Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

Unexpected security footguns in Go's parsers

In Go applications, parsing untrusted data creates a dangerous attack surface that’s routinely exploited in the wild. During our security assessments, we’ve repeatedly exploited unexpected behaviors in Go’s JSON, XML, and YAML parsers to bypass authentication, circumvent authorization controls, and exfiltrate sensitive data from production systems. These aren’t theoretical issues—they’ve led to documented vulnerabilities like CVE-2020-16250 (a Hashicorp Vault authentication bypass found by Goog

ClickHouse scales beyond 100 petabytes of logs

TLDR # Observability at scale: Our internal system grew from 19 PiB to 100 PB of uncompressed logs and from ~40 trillion to 500 trillion rows. Efficiency breakthrough: We absorbed a 20× surge in event volume using under 10% of the CPU previously needed. OTel pitfalls: The required parsing and marshalling of events in OpenTelemetry proved a bottleneck and didn’t scale - our custom pipeline addressed this. Introducing HyperDX: ClickHouse-native observability UI for seamless exploration, correlatio

​​How to Become a Backyard Naturalist With Just Your Smartphone

In the early days of summer, backyards come to life. Warmer temperatures transform spring buds into lush greenery, coax insects from their winter slumber, and invite newborn animals to explore their surroundings on wobbling legs or wings. With smartphones, documenting this emerging wildlife has never been easier. These days, all the tools you need to become a backyard naturalist fit right in the palm of your hand. And while June is an especially good time to start, you can use your phone to obs

Israel Says Iran Is Hacking Security Cameras for Spying

Amid Israeli airstrikes this week and the imminent threat of further escalations by the United States, Iran started severely limiting internet connectivity for its citizens, limiting Iranians' access to crucial information and intentionally pushing them toward domestic apps that may not be secure. Meanwhile, the Israel-tied hacking group known as Predatory Sparrow is waging cyberwar on Iran’s financial system, attacking Iran’s Sepah Bank and destroying more than $90 million in cryptocurrency hel

Samsung Embeds IronSource Spyware App on Phones Across WANA

In recent months, we have received numerous reports from users across West Asia and North Africa (WANA) expressing alarm over a little-known but deeply intrusive bloatware application—AppCloud—pre-installed on Samsung’s A and M series smartphones. Without users’ knowledge or consent, this bloatware collects sensitive personal data, cannot be removed without compromising device security, and offers no clear information about its privacy practices. AppCloud, developed by the controversial Israeli

I Dropped the Production Database on a Friday Night

How I Dropped the Production Database on a Friday Night The case for moving fast and breaking things (before your competitors kill you) The worst 7PM in my software engineering career Picture this: It's a Friday evening in Paris, and I'm wrapping up what should have been a routine week at Joe AI, the real-estate startup where we were building an AI agent that automated communications for property developers across France. I had just finished what I thought was a clean migration: moving our en

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

NASA Aircraft Set to Perform Wild Low-Altitude Stunts Around These U.S. Cities

NASA is getting ready to fly two planes over mid-Atlantic states and parts of California, where they will be carrying out special maneuvers at a close distance while collecting valuable data about our changing planet. The two research aircraft, named P-3 Orion (N426NA) and a King Air B200 (N46L), are set to fly over Baltimore, Philadelphia, the Virginia cities of Hampton, Hopewell, and Richmond, in addition to the Los Angeles Basin, Salton Sea, and Central Valley, according to NASA. The flights

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That's an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of H

Billions of login credentials have been leaked online

NEW YORK (AP) — Researchers at cybersecurity outlet Cybernews say that billions of login credentials have been leaked and compiled into datasets online, giving criminals “unprecedented access” to accounts consumers use each day. According to a report published this week, Cybernews researchers have recently discovered 30 exposed datasets that each contain a vast amount of login information — amounting to a total of 16 billion compromised credentials. That includes user passwords for a range of p

