers was trying to

Two exploits are threatening Secure Boot, but Microsoft is only patching one of them

Facepalm: Microsoft and the PC industry developed the Secure Boot protocol to prevent modern UEFI-based computers from being hacked or compromised during the boot process. However, just a few years later, the technology is plagued by a steady stream of serious security vulnerabilities. Cybercriminals are currently having a field day with Secure Boot. Security experts have uncovered two separate vulnerabilities that are already being exploited in the wild to bypass SB's protections. Even more co

Microsoft Edge now offers secure password deployment for businesses

Microsoft announced that a new Edge feature allowing employees to share passwords more securely in enterprise environments has reached general availability. Known as secure password deployment, this feature will be available to Microsoft Edge for Business users starting this week, minimizing the risk of unauthorized access by ensuring that employees don't accidentally share passwords with unintended recipients. The feature is available for Microsoft 365 Business Premium, E3, and E5 subscriptio

The hunt for Marie Curie's radioactive fingerprints in Paris

The hunt for Marie Curie's radioactive fingerprints in Paris 3 days ago Share Save Sophie Hardach Share Save Edouard Taufenbach and Bastien Pourtout (Credit: Edouard Taufenbach and Bastien Pourtout) Marie Curie worked with radioactive material with her bare hands. More than 100 years after her groundbreaking work, Sophie Hardach travels to Paris to trace the lingering radioactive fingerprints she left behind. The Geiger counter starts flashing and buzzing as I hold it against the 100-year-ol

Security Service Edge(SSE): Powering the Modern Hybrid Workplace

The way we work has fundamentally shifted. Hybrid models, where employees split their time between the office and remote locations, are no longer a niche trend but a widespread reality. This evolution offers numerous benefits, including increased flexibility and improved work-life balance. However, it also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Securi

Think before you click: Experts warn email "Unsubscribe" links pose security risks

In a nutshell: A common rule of thumb advises unsubscribing from commercial emails if they are annoying or outright spam. However, some experts caution against this advice, as clicking the "unsubscribe" button can expose users to additional risks and security issues. According to TK Keanini, CTO at DNSFilter, the "click to unsubscribe" option found at the bottom of many commercial emails can become a security risk over time. Users often click these links blindly in an attempt to stop the flood

‘Generative AI helps us bend time’: CrowdStrike, Nvidia embed real-time LLM defense, changing how enterprises secure AI

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Generative AI adoption has surged by 187% over the past two years. But at the same time, enterprise security investments focused specifically on AI risks have grown by only 43%, creating a significant gap in preparedness as AI attack surfaces rapidly expand. More than 70% of enterprises experienced at least one AI-related breach in the pa

iOS 26 tells you how long it will take for your iPhone battery to finish charging

iPhone battery settings get a nice update in iOS 26, including a new intelligent battery saver mode called Adaptive Power. The iPhone will also now track extra battery stats, like your average power consumption throughout the day. But perhaps the most notable enhancement is that the iPhone can now tell you exactly how long it will take for your battery to charge. Right at the top of your lock screen, when plugged in to power, your phone will now show the estimated time to charge until it hits 8

ConnectWise rotating code signing certificates over security concerns

ConnectWise is warning customers that it is rotating the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise RMM executables over security concerns. Digital certificates are used to sign executables so those downloading the files know they come from a trusted source. This ensures that code has not been tampered with before it reaches the end user. According to ConnectWise, the decision was taken after a third-party security researcher raised conc

Patch your Windows PC now before bootkit malware takes it over - here's how

Elyse Betters Picaro / ZDNET Windows users who don't always install the updates rolled out by Microsoft each month for Patch Tuesday will want to install the ones for June. That's because the latest round of patches fixes a flaw that could allow an attacker to control your PC through bootkit malware. Designated as CVE-2025-3052, the Secure Boot bypass flaw is a serious one, according to Binarly security researcher Alex Matrosov, who discovered the vulnerability. In a Binarly blog post publishe

Switch 2 Blows Past Records to Reach 3.5 Million Sales in Just 4 Days

Tyler Lacoma Editor / Home Security For more than 10 years Tyler has used his experience in smart home tech to craft how-to guides, explainers, and recommendations for technology of all kinds. From using his home in beautiful Bend, OR as a testing zone for the latest security products to digging into the nuts and bolts of the best data privacy guidelines, Tyler has experience in all aspects of protecting your home and belongings. With a BA in Writing from George Fox and certification in Technic

Senators Warn DOGE’s Social Security Administration Work Could Break Benefits

Democratic senators have concerns that the so-called Department of Government Efficiency (DOGE) could break the Social Security Administration’s tech infrastructure. In a new letter addressed to SSA commissioner Frank Bisignano, senators Elizabeth Warren and Ron Wyden say that DOGE’s plans to “hastily upgrade” Social Security IT systems could disrupt the delivery of benefits or result in mass data losses. The warning comes after WIRED reported in March that DOGE officials were planning to rebui

