Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: sec Clear Filter

Hiding secret codes in light protects against fake videos

Fact-checkers may have a new tool in the fight against misinformation. A team of Cornell researchers has developed a way to “watermark” light in videos, which they can use to detect if video is fake or has been manipulated. The idea is to hide information in nearly-invisible fluctuations of lighting at important events and locations, such as interviews and press conferences or even entire buildings, like the United Nations Headquarters. These fluctuations are designed to go unnoticed by humans

Palo Alto Networks agrees to buy CyberArk for $25B

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion

Google Will Use AI to Guess People’s Ages Based on Search History

Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content, all in the name of protecting children. Almost immediately, things did not go as planned—although, they did go as expected. As experts predicted, UK residents began downloading virtual private networks (VPNs) en masse, allowing them to circumvent age verification, which can require users to upload their government IDs, by making it look like they’re in a diff

Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?

If all you’re using to protect your digital privacy and security is a VPN and your own vigilance, you’re still leaving yourself vulnerable to various online threats like phishing, malware, identity theft and ransomware. To fully protect yourself, you need to start putting together an arsenal of privacy and security tools. Using a trustworthy VPN is a great start because a VPN can boost your online privacy by encrypting your internet traffic and masking your true IP address. But a VPN is only on

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The security issue is now identified as CVE-2025-54135 and can be leveraged by feeding the AI agent a malicious prompt to trigger attacker-control commands. The Cursor integrated development environment (IDE) relies on AI agents to help developers code faster and more efficiently, allowing them to connect

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

Horrifyingly Huge New Stick Insect Discovered Exactly Where You Think

Australia is famous for hosting the weirdest creatures we’ve ever seen. Sometimes, these weird creatures also come extra-large—like the newly discovered stick insect that researchers believe may be the heaviest of all Aussie insects. The insect, named Acrohylla alta, is about 15 inches (40 centimeters) long—about the height of a bowling pin—and weighs around 0.1 pounds (44 grams), slightly lighter than the heaviest golf ball. In a recent Zootaxa paper, wildlife researchers Angus Emmott and Ross

Microsoft catches Russian hackers targeting foreign embassies

Russian-state hackers are targeting foreign embassies in Moscow with custom malware that gets installed using adversary-in-the-middle attacks that operate at the ISP level, Microsoft warned Thursday. The campaign has been ongoing since last year. It leverages ISPs in that country, which are obligated to work on behalf of the Russian government. With the ability to control the ISP network, the threat group—which Microsoft tracks under the name Secret Blizzard—positions itself between a targeted

SEC debuts 'Project Crypto' to bring U.S. financial markets 'on chain'

The Securities and Exchange Commission on Thursday debuted "Project Crypto," an initiative to modernize securities rules and regulations to allow for crypto-based trading. "To achieve President Trump's vision of making America the crypto capital of the world, the SEC must holistically consider the potential benefits and risks of moving our markets from an off-chain environment to an on-chain one," SEC chair Paul Atkins said in remarks to an "American Leadership in the Digital Finance Revolution

Read This Before You Trust Any AI-Written Code

We are in the era of vibe coding, allowing artificial intelligence models to generate code based on a developer’s prompt. Unfortunately, under the hood, the vibes are bad. According to a recent report published by data security firm Veracode, about half of all AI-generated code contains security flaws. Veracode tasked over 100 different large language models with completing 80 separate coding tasks, from using different coding languages to building different types of applications. Per the repor

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code

Hey HN, I'm JJ, Co-Founder of Gecko Security ( https://www.gecko.security ). We're building a new kind of static analysis tool that uses LLMs to find complex business logic and multi-step vulnerabilities that current scanners miss. We’ve used it to find 30+ CVEs in projects like Ollama, Gradio, and Ragflow ( https://www.gecko.security/research ). You can try it yourself on any OSS repo at ( https://app.gecko.security ). Anyone who’s used SAST (Static Application Security Testing) tools knows th

Two critical Android 16 security features you're not using (but absolutely should)

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: How to clear your Android phone cache (and why it greatly improves performance) 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the relea

