Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

Apple updates macOS Sequoia to version 15.6.1

In addition to releasing iOS 18.6.2, Apple has updated macOS Sequoia to version 15.6.1. The release is likely just a security update as all attention shifts to macOS Tahoe 26, due out as soon as next month. Apple released macOS 15.6, which focused on another bug fix, at the end of last month. Alongside macOS 15.6.1, Apple has issued two older macOS updates: macOS 14.7.8 and macOS 13.7.8. Apple supports older macOS versions, especially with security updates, for several years. Apple will like

Ordered Insertion Optimization in OrioleDB

When many sessions try to insert into the same B-tree leaf page, classic exclusive page locking serializes progress and wastes time on sleep/wake cycles. We’re introducing a batch page insertion path that lets the session holding the page lock insert for itself and its neighbors. The result: dramatically reduced lock waits, and big gains at high client counts (2X throughput boost starting from 64 clients in our benchmark). In OrioleDB beta12, inserts into a B-tree leaf are performed under an ex

Hackers steal Microsoft logins using legitimate ADFS redirects

Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins. The method lets attackers bypass traditional URL-based detection and the multi-factor authentication process by leveraging a trusted domain on Microsoft's infrastructure for the initial redirect. Legitimacy of a trusted redirect Researchers at Push Security, a company that provides protection solut

Why email security needs its EDR moment to move beyond prevention

Security leaders today are rethinking email security, not because traditional methods have failed outright, but because the threat landscape and business needs have evolved beyond what legacy approaches can handle. A surprising but apt analogy keeps surfacing: email security is stuck where antivirus (AV) was a decade ago, and it’s time it evolved like AV did, into an element of EDR. The comparison might not be obvious at first. After all, email and endpoints seem like apples and oranges. But

Google signs Stephen Curry to pitch its Pixel, health, and AI gear

Posts from this author will be added to your daily email digest and your homepage feed. Google has brought NBA star Stephen Curry on board to help shape the company’s hardware, features, and AI services. The long-term partnership was announced today at the Made by Google event, with Curry joining the company as a “performance advisor” for Google’s Health, Pixel, and Cloud products, leaning into his athletic experience and expertise. Part of Curry’s job will involve testing and providing feedba

The End of Handwriting

People often credit my good handwriting to my Catholic school education—like a nun with a ruler and a taste for corporal punishment perfected my penmanship. But that’s not why. It’s because of my mom. An engineer by trade, she can execute the kind of perfect block letters that only come with years of working on a drawing board. As a kid, I worked to mimic her print as well as her incredibly ornate cursive. I don’t practice those skills nearly enough as an adult, though: As a reporter, speed trum

Vendors that treat single sign-on as a luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

The SSO Wall of Shame – Vendors that treat SSO as luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

Staff disquiet as Alan Turing Institute faces identity crisis

When the UK government announced the creation of the Alan Turing Institute in 2014 it promised a “fitting memorial” to the renowned computer scientist and artificial intelligence pioneer. More than a decade on, Britain’s leading AI institute is in turmoil as staff warn it may be in danger of collapse and ministers demand a shift in focus to defence and security work. “The ATI brand is well recognised internationally,” says Dame Wendy Hall, a professor of computer science at the University of S

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product. The company's statement follows a blog post from a company called AshES Cybersecurity claiming to have discovered a remote code execution (RCE) flaw in Elastic Defend that would allow an attacker to bypass EDR protections. Elastic’s Security Engineering team "conducted a thorough investigation" but could not find "evidence supportin

Horror Story Looms as Children Get Stuffed Animals Powered by AI

From Steven Spielberg's creepy "AI" (2001) to M3GAN (2022), toys imbued with artificial intelligence have been a source of fascination and terror in pop culture for decades. Now, in the face of all those cautionary tales, a new class of vaguely menacing chatty toys are being sold online — but unlike the "Gremlin"-esque Furbies of yore, these are powered by cutting-edge AI, and their danger quotient lies in what they may tell children or share with outside companies. As the New York Times repor