16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

A Python-first data lakehouse

“Good design is actually a lot harder to notice than poor design, in part because good designs fit our needs so well that the design is invisible”. Donald A. Norman, The Design of Everyday Things. Data and ML scientists - A life in the middle Despite AI eating the world and data becoming one of the most important things for every company on the planet, but getting models from prototype to production is still pretty problematic. According to HBR , fewer than 1 in 5 models ever make it into prod

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. DDoS attacks flood targets with massive amounts of traffic with the sole aim to overwhelm servers and create service slowdowns, disruptions, or outages. This new attack, which is 12% larger than the previous record, delivered a massive data volume of 37.4 TB in just 45 seconds. This is the equivalent of about 7,500 hours of HD streaming o

Are 16 billion compromised passwords really part of a newly discovered data breach?

A hot potato: Researchers have reportedly discovered a massive, unprecedented archive containing billions upon billions of compromised user credentials. Dubbed the "Mother of All Breaches," the archive has sparked debate among experts about the true significance of this newly uncovered trove. According to UN sources, the world population surpassed eight billion people in 2022. Now, Cybernews reporters claim they have uncovered a new record-breaking data breach exposing 16 billion passwords link

How to clear your Android phone cache (and why you should do it before installing Android 16)

Elyse Betters Picaro / ZDNET Google recently released Android 16 to Pixel devices and select OEMs, bringing performance improvements, new Material You changes, and more upgrades. If you want to try this update but are hesitant because you've noticed your Android phone or tablet already feels too sluggish, clearing app and browser caches can give it a fresh boost and free up some storage space. Over time, cached data can accumulate, become corrupted, or simply get outdated, which may slow down

Do you use mobile data while connected to Wi-Fi? It’s complicated.

Robert Triggs / Android Authority When it comes to smartphones, the common sentiment is that your Wi-Fi network will always take precedence over your mobile connection. In other words, those with data caps generally don’t have to worry about mobile data being consumed during lengthy Wi-Fi sessions. But is this always true? Generally, yes, but the situation is slightly more complicated than you might think. There are indeed a few reasons your phone could end up using mobile data even when connec

Topics: data fi mobile turn wi

184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach

JuSun/Getty Images Yet another data breach has exposed passwords and other sensitive information – but this one is a whopper. Cybersecurity researcher Jeremiah Fowler revealed his discovery of a massive online database containing more than 184 million unique account credentials, in a report published late last month. Usernames, passwords, emails, and URLs for a host of applications and websites, including Google, Microsoft, Apple, Facebook, Instagram, and Snapchat, among others, were stored in

RaptorCast: Designing a Messaging Layer

RaptorCast: Designing a Messaging Layer ‍ In Proof of Stake blockchains, a pre-determined leader typically proposes a block of transactions at each round. The propagation of this block to all validators is one of the most challenging and time-consuming steps in the consensus protocol. In this blog post, we examine RaptorCast, a solution designed to address the following considerations: Performance - a block proposal needs to be sent quickly to the rest of the network Security - each recipien

No, the 16 billion credentials leak is not a new data breach

News broke today of a "mother of all breaches," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks. To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials. Instead, these stolen credentials were likely circulating for some time,

Security may not be exciting, but AWS proves it's essential

Editor's take: If I'm being totally honest, it's difficult to get excited about improved security capabilities in the tech world. I know they're incredibly important and absolutely essential to keep everything functional in today's cyberthreat-filled world. But it's kind of like thinking about insurance – not much fun. On top of that, by necessity, security updates need to be released at a rate that's as fast (or even faster) than the latest technological innovations in order to keep bad actors

Finding Dead Websites

As some of the work planned for Marginalia Search this year has been progressing a bit faster than anticipated, there was time to implement an unplanned change. This post details the implementation of a system for detecting when servers are online, to avoid serving dead links and improve data quality, and for detecting when websites have significant changes including ownership transfers and parking. Table Of Contents Feature Rationale Availability detection is useful not just for filtering o

In-Memory C++ Leap in Blockchain Analysis

Real-Time, Court-Admissible Crypto Intelligence at 1/400th the Cost of Inferior Legacy Systems The explosion of blockchain data isn’t just a challenge; it’s a crisis for conventional analytics. Financial institutions, investigators, and law enforcement agencies are hamstrung by tools that are too slow, expensive, and built on legacy database technologies incapable of keeping pace. Critical insights are missed, opportunities vanish, and illicit activities remain obscured by systems that offer on

A staggering 16 billion logins exposed in epic data breach, including Apple accounts

Security researchers have discovered what they describe as “one of the largest data breaches in history,” comprising a staggering 16 billion logins, which include Apple accounts (formerly known as Apple IDs). The researchers said that the stolen data gives cybercriminals “unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing” … You may recall a report last month that Apple login credentials were among a massive database

Krispy Kreme says November data breach impacts over 160,000 people

U.S. doughnut chain Krispy Kreme confirmed that attackers stole the personal information of over 160,000 individuals in a November 2024 cyberattack. The American multinational coffeehouse chain employed 22,800 people in 40 countries as of December 2023 and operates 1,521 shops and 15,800 points of access. It also manages four "Doughnut Factories" in the United States and 37 others internationally, and it partners with McDonald's to have its products sold in thousands of McDonald's locations wo

Everything You Should Know About Enhanced Visual Search on Your iPhone

Apple announced at its Worldwide Developers Conference on June 9 that the next version of the iPhone operating system is called iOS 26. The tech giant said iOS 26 will bring a transparent glass design to icons and menus, the Camera and Photos apps will get redesigned interfaces and much more to iPhones. But when Apple released iOS 18 in September 2024, it included a feature called Enhanced Visual Search, and some people online have voiced privacy concerns about the feature. Read more: Everythin

Citizen science illuminates the nature of city lights

The Nachtlichter app was developed within a project called Nachtlicht-BüHNE (Citizen-Helmholtz Network for research on night light phenomena)5, using a co-design process in which academic and citizen scientists met regularly over a several year period. Our co-design process, app methodology, site selection, systematic variability of the observations, data pre-processing and data structure have already been described in detail5. This section therefore briefly covers the data and validation and fo

T-Mobile Data Breach Settlement Checks Are Arriving: Here's the Scoop

Check your bank account lately? Is there an unexpected deposit from a company you don't recognize? It could be the money you're due from T-Mobile's 2022 class-action settlement. Those who qualify were told to expect settlement checks in April, but then that was moved to May. And now, in mid-June, as cited by Android Authority, Reddit users are saying they are seeing money in their bank accounts. Some are saying they received $56, but others are reporting amounts as high as $375. The account the

Smart TV OS owners face “constant conflict” between privacy, advertiser demands

StreamTV Insider provided flights from New York City to Denver and two nights of accommodation so Ars could attend its StreamTV Show. Ars does not accept paid editorial content. DENVER—Most smart TV operating system (OS) owners are in the ad sales business now. Software providers for budget and premium TVs are honing their ad skills, which requires advancing their ability to collect user data. This is creating an “inherent conflict” within the industry, Takashi Nakano, VP of content and program

Topics: ad data smart streamtv tv

Spatializing 6k years of global urbanization from 3700 BC to AD 2000

Transcription Chandler’s book includes population data from 2250 BC to AD 1975 in various charts and tables. The book contains 656 9×5.5 inch pages and is divided into multiple sections, including Sources and Methods, Continental Tables and Maps (highlighting locations of major cities as illustrated in Fig. 4), Data Sheets for Ancient Cities (the main tables of the book shown in Fig. 1), Tables of the World’s Largest Cities, and Whereabouts of Unfamiliar Cities. Each page in the Data Sheets for

OpenAI drops Scale AI as a data provider following Meta deal

OpenAI is phasing out its work with Scale AI and cutting ties with the data provider following Meta’s deal with the startup, an OpenAI spokesperson told Bloomberg on Wednesday. Sarah Friar, the chief financial officer of OpenAI, previously suggested the company would continue its work with Scale AI. Now, it appears OpenAI has changed its tone. OpenAI said it was already winding down its work with Scale AI ahead of Meta’s announcement last week that it was investing billions of dollars in the s

Topics: ai data meta openai scale