Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ks Clear Filter

Representing Python notebooks as dataflow graphs

This blog is adapted from our talk at PyCon 2025. marimo is free and open source, available on GitHub. For a free online experience with link sharing, try molab. marimo is a new kind of open-source Python notebook. While traditional notebooks are just REPLs, marimo notebooks are Python programs represented as dataflow graphs. This intermediate representation lets marimo blend the best parts of interactive computing with the reproducibility and reusability of Python software: every marimo notebo

WinRAR zero-day exploited to plant malware on archive extraction

A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a spe

Steam for Chromebooks is reportedly being discontinued

The dream of Chromebooks that double as gaming laptops appears to be on its last legs. 9to5Google reports that Google is ending support for Steam for Chromebooks starting January 1, 2026. Porting the application launcher was part of an extended push from the company to make Chromebooks a place to play games. Companies like ASUS and Acer announced and released gaming Chromebooks, but the idea never seemed to catch on. Google's plan to retire Steam for Chromebooks was discovered when 9to5Google t

WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks

A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a spe

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. “Customer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,” he writes. “We expect to have new locks on the market by the end of the year.” Photograph: Ronda Churchill In a followup call, Securam director of sales Jeremy Brookes confirmed that Securam has no plan to fix the vulnerabil

How attention sinks keep language models stable

We discovered why language models catastrophically fail on long conversations: when old tokens are removed to save memory, models produce complete gibberish. We found models dump massive attention onto the first few tokens as "attention sinks"—places to park unused attention since softmax requires weights to sum to 1. Our solution, StreamingLLM, simply keeps these first 4 tokens permanently while sliding the window for everything else, enabling stable processing of 4 million+ tokens instead of j

Open SWE: An open-source asynchronous coding agent

The use of AI in software engineering has evolved over the past two years. It started as autocomplete, then went to a copilot in an IDE, and in the fast few months has evolved to be a long running, more end-to-end agent that run asynchronously in the cloud. We believe that all agents will long more like this in the future - long running, asynchronous, more autonomous. Specifically, we think that they will: Run asynchronously in the cloud Integrate directly with your tooling Have enough conte

We built an open-source asynchronous coding agent

The use of AI in software engineering has evolved over the past two years. It started as autocomplete, then went to a copilot in an IDE, and in the fast few months has evolved to be a long running, more end-to-end agent that run asynchronously in the cloud. We believe that all agents will long more like this in the future - long running, asynchronous, more autonomous. Specifically, we think that they will: Run asynchronously in the cloud Integrate directly with your tooling Have enough conte

Travelers Are Unknowingly Smuggling Invasive Ticks Into the U.S.

Here’s an important tip for international travelers coming back home: Be sure to check for any blood-sucking creepy-crawlies attached to you. In a study out today, health experts warn that exotic, potentially disease-carrying ticks are regularly entering the U.S. by hitching a ride onto returning Americans. Tick scientists in Connecticut conducted the research, published Friday in the journal iScience. They detailed seven separate cases of nonnative ticks entering the state via travelers in rec

Flipper Zero dark web firmware bypasses rolling code security

Over on YouTube Talking Sasquach has recently tested custom firmware for the Flipper Zero that can entirely break the rolling code security system used on most modern vehicles. Rolling code security works by using a synchronized algorithm between a transmitter and receiver to generate a new, unique code for each transmission, preventing replay attacks and unauthorized access. In the past we've discussed an attack against rolling code security systems called RollJam, which works by jamming the o

Donald Trump Orders Crackdown on Politically Motivated ‘Debanking’

US President Donald Trump has ordered regulators to investigate the alleged refusal among US banks to supply accounts to customers on the basis of their political or religious beliefs. In an executive order signed Thursday, Trump accused federal banking regulators of presiding over an unlawful discrimination campaign under the guise of risk management, echoing allegations leveled previously by members of conservative groups and the cryptocurrency sector. “Bank regulators have used supervisory