App Store safety again called into question by Tea app

Apple has frequently argued that it is reasonable for it to have monopolistic control over the sale of iPhone apps because it vets them for safety and security. This has been called into question over scam apps accepted into the App Store, and the same questions are being asked regarding the Tea app. The so-called dating advice app has been revealed to have major security vulnerabilities, which have exposed private chats and personal data of tens of thousands of women … Egregious security flaw

China summons Nvidia over potential security concerns in H20 chips

What just happened? Nvidia's relief at being allowed to resume export of its China-specific H20 chips may be short-lived. The country's cyberspace regulator says that it met with Nvidia to discuss national security concerns related to the H20, including potential tracking and backdoors. The Cyberspace Administration of China (CAC) said that Nvidia was asked to "clarify and submit relevant supporting documentation regarding security risks, including potential vulnerabilities and backdoors, assoc

How was the Universal Pictures 1936 opening logo created?

A quick Google search turned up the following on a forum link which explains this originated from Tim Dickinson, who has a complete explanation of how this logo was done on Twitter Alexander Golitzen, famed Art Director, who worked at Universal for over 30 years. With new owners behind the studio, the biplane that had circled the Earth since 1927 was dropped. Golitzen embraced the Art Deco movement, using plexiglass for its replacement. The differently sized spinning stars were filmed first, u

Apple security bounties pay up to $2M, but it only paid $1k for a critical bug

Apple encourages security researchers to seek out and report vulnerabilities in its devices and apps, in return for which it pays bug bounties of up to $2M. However, one security researcher who reported a Safari vulnerability Apple graded as Critical, and gave a severity score of 9.8 out of 10, says they were paid only $1,000 … Apple upgraded its security bounty program back in 2022, and stated then that its average payout was $40,000 and that it had on twenty occasions paid a six-figure sum f

Figma will IPO on July 31

Figma is a design and product development platform—where teams come together to turn ideas into the world’s best digital products and experiences. Today, we’re announcing the pricing of Figma’s initial public offering of 36,937,080 shares of Class A common stock at a public offering price of $33.00 per share. The shares are expected to begin trading on the New York Stock Exchange on July 31, 2025 under the ticker symbol "FIG." The offering is expected to close on August 1, 2025, subject to the

Critical vulnerability in AI coding platform Base44 allowing unauthorized access

One of the most profoundly transformed domains in the wake of the LLM revolution has been code generation, especially the rise of vibe coding, where natural language prompts replace traditional programming. This shift has empowered millions of users with little to no technical background to build fully functional applications with ease. Platforms like Loveable, Bolt, and Base44 are on the front of this movement - they have enabled the creation of millions of applications spanning from persona

Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Shadow AI is the $670,000 problem most organizations don’t even know they have. IBM’s 2025 Cost of a Data Breach Report, released today in partnership with the Ponemon Institute, reveals that breaches involving employees’ unauthorized use of AI tools cost organizations an average of $4.63 million. That’s nearly 16% more than the global ave

Security Bite: iPhone users are more reckless online, new study finds

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

Palo Alto Networks agrees to buy CyberArk for $25 billion

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion

Critical Vulnerability in AI Vibe Coding platform Base44

One of the most profoundly transformed domains in the wake of the LLM revolution has been code generation, especially the rise of vibe coding, where natural language prompts replace traditional programming. This shift has empowered millions of users with little to no technical background to build fully functional applications with ease. Platforms like Loveable, Bolt, and Base44 are on the front of this movement - they have enabled the creation of millions of applications spanning from persona

Critical Vulnerability Discovered 11 Days After Wix Buys Base44

One of the most profoundly transformed domains in the wake of the LLM revolution has been code generation, especially the rise of vibe coding, where natural language prompts replace traditional programming. This shift has empowered millions of users with little to no technical background to build fully functional applications with ease. Platforms like Loveable, Bolt, and Base44 are on the front of this movement - they have enabled the creation of millions of applications spanning from persona

Palo Alto Networks stock falls after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell 5% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock whipsawed. Palo Alto CEO and chairman Nikesh Arora

Palo Alto Networks stock falls 7% after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell 7% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock dipped about 1%. Palo Alto CEO and chairman Nikesh

Palo Alto Networks stock falls 8% after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell more than 8% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock dipped about 2%. Palo Alto CEO and chair