Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: pos Clear Filter

Jeff Bezos Reportedly Eyes Purchase of CNBC as Tech Billionaires Gobble Up Media

Jeff Bezos is thinking about buying the financial news network CNBC, according to a new report from the New York Post, which cites anonymous sources. Given the damage Bezos has already done to the Washington Post, anyone who values the information they get from CNBC should probably be worried. An unnamed source told the New York Post that Bezos buying CNBC would “align well with his interests,” and it would remain a “neutral voice.” CNBC is being offloaded by its parent company, Comcast, into a

Topics: bezos cnbc new post trump

Cybercrime forum Leak Zone publicly exposed its users’ IP addresses

A self-styled “leaking and cracking forum” where users advertise and share breached databases, stolen credentials, and pirated software was leaking the IP addresses of its logged-in users to the open web, security researchers have found. Leak Zone left an Elasticsearch database exposed to the internet without a password, according to researchers at UpGuard. In a blog post shared with TechCrunch ahead of its publication, the researchers said they discovered the database on July 18 and found its

Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown

PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now -> Through the Attacker’s Eyes: A New Era of NHI Security This final installment in our blog series brings together everything we’ve uncovered about leaked AWS Access Keys—how attackers exploit them, why traditional security measures fall short, and what organizations can do to protect themselves. Over the series, we explored real-world scenarios across various platforms: GitHub and GitLab, Pac

Here’s why that embattled retro gaming YouTuber might not be so innocent (Updated)

Update, July 23, 2025 (03:46 AM ET): Android Authority reached out to Once Were Nerd for this story, but he declined to comment in light of the ongoing investigation. When possible, he will “provide more in-depth updates on the matter on [his] channels.” The original story mentioned that unused consoles were sold on Facebook, but they were actually sold on Telegram. This has been corrected in the text below. Original article, July 22, 2025: Creating emulation-focused content online is risky bus

Meta Touts Even More Protections for Teen Users. Here's What's New

Meta on Wednesday unveiled the latest efforts it's making to bolster the safety of teens and kids on its social media apps. The company has touted these new features for Instagram and Facebook in a blog post, most notably adding more information and warnings about accounts teens might try to contact via direct messages. "We've added new safety features to DMs in Teen Accounts to give teens more context about the accounts they're messaging and help them spot potential scammers," the post explain

You Can Track Your Sun Exposure With This New App. Here's How to Do It

If you're facing down the heat wave this summer, there's a new beta app for iPhones from the founder of Twitter, Jack Dorsey, for tracking your exposure to the sun. The Sun Day app is free to testers and so far contains information like sunrise, sunset and UV index in order to assess your potential burn-limit time and, as the app description says, "track your Vitamin D from the sun." Dorsey is currently testing UI updates and a solar noon notification, according to the app notes. In the app, yo

Topics: app day exposure sun uv

Threads expands Insights with detailed analytics, discovery breakdown, more

Today, Threads announced a new batch of analytics upgrades as part of its push to let creators better understand how their posts are doing on and off the platform. Here’s what’s new. Threads continues its push to win over creators Up until now, Threads’ Insights offered basic metrics like views, replies, new followers, and external links performance, along with a weekly recap and some light engagement tips. Starting today, the platform will offer a broader set of analytics tools so creators c

Meta has ended its bonus program on Threads

It's still trying to lure new users, but it's done paying anyone to post. Meta is no longer paying creators to post on Threads. The company quietly ended the Threads bonus program, which offered some creators thousands of dollars a month in bonuses, earlier this year, Engadget has confirmed. The company hasn't officially commented on why it stopped the payments, but an Instagram support page that once listed details about the creator incentives no longer references Threads at all. In posts on

UK government wants ransomware victims to report breaches so it can carry out ‘targeted disruptions’ against hackers

The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible. On Tuesday, the U.K.’s interior ministry, the Home Office, published a proposal with the aim of changing the British government’s strategy to counter ransomware. Among the three key proposals is a reporting requirement, which would aid authorities in identifying and disrupting hacking operati

UK government wants ransomware victims to report cyberattacks so it can disrupt the hackers

The U.K. government wants to require victims of ransomware to report if they were breached with the goal of providing law enforcement with information that could help target the cybercriminals responsible. On Tuesday, the U.K.’s interior ministry, the Home Office, published a proposal with the aim of changing the British government’s strategy to counter ransomware. Among the three key proposals is a reporting requirement, which would aid authorities in identifying and disrupting hacking operati

Tesla skepticism continues to grow, robotaxi demo fails to impress Austin

Tesla’s eroding popularity with Americans shows little sign of abating. Each month, the Electric Vehicle Intelligence Report surveys thousands of consumers to gauge attitudes on EV adoption, autonomous driving, and the automakers that are developing those technologies. Toyota, which only recently started selling enough EVs to be included in the survey, currently has the highest net-positive score and the highest “view intensity score”—the percentage of consumers who have a very positive view of

Here’s why that embattled retro gaming YouTuber might not be so innocent

TL;DR Embattled retro gaming YouTuber Once Were Nerd left out key incriminating details in his initial video. Earlier videos uploaded to the channel link to blog posts sharing ROM and BIOS downloads. He may have also sold consoles, with ROMs, on the secondhand market via Facebook. Creating emulation-focused content online is risky business, since the entire industry is filled with legal gray areas. Italian YouTuber Once Were Nerd found this out the hard way, with authorities seizing dozens of

