Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: security Clear Filter

Whistleblower claims DOGE uploaded Social Security data to unsecure cloud server

(Wesley Lapointe for The Washington Post via Getty Images) The Social Security Administration’s (SSA) chief data officer, Charles Borges, has filed a whistleblower complaint alleging that members of the Department of Government Efficiency (DOGE) uploaded a copy of a key Social Security database to an unsecured cloud environment in June, the New York Times reported. This may have exposed the personal information of hundreds of millions of Americans. The complaint alleges that under the authority

DOGE uploaded live copy of Social Security database to ‘vulnerable’ cloud server, says whistleblower

A top Social Security Administration official turned whistleblower says members of the Trump administration’s Department of Government Efficiency (DOGE) uploaded hundreds of millions of Social Security records to a vulnerable cloud server, putting the personal information of most Americans at risk of compromise. Charles Borges, the Social Security Administration’s chief data officer, said in a newly released whistleblower complaint published Tuesday that other top agency officials signed off on

Beyond GDPR security training: Turning regulation into opportunity

By Eirik Salmi, System Analyst at Passwork Even though 88% of businesses spend over €1 million on GDPR compliance and 40% invest up to €10 million, 80% of their employees still ignore basic password security practices. The formal risk is obvious: GDPR fines can reach up to €20 million or 4% of global annual turnover. The informal one is quieter but often far more damaging: lost trust, declining customer loyalty, and disrupted operations. In 2024, European regulators issued fines exceeding €1.2

Finally, my ultimate smart home setup is complete thanks to this display gadget

Eufy Security E10 Smart Display ZDNET's key takeaways The Eufy Security E10 Smart Display is available for $200. This smart display shows you the history and current status of your security system and works as a control panel with real-time alerts. The E10 Smart Display only works with Eufy Security devices, so it's not compatible with other security cameras or meant to be a smart home hub. $199.99 at Amazon Follow ZDNET: Add us as a preferred source on Google. I've had an Eufy Security syst

Trump admin issues stop-work order for offshore wind project

The Trump administration on Friday issued an order to stop work on a nearly complete offshore wind energy project, the latest step in the Trump administration’s crackdown on wind power. In a letter to Orsted, the Danish company developing Revolution Wind, the Bureau of Ocean Energy Management said its order is tied to concerns about “the protection of national security interests of the United States and prevention of interference with reasonable uses of the exclusive economic zone, the high sea

Wyze’s newest pan and tilt cam can track your pets in 4K

Posts from this author will be added to your daily email digest and your homepage feed. Smart home tech provider Wyze is launching its first 4K security camera. The Wyze Cam Pan v4 is available today for $60, featuring color night vision, pan and tilt capabilities, and on-device AI-powered object tracking that captures people, pets, and vehicles. Users can control the camera remotely via the Wyze app for full-room coverage, with the 360-degree pan and 180-degree tilt features aiming to reduce

How to stop AI agents going rogue

How to stop AI agents going rogue 1 hour ago Share Save Sean McManus Technology Reporter Share Save Getty Images Anthropic tested a range of leading AI models for potential risky behaviour Disturbing results emerged earlier this year, when AI developer Anthropic tested leading AI models to see if they engaged in risky behaviour when using sensitive information. Anthropic's own AI, Claude, was among those tested. When given access to an email account it discovered that a company executive was

Perplexity's Comet AI Web Browser Had a Major Security Vulnerability

Comet, Perplexity's new AI-powered web browser, recently suffered from a significant security vulnerability, according to a blog post last week from Brave, a competing web browser company. The vulnerability has since been fixed, but it points to the challenges of incorporating large language models into web browsers. Unlike traditional web browsers, Comet has an AI assistant built in. This assistant can scan the page you're looking at, summarize its contents or perform tasks for you. The proble

How RubyGems.org protects OSS infrastructure

by Marty Haught Recently, Socket.dev published research highlighting malicious gems designed to steal social media credentials. We wanted to use this as an opportunity to share more about how RubyGems.org security operates, how we proactively handled this incident (and others), and the work our team is doing each day to keep the ecosystem safe. How We Detect Malicious Gems RubyGems.org security uses a proactive and multi-layered approach: 1. Automated detection: Every gem upload is analyzed

This smart display is the best home security companion I've ever used

Eufy Security E10 Smart Display ZDNET's key takeaways The Eufy Security E10 Smart Display is available for $200. This smart display shows you the history and current status of your security system and works as a control panel with real-time alerts. The E10 Smart Display only works with Eufy Security devices, so it's not compatible with other security cameras or meant to be a smart home hub. View now at Amazon View now at Eufy more buying choices Follow ZDNET: Add us as a preferred source on G

FTC warns tech giants not to bow to foreign pressure on encryption

The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data security, compromise encryption, or impose censorship on their platforms. FTC Chairman Andrew N. Ferguson signed the letter sent to large American companies like Akamai, Alphabet (Google), Amazon, Apple, Cloudflare, Discord, GoDaddy, Meta, Microsoft, Signal, Snap, Slack, and X (Twitter). Ferguson stresses that weakening data security at the request of foreign

New Android malware poses as antivirus from Russian intelligence agency

A new Android malware posing as an antivirus tool software created by Russia's Federal Security Services agency (FSB) is being used to target executives of Russian businesses. In a new report from Russian mobile security firm Dr. Web, researchers track the new spyware as 'Android.Backdoor.916.origin,' finding no links to known malware families. Among its various capabilities, the malware can snoop on conversations, stream from the phone's camera, log user input with a keylogger, or exfiltrate

Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet

This is the first post in a series about security and privacy challenges in agentic browsers. This vulnerability research was conducted by Artem Chaikin (Senior Mobile Security Engineer), and was written by Artem and Shivan Kaul Sahib (VP, Privacy and Security). The threat of instruction injection At Brave, we’re developing the ability for our in-browser AI assistant Leo to browse the Web on your behalf, acting as your agent. Instead of just asking “Summarize what this page says about London f

Hacker and physicist – a tale of "common sense"

I'm what you might call a "Stone Age" programmer. Not because I code with rocks and sticks, but because my toolkit is filled with ancient relics like LISP and OCaml - functional programming languages that are about as popular in today's enterprise world as flip phones at a tech conference. I spent three glorious years in the industry writing functional code, and let me tell you, it was like being a minimalist artist in a world of reality TV. Those languages taught me to appreciate the elegance

Four big enterprise lessons from Walmart’s AI security: agentic risks, identity reboot, velocity with governance, and AI vs. AI defense

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat recently sat down (virtually) with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer at Walmart Inc., to gain insights into the cybersecurity challenges the world’s largest retailer faces as AI becomes increasingly autonomous. We talked about securing agentic AI systems, modernizing identity

Microsoft: August Windows updates cause severe streaming issues

Microsoft has confirmed that the August 2025 security updates are causing severe lag and stuttering issues with NDI streaming software on some Windows 10 and Windows 11 systems. This comes after widespread reports from users experiencing a wide range of performance problems when using various streaming apps, including OBS (Open Broadcast Software), "Severe stuttering, lag, and choppy audio/video might occur when using NDI (Network Device Interface) for streaming or transferring audio/video fee

Apple stops signing iOS 18.6, blocking downgrade from both iOS 18.6.X updates

Apple has released two software updates to iOS 18.6. Since the iPhone software update has shipped without issue, and one contained a major security patch, Apple has stopped signing the older iOS 18.6 software version. Apple stops signing versions of iOS due to security issues being disclosed in older software versions and patched in newer software versions. Apple released iOS 18.6 on July 29. The update included bug fixes, security improvements, and a fix for a performance issue with the Photo

Inside Walmart’s AI security stack: How a startup mentality is hardening enterprise-scale defense

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now VentureBeat recently sat down (virtually) with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer at Walmart Inc., to gain insights into the cybersecurity challenges the world’s largest retailer faces as AI becomes increasingly autonomous. We talked about securing agentic AI systems, modernizing identity