Security Bite: Apple’s push for chip independence will benefit device security the most

Since the launch of the M-series processors and now the C1 cellular modem, Apple has been slowly but surely moving toward complete chip independence. The company is even working on its own Bluetooth and Wi-Fi solution, which is reportedly coming with new Home products and the iPhone 17 lineup in the Fall. One obvious benefit of developing chips in-house is energy efficiency. Apple toated this with the introduction of Apple Silicon what feels like a hundred years ago, and this week with its firs

DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online

When the so-called Department of Government Efficiency recently fired dozens of people from the US Digital Service—the agency DOGE subsumed last month—it may not have realized the extent of the collateral damage. The USDS doesn't operate in a vacuum; part of its longtime mandate is to consult with federal agencies to help improve their digital platforms and websites. So when DOGE terminated Jonathan Kamens in its agency purge, it may not have fully grasped that it was firing the security lead f

Apple pulls data protection tool after UK government security row

Apple pulls data protection tool after UK government security row 12 minutes ago Zoe Kleinman • @zsk Technology editor Getty Images Apple is taking the unprecedented step of removing its highest level data security tool from customers in the UK, after the government demanded access to user data. Advanced Data Protection (ADP) means only account holders can view items such as photos or documents they have stored online through a process known as end-to-end encryption. But earlier this month th

Coinbase says Trump’s SEC has ended its enforcement case against the crypto company

Coinbase says that the SEC has agreed to end an enforcement case that accused it of illegally running an unregistered securities exchange. This could signal a major change in how the US government will enforce the crypto market now that Trump is in office. The lawsuit, which was filed during the Biden administration , has long-been considered an attempt to bring the crypto industry under the same investor-protection rules that govern stocks and other securities. Coinbase had been fighting the l

CISA flags Craft CMS code injection flaw as exploited in attacks

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns that a Craft CMS remote code execution flaw is being exploited in attacks. The flaw is tracked as CVE-2025-23209 and is a high severity (CVSS v3 score: 8.0) code injection (RCE) vulnerability impacting Craft CMS versions 4 and 5. Craft CMS is a content management system (CMS) used for building websites and custom digital experiences. Not many technical details about CVE-2025-23209 are available, but exploitation isn't easy,

Hacker steals record $1.46 billion from Bybit ETH cold wallet

Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one of its ETH cold wallets. "The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated through a sophisticated attack that masked the signing interface, displaying the correct address while altering the underlying smart contract logic," Bybit explained. "As a result, the attacker was ab

If COBOL is so problematic, why does the US government still use it?

Matthew Busch for The Washington Post via Getty Images Some people think tens of millions of dead people are collecting Social Security checks. That's not true. What's really going on is people don't understand its old, underlying technology. The saga of 150-year-old Social Security recipients is a tale that intertwines aging technology, government systems, and modern misunderstandings by the youthful Department of Government Efficiency (DOGE) IT people. At the heart of this story lies COBOL,

Apple pulls data protection tool after UK government security row

Apple pulls data protection tool after UK government security row 10 minutes ago Zoe Kleinman • @zsk Technology editor Getty Images Apple is taking the unprecedented step of removing its highest level data security tool from customers in the UK, after the government demanded access to user data. Advanced Data Protection (ADP) means only account holders can view items such as photos or documents they have stored online through a process known as end-to-end encryption. But earlier this month th

Apple Says ‘No’ to UK Backdoor Order, Will Disable E2E Cloud Encryption Instead

Good work, Britain. Owners of Apple devices in the United Kingdom will be a little less safe moving forward as the company pulls its most secure end-to-end (E2E) encryption from the country. The move is in response to government demands there that Apple build a backdoor into its iCloud encryption feature that would allow law enforcement to access the cloud data of any iPhone user around the world. Apple has for many years marketed its products as being the most safe and secure personal electron

Invisible, autonomous and hackable: The AI agent dilemma no one saw coming

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here. Generative AI poses interesting security questions, and as enterprises move into the agentic world, those safety issues increase. When AI agents enter workflows, they must be able to access sensitive data and documents to do their job — making them a significant risk for many security-minded enterprises. “The rising use of multi-agent

AI vs. endpoint attacks: What security leaders must know to stay ahead

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here. Enterprises run the very real risk of losing the AI arms race to adversaries who weaponize large language models (LLMs) and create fraudulent bots to automate attacks. Trading on the trust of legitimate tools, adversaries are using generative AI to create malware that doesn’t create a unique signature but instead relies on fileless exe