Structured (Synchronous) Concurrency

Structured (Synchronous) Concurrency @_fsantanna I have recently learned about Structured Concurrency (SC), which supports nested coroutines with tied lifetimes. There are a number of libraries (Dill, Trio, Effection), and even language mechanisms in Swift and Kotlin. The similarities with Esterel and derived imperative synchronous languages (ISLs) is noteworthy. However, it seems that no bridges between these worlds (ISLs & SC) have been built. Research in ISLs dates back to the early 80s, a

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws can let authenticated attackers to inject commands due to improper sanitization of user input and execute commands on

The End of Handwriting

People often credit my good handwriting to my Catholic school education—like a nun with a ruler and a taste for corporal punishment perfected my penmanship. But that’s not why. It’s because of my mom. An engineer by trade, she can execute the kind of perfect block letters that only come with years of working on a drawing board. As a kid, I worked to mimic her print as well as her incredibly ornate cursive. I don’t practice those skills nearly enough as an adult, though: As a reporter, speed trum

SystemD Service Hardening

Controversy aside, systemd provides us a very complete, robust method of controlling services (amongst a multitude of other Linux things). For a lot of things though, this is optimized for success out of the box and not necessarily security. Such is the way of many IT endeavors. This doc though is meant to provide a snapshot of a number of hardening options that you can apply to systemd service units and podman quadlets to increase the overall security posture and reduce both the likelihood of c

AI apps are like music

This is a mental discussion I have been having for the last two months. It is about pricing in AI. I have one actionable recommendation: Kill that damn model picker. I have been coding a specific AI app. Exciting stuff. Product is obvious. I even got a plan for distribution from day 1. Or day 0. Everything clicks. Except one thing. Pricing. It's tormenting me. The Cursor Problem or is it? Everyone describes AI apps the same way: "Cursor for X." Fair enough. Cursor nailed something import

Russia Is Cracking Down on End-to-End Encrypted Calls

WIRED copublished an investigation this week with The Markup and CalMatters showing that dozens of data brokers have been hiding their opt-out and personal-data-deletion tools from Google Search, making it harder for people to find and utilize them. The report prompted US senator Maggie Hassan to demand accountability from the companies. WIRED also took a deep dive looking at what the data-analysis giant Palantir actually does. Reports this week that Russia was likely involved in, or entirely b

Next week’s Google event is sounding more like a late-night talk show lineup

TL;DR The Made by Google event next week will feature celebrity guests alongside product reveals. Jimmy Fallon, Stephen Curry, Lando Norris, and the Jonas Brothers are among the teased guests. The event celebrates 10 generations of Pixel and ends with the tagline “Get outside your comfort phone.” It looks like Google’s big Pixel launch next week won’t just be about the hardware. In what appears to be a bid to draw a wider audience than tech nerds like us, Google is rolling out the red carpet

Cisco patches critical security hole in Firewall Management Center - act now

Olemedia/iStock/Getty Images Plus via Getty Images ZDNET's key takeaways Cisco's Secure Firewall Management Center security hole is as bad as they get. There is no mitigation and no workaround. Patch immediately. So far, no confirmed active exploits have been confirmed. Get more in-depth ZDNET tech coverage: Add us as a preferred Google source on Chrome and Chromium browsers. Do you use Cisco's Secure Firewall Management Center (FMC) software? If your company operates a serious network usi

Using AI to secure AI

One of Anthropic's quieter releases recently was their "Security Review," where Claude Code can identify and fix security issues in your code. But how good is it really? In my case, will it find issues with code it helped me write for my newsletter service and Chrome extension? The release states it uses a "specialized security-focused prompt that checks for common vulnerability patterns." After throwing so much compute at model training, LLMs are nearing the top of the S-Curve, so finding ways

Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

OpenReview Anonymous Preprint Submission696 Authors Keywords : Cloud computing security; Hardware security; Systems security TL;DR : Leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Abstract : Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While t