Royal and BlackSuit ransomware gangs hit over 450 US companies

The U.S. Department of Homeland Security (DHS) says the cybercrime gang behind the Royal and BlackSuit ransomware operations had breached hundreds of U.S. companies before being taken down last month. Homeland Security Investigations (HSI), DHS's main investigative arm, which took down the group's infrastructure in cooperation with international law enforcement partners, added that the cybercriminals also collected over $370 million from their victims. "Since 2022, the Royal and BlackSuit rans

How Attention Sinks Keep Language Models Stable

We discovered why language models catastrophically fail on long conversations: when old tokens are removed to save memory, models produce complete gibberish. We found models dump massive attention onto the first few tokens as "attention sinks"—places to park unused attention since softmax requires weights to sum to 1. Our solution, StreamingLLM, simply keeps these first 4 tokens permanently while sliding the window for everything else, enabling stable processing of 4 million+ tokens instead of j

Donald Trump Orders Crackdown on Politically-Motivated ‘Debanking’

US President Donald Trump has ordered regulators to investigate the alleged refusal among US banks to supply accounts to customers on the basis of their political or religious beliefs. In an executive order signed Thursday, Trump accused federal banking regulators of presiding over an unlawful discrimination campaign under the guise of risk management, echoing allegations leveled previously by members of conservative groups and the cryptocurrency sector. “Bank regulators have used supervisory

Flipper Zero DarkWeb Firmware Bypasses Rolling Code Security

Over on YouTube Talking Sasquach has recently tested custom firmware for the Flipper Zero that can entirely break the rolling code security system used on most modern vehicles. Rolling code security works by using a synchronized algorithm between a transmitter and receiver to generate a new, unique code for each transmission, preventing replay attacks and unauthorized access. In the past we've discussed an attack against rolling code security systems called RollJam, which works by jamming the o

The Air Force Says It Needs to Buy Some Cybertrucks So It Can Blow Them Up With Missiles

The Air Force Says It Needs to Buy Some Cybertrucks So It Can Blow Them Up With Missiles Understandable. The US Air Force wants to buy two Tesla Cybertrucks so it can blow them up with missiles. As our sister site The War Zone reports, the military is trying to get a better sense of what to do in case an adversary driving a Cybertruck were to ever pose a threat. The publication dug up contracting documents indicating the Air Force Test Center is looking to deliver 33 vehicles, including the t

Did a rival tribe kill and eat their neighbors 5,700 years ago?

Credit: IPHES-CERCA/Luis Quevedo/Madrid Scientific Films. Human remains from 11 individuals recovered from El Mirador Cave in Spain showed evidence of cannibalism, archaeologists have concluded. According to a new paper published in the journal Scientific Reports, the cannibalism was likely the result of a violent episode between competing Late Neolithic herding communities about 5,700 years ago. “Cannibalism is one of the most complex behaviors to interpret, due to the inherent difficulty of

Linux PC acting up? Here's my first course of action (and why it fixes things most of the time)

Kyle Kucharski/ZDNET I've had it happen before. Back when drives consisted of spinning, magnetic platters, that dreaded "tick" was a sure sign a hard drive was failing. Once upon a nightmare scenario, I waited too late and wound up losing everything on my drive. Sure, I could have recovered that data, but at a pretty high monetary cost. Also: The first 5 Linux commands every new user should learn Since then, I've always been vigilant about checking for bad blocks and sectors on hard drives.

Linux PC acting up? Here's my first course of action (and why it fixes things 99% of the time)

Kyle Kucharski/ZDNET I've had it happen before. Back when drives consisted of spinning, magnetic platters, that dreaded "tick" was a sure sign a hard drive was failing. Once upon a nightmare scenario, I waited too late and wound up losing everything on my drive. Sure, I could have recovered that data, but at a pretty high monetary cost. Also: The first 5 Linux commands every new user should learn Since then, I've always been vigilant about checking for bad blocks and sectors on hard drives.