How VPNs are helping people evade increased censorship - and much more

Charlie Osborne/ZDNET Follow ZDNET: Add us as a preferred Google source on Chrome and Chromium browsers. ZDNET's key takeaways Increased concern about surveillance and censorship is driving more VPN downloads. VPN providers are transforming one-and-done encrypted tunnels into holistic security suites. NordVPN is preparing for privacy protection in a post-quantum future. VILNIUS, Lithuania -- Many VPN providers have noticed an uptick in downloads and installation of their software in recent

Apple updates macOS Sequoia to version 15.6.1

In addition to releasing iOS 18.6.2, Apple has updated macOS Sequoia to version 15.6.1. The release is likely just a security update as all attention shifts to macOS Tahoe 26, due out as soon as next month. Apple released macOS 15.6, which focused on another bug fix, at the end of last month. Alongside macOS 15.6.1, Apple has issued two older macOS updates: macOS 14.7.8 and macOS 13.7.8. Apple supports older macOS versions, especially with security updates, for several years. Apple will like

Hackers steal Microsoft logins using legitimate ADFS redirects

Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins. The method lets attackers bypass traditional URL-based detection and the multi-factor authentication process by leveraging a trusted domain on Microsoft's infrastructure for the initial redirect. Legitimacy of a trusted redirect Researchers at Push Security, a company that provides protection solut

Why email security needs its EDR moment to move beyond prevention

Security leaders today are rethinking email security, not because traditional methods have failed outright, but because the threat landscape and business needs have evolved beyond what legacy approaches can handle. A surprising but apt analogy keeps surfacing: email security is stuck where antivirus (AV) was a decade ago, and it’s time it evolved like AV did, into an element of EDR. The comparison might not be obvious at first. After all, email and endpoints seem like apples and oranges. But

Vendors that treat single sign-on as a luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

The SSO Wall of Shame – Vendors that treat SSO as luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

Staff disquiet as Alan Turing Institute faces identity crisis

When the UK government announced the creation of the Alan Turing Institute in 2014 it promised a “fitting memorial” to the renowned computer scientist and artificial intelligence pioneer. More than a decade on, Britain’s leading AI institute is in turmoil as staff warn it may be in danger of collapse and ministers demand a shift in focus to defence and security work. “The ATI brand is well recognised internationally,” says Dame Wendy Hall, a professor of computer science at the University of S

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product. The company's statement follows a blog post from a company called AshES Cybersecurity claiming to have discovered a remote code execution (RCE) flaw in Elastic Defend that would allow an attacker to bypass EDR protections. Elastic’s Security Engineering team "conducted a thorough investigation" but could not find "evidence supportin

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws can let authenticated attackers to inject commands due to improper sanitization of user input and execute commands on

SystemD Service Hardening

Controversy aside, systemd provides us a very complete, robust method of controlling services (amongst a multitude of other Linux things). For a lot of things though, this is optimized for success out of the box and not necessarily security. Such is the way of many IT endeavors. This doc though is meant to provide a snapshot of a number of hardening options that you can apply to systemd service units and podman quadlets to increase the overall security posture and reduce both the likelihood of c

Russia Is Cracking Down on End-to-End Encrypted Calls

WIRED copublished an investigation this week with The Markup and CalMatters showing that dozens of data brokers have been hiding their opt-out and personal-data-deletion tools from Google Search, making it harder for people to find and utilize them. The report prompted US senator Maggie Hassan to demand accountability from the companies. WIRED also took a deep dive looking at what the data-analysis giant Palantir actually does. Reports this week that Russia was likely involved in, or entirely b

Cisco patches critical security hole in Firewall Management Center - act now

Olemedia/iStock/Getty Images Plus via Getty Images ZDNET's key takeaways Cisco's Secure Firewall Management Center security hole is as bad as they get. There is no mitigation and no workaround. Patch immediately. So far, no confirmed active exploits have been confirmed. Get more in-depth ZDNET tech coverage: Add us as a preferred Google source on Chrome and Chromium browsers. Do you use Cisco's Secure Firewall Management Center (FMC) software? If your company operates a serious network usi