Developers Say GPT-5 Is a Mixed Bag

When OpenAI launched GPT-5 last week, it told software engineers the model was designed to be a “true coding collaborator” that excels at generating high-quality code and performing agentic, or automated, software tasks. While the company didn’t say so explicitly, OpenAI appeared to be taking direct aim at Anthropic’s Claude Code, which has quickly become many developers’ favored tool for AI-assisted coding. But developers tell WIRED that GPT-5 has been a mixed bag so far. It shines at technica

Letting inmates run the asylum: Using AI to secure AI

One of Anthropic's quieter releases recently was their "Security Review," where Claude Code can identify and fix security issues in your code. But how good is it really? In my case, will it find issues with code it helped me write for my newsletter service and Chrome extension? The release states it uses a "specialized security-focused prompt that checks for common vulnerability patterns." After throwing so much compute at model training, LLMs are nearing the top of the S-Curve, so finding ways

Microsoft reminds of Windows 10 support ending in two months

Microsoft has reminded customers that Windows 10 will be retired in two months after all editions of Windows 10, version 22H2 reach their end of servicing on October 14. On the same date, Windows 10 2015 LTSB and Windows 10 IoT Enterprise LTSB 2015 will also reach the end of extended support. After Windows 10 is retired, Microsoft will no longer provide bug fixes or technical assistance for issues affecting the system's security, stability, or usability. "On October 14, 2025, Windows 10, vers

Cisco warns of max severity flaw in Firewall Management Center

Cisco is warning about a critical remote code execution (RCE) vulnerability in the RADIUS subsystem of its Secure Firewall Management Center (FMC) software. Cisco FCM is a management platform for the vendor’s Secure Firewall products, which provides a centralized web or SSH-based interface to allow administrators to configure, monitor, and update Cisco firewalls. RADIUS in FMC is an optional external authentication method that permits connecting to a Remote Authentication Dial-In User Service

Here’s Acura’s next all-electric RSX crossover

Acura's next RSX crossover has broken cover. The automaker has used this year's Monterey Car Week as a stage to show off a bright yellow prototype—the color is called Propulsion Yellow Pearl—ahead of the production car going on sale next year. And unlike the current generation (which Ars last tested back in 2019) RDX, this crossover will be fully electric. It will be built at the Honda Marysville Auto Plant that we checked out back in January. The 40-year old factory has been given a high-tech

Find Hub is the next Google app to get an Expressive coat of paint (APK teardown)

Andy Walker / Android Authority TL;DR We’ve conducted a teardown of Google’s Find Hub app and discovered a variety of visual changes. These tweaks are broadly in line with Google’s push to adopt the Material 3 Expressive style. Google’s Find Hub is your one-stop shop for tracking your devices, accessories, and even loved ones. Now, it looks like Google is bringing some Material 3 Expressive changes to this app as well. We conducted a teardown of the latest version of the Find Hub app (versio

US sanctions Grinex crypto-exchange, successor to Garantex

The U.S. Department of the Treasury has announced sanctions against Grinex, the successor to Russian cryptocurrency exchange Garantex, which was previously sanctioned for helping ransomware gangs launder their money. A TRM Labs report, released in April, revealed that Grinex has strong ties to Garantex's previous operations, but stopped short of providing evidence that it was being used for illicit transactions. Grinex was promoted on Telegram channels linked to Garantex soon after U.S. author

Plex warns users to patch security vulnerability immediately

Plex has notified some of its users on Thursday to urgently update their media servers due to a recently patched security vulnerability. The company has yet to assign a CVE-ID to track the flaw and didn't provide additional details regarding the patch, only saying that it impacts Plex Media Server versions 1.41.7.x to 1.42.0.x. Yesterday, four days after releasing security updates that addressed the mysterious security bug, Plex emailed those running affected versions to update their software

Dyson Airwrap Co-anda 2x Review: Great, Not a Must-Have

Each attachment is embedded with RFID chips that auto-adjust heat and airflow based on your last-used settings. Not a revolutionary change, but it is nice not to have to toggle settings every time I switch attachments. You can also pair it with Dyson's app, which offers tutorials based on your hair type and goals. Dyson also moved the fan and heat controls to the base of the handle. It’s a cleaner look, but it can get finicky if you’re used to adjusting settings mid-styling. If you’ve already p