Here’s how deepfake vishing attacks work, and why they can be hard to detect

By now, you’ve likely heard of fraudulent calls that use AI to clone the voice of people the call recipient knows. Often, the result is what sounds like a grandchild, CEO, or work colleague you’ve known for years reporting an urgent matter requiring immediate action, saying wiring money, divulging login credentials, or visiting a malicious website. Researchers and government officials have been warning of the threat for years, with the Cybersecurity and Infrastructure Security Agency saying in

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines. The abused driver is 'rwdrv.sys' (used by ThrottleStop), which the threat actors register as a service to gain kernel-level access. This driver is likely used to load a second driver, 'hlpdrv.sys,' a malicious tool that manipulates Windows Defender to turn off its protections. This is a 'Bring Your Own Vulnerable Driver' (BYOVD) at

For regulated industries, AWS’s neurosymbolic AI promises safe, explainable agent automation

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now AWS is banking on the fact that by bringing its Automated Reasoning Checks feature on Bedrock to general availability, it will give more enterprises and regulated industries the confidence to use and deploy more AI applications and agents. It is also hoping that introducing methods like automated reasoning, which utilizes math-based valida

Google search boss says AI isn’t killing search clicks

Google has often bristled at the implication that its obsession with AI search is harming web traffic, and now search head Liz Reid has penned a blog post on the topic. According to Reid, clicks aren't declining, AI is driving more searches, and everything is fine on the Internet. But despite the optimistic tone, the post stops short of providing any actual data to back up those claims. This statement feels like a direct response to a recent Pew Research Center analysis that showed searches wit

How to check for bad blocks on a Linux PC hard drive (and why you shouldn't wait to do it)

Kyle Kucharski/ZDNET I've had it happen before. Back when drives consisted of spinning, magnetic platters, that dreaded "tick" was a sure sign a hard drive was failing. Once upon a nightmare scenario, I waited too late and wound up losing everything on my drive. Sure, I could have recovered that data, but at a pretty high monetary cost. Also: The first 5 Linux commands every new user should learn Since then, I've always been vigilant about checking for bad blocks and sectors on hard drives.

Google suffers data breach in ongoing Salesforce data theft attacks

Google is the latest company to suffer a data breach in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group. In June, Google warned that a threat actor they classify as 'UNC6040' is targeting companies' employees in voice phishing (vishing) social engineering attacks to breach Salesforce instances and download customer data. This data is then used to extort companies into paying a ransom to prevent the data from being leaked. In a brief update to

Thank God James Gunn Changed His Mind About Giving Superman Red Trunks

By this point, it’s safe to say that Superman has been an enormous success, both at the box office and among audiences and critics, for director James Gunn and the team at DC Studios. In the wake of the film’s meteoric rise, we finally got a look at some concept art of what it would’ve looked like if David Corenswet‘s caped hero didn’t have his iconic red trunks. Yesterday, graphic and surface designer Maybelle Pineda shared a post that gives DC fans a behind-the-scenes look at the creation of

Google suffers data breach in ongoing Salesforce data theft attacks

Google is the latest company to suffer a data breach in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group. In June, Google warned that a threat actor they classify as 'UNC6040' is targeting companies' employees in voice phishing (vishing) social engineering attacks to breach Salesforce instances and download customer data. This data is then used to extort companies into paying a ransom to prevent the data from being leaked. In a brief update to

Coding Agents 101

Coding Agents 101: The Art of Actually Getting Things Done The year is 2025. Coding agents aren't magic, but they're about the closest thing we have. We've noticed some engineers, in particular at the senior-to-staff level, finding success faster than others. Here we share some top lessons sourced from the experience of our customers and ourselves. About this guide: Product-agnostic We discuss tips that will help you be successful with any coding agent. Tactical We offer our favorite bits of act

Pandora confirms data breach amid ongoing Salesforce data theft attacks

Danish jewelry giant Pandora has disclosed a data breach after its customer information was stolen in the ongoing Salesforce data theft attacks. Pandora is one of the largest jewellery brands in the world, with 2,700 locations and over 37,000 employees. "We are writing to inform you that your contact information was accessed by an unauthorized party through a third-party platform we use," reads a Pandora data breach notification sent to customers. "We stopped the access and have further stren