What the 'Superman' Post-Credits Scenes Mean for the Future of the DC Cinematic Universe

The new Superman movie continues to rule the box office after its second weekend, leading the pack with $57 million from US audiences, and this relaunch of the DC universe is only getting started. Superman stars Rachel Brosnahan as Lois Lane, Nicholas Hoult as Lex Luthor and David Corenswet as the Man of Steel. The movie isn't an origin story; it picks up when Superman is already well-known (and moments after he loses any fight-winning streak he previously had). I won't provide any more details

We made Postgres writes faster, but it broke replication

We Made Postgres Writes Faster, but it Broke Replication +2 By Stu Hood, Ming Ying, Mathew Pregasen, and Olive Ratliff on June 30, 2025 When we built pg_search , the Postgres extension for search and analytics, write throughput was a priority. To be an effective alternative to Elasticsearch we needed to support high ingest workloads in real time. This is because many Elasticsearch use cases — like real-time dashboards, e-commerce search, and recommendation systems — involve continuous writes t

I tried vibe coding in BASIC and it didn't go well

With the rise of LLM systems (or “AI” as they are annoyingly called), the term “vibe coding” is all the rage recently. Vibe coding is when you rely almost entirely on these “AI” system to write your code for you via a series of drawn-out conversations. Putting on my cranky old man hat, I find most of it rather frustrating. Now I’m not some retro-sycophant who refuses to use modern tools. I’ve been a software professional for over 30 years at this point and I’ve used lots of tools throughout the

I tried Vibe coding in BASIC and it didn't go well

With the rise of LLM systems (or “AI” as they are annoyingly called), the term “vibe coding” is all the rage recently. Vibe coding is when you rely almost entirely on these “AI” system to write your code for you via a series of drawn-out conversations. Putting on my cranky old man hat, I find most of it rather frustrating. Now I’m not some retro-sycophant who refuses to use modern tools. I’ve been a software professional for over 30 years at this point and I’ve used lots of tools throughout the

The tech that the US Post Office gave us

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. When you crack open your mailbox, it’s almost as if your letters just appear. Long before the days of speedy, overnight mail deliveries, postal service workers meticulously sorted through letters by hand and transported mail on horseback. For more than 250 years, the US Postal Service has worked behind the scenes to build a faster delivery network,

The tech that the US Post Office gave us

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. When you crack open your mailbox, it’s almost as if your letters just appear. Long before the days of speedy, overnight mail deliveries, postal service workers meticulously sorted through letters by hand and transported mail on horseback. For more than 250 years, the US Postal Service has worked behind the scenes to build a faster delivery network,

Show HN: OrioleDB Beta12 Features and Benchmarks

Since our last public update, OrioleDB has continued to evolve with a series of new releases. These updates refine the core engine, extend functionality, and improve performance across a range of workloads. Together, they move us closer to a beta release and lay the groundwork for broader adoption. OrioleDB is a PostgreSQL storage extension that implements a custom Table Access Method as a drop‑in replacement for the default Heap storage engine. It is designed to address scalability bottlenecks

Arch Linux pulls AUR packages that installed Chaos RAT malware

Arch Linux has pulled three malicious packages uploaded to the Arch User Repository (AUR) were used to install the CHAOS remote access trojan (RAT) on Linux devices. The packages were named "librewolf-fix-bin", "firefox-patch-bin", and "zen-browser-patched-bin," and were uploaded by the same user, "danikpapas," on July 16. The packages were removed two days later by the Arch Linux team after being flagged as malicious by the community. "On the 16th of July, at around 8pm UTC+2, a malicious AU

Broadcom to discontinue free Bitnami Helm charts

📢 Overview As of August 28th, 2025, the Bitnami public catalog will undergo the following changes: Community catalog Disable images generation for Debian-based images and gradually move existing ones to a Bitnami Legacy repository. A focused set of more hardened, more secure images. These free images are intended for development and are only available on the “latest” tag. You can find them at https://hub.docker.com/u/bitnamisecure. Helm charts and container images' open-source code will contin

Woman Who Exposed AI CEO's Affair on Jumbotron Responds to Controversy

"Play stupid games… win stupid prizes." Cheat Day After filming those cheating AI executives canoodling at a Coldplay concert in Boston, the woman behind the viral video has little sympathy. In an interview with The Sun, 28-year-old Grace Springer insisted she wasn't trying to cause any trouble when she posted the kiss cam footage of Andy Byron, the CEO of the AI data analytics firm Astronomer, and Kristin Cabot, the company's HR head. Still, she's not exactly apologetic either. As the youn

Exposed MCP servers across the internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v

CoCo1 composite video

When I got the CoCo, one of the big problems was the super-smeary, snowy video on the RF-out. Even though composite video is generated internally by the video circuitry of the computer, Tandy didn’t end up breaking it out to an actual port. Lots of other 8-bit machines of the era are in the same boat. Luckily, adding a composite video port to the CoCo is very straightforward! So straightforward, in fact, that I did it twice. Theory As I said just now, the Motorola 6847 VDG already generates a

Exposing the Unseen: Mapping MCP Servers Across the Internet

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking. In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers. We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually v