Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: uri Clear Filter

Android gets patches for Qualcomm flaws exploited in attacks

Google has released security patches for six vulnerabilities in Android's August 2025 security update, including two Qualcomm flaws exploited in targeted attacks. The two security bugs, tracked as CVE-2025-21479 and CVE-2025-27038, were reported through the Google Android Security team in late January 2025. The first is a Graphics framework incorrect authorization weakness that can lead to memory corruption due to unauthorized command execution in the GPU micronode while executing a specific s

Jeh Aerospace nets $11M to scale the commercial aircraft supply chain in India

Indian startup Jeh Aerospace founders Vishal Sanghavi and Venkatesh Mudragalla have had a front row seat to the commercial aircraft sector and its growing production bottleneck. The two former Tata Group executives spent close to two decades in different positions at the company and worked on projects that included participation from global aerospace companies, including Boeing, Sikorsky, and Lockheed Martin. Now, armed with $11 million in Series A funding, the pair are working to ease global

NASA's Curiosity picks up new skills

Instead, Curiosity and its younger sibling Perseverance each use their MMRTG nuclear power source, which relies on decaying plutonium pellets to create energy and recharge the rover’s batteries. Providing ample power for the rovers’ many science instruments, MMRTGs are known for their longevity (the twin Voyager spacecraft have relied on RTGs since 1977). But as the plutonium decays over time, it takes longer to recharge Curiosity’s batteries, leaving less energy for science each day. The team

These protocols will help AI agents navigate our messy lives

What should these protocols say about security? Researchers and developers still don’t really understand how AI models work, and new vulnerabilities are being discovered all the time. For chatbot-style AI applications, malicious attacks can cause models to do all sorts of bad things, including regurgitating training data and spouting slurs. But for AI agents, which interact with the world on someone’s behalf, the possibilities are far riskier. For example, one AI agent, made to read and send e

Ransomware gangs join attacks targeting Microsoft SharePoint servers

Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has already led to the breach of at least 148 organizations worldwide. Security researchers at Palo Alto Networks' Unit 42 have discovered a 4L4MD4R ransomware variant, based on open-source Mauri870 code, while analyzing incidents involving this SharePoint exploit chain (dubbed "ToolShell"). The ransomware was detected on July 27 after discove

These are the best streaming services you aren’t watching

We all know how to find our favorite shows and blockbuster films on mainstream streaming services like Netflix, HBO Max, and Disney+. But even as streaming has opened the door to millions of hours of on-demand entertainment, it can still feel like there’s nothing fresh or exciting to watch anymore. If you agree, it’s time to check out some of the more niche streaming services available, where you can find remarkable content unlikely to be available elsewhere. This article breaks down the best

How to Clean Your Mattress (2025)

It’s important to know how to clean your mattress. Not just for day-to-day cleanliness and hygiene, but let’s say you’re dealing with an emergency—a “my mattress is ruined" situation where you have the frantic energy of an emergency clean-up crew. Is a trip to the dump inevitable? Not necessarily. Before you think, “I’m so clean, this would never happen to me!” I’m telling you, it can. I've seen a lot over the course of my career as a professional mattress tester and certified sleep coach. If y

12 Best Outdoor Security Cameras (2025): Battery-Powered, LTE, No Subscription

Compare These Security Cameras Best MicroSD Cards Photograph: Amazon Some security cameras support local storage, enabling you to record videos on the camera or a linked hub. A few hubs have built-in storage, and some provide slots for hard drives, but most rely on microSD cards. This is a quick guide on what to look for (plus some recommendations). The microSD card you choose should have fast read and write speeds so you can record high-quality video and play it back without delay. I recomm

Best Home Security Systems in 2025: Safeguard Your Home With These Top Options

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or professionally installed systems with monitoring services. Remember to make your decision after considering the equipment, installation, monitoring options and other features you want. Here are some bits of information to keep in mind about these pa

Palo Alto Networks agrees to buy CyberArk for $25B

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion

Google Will Use AI to Guess People’s Ages Based on Search History

Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content, all in the name of protecting children. Almost immediately, things did not go as planned—although, they did go as expected. As experts predicted, UK residents began downloading virtual private networks (VPNs) en masse, allowing them to circumvent age verification, which can require users to upload their government IDs, by making it look like they’re in a diff

Yes, You Can Bundle Other Cybersecurity Services With Some VPNs. But Is It a Good Idea?

If all you’re using to protect your digital privacy and security is a VPN and your own vigilance, you’re still leaving yourself vulnerable to various online threats like phishing, malware, identity theft and ransomware. To fully protect yourself, you need to start putting together an arsenal of privacy and security tools. Using a trustworthy VPN is a great start because a VPN can boost your online privacy by encrypting your internet traffic and masking your true IP address. But a VPN is only on

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The security issue is now identified as CVE-2025-54135 and can be leveraged by feeding the AI agent a malicious prompt to trigger attacker-control commands. The Cursor integrated development environment (IDE) relies on AI agents to help developers code faster and more efficiently, allowing them to connect

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

SEC debuts 'Project Crypto' to bring U.S. financial markets 'on chain'

The Securities and Exchange Commission on Thursday debuted "Project Crypto," an initiative to modernize securities rules and regulations to allow for crypto-based trading. "To achieve President Trump's vision of making America the crypto capital of the world, the SEC must holistically consider the potential benefits and risks of moving our markets from an off-chain environment to an on-chain one," SEC chair Paul Atkins said in remarks to an "American Leadership in the Digital Finance Revolution

Read This Before You Trust Any AI-Written Code

We are in the era of vibe coding, allowing artificial intelligence models to generate code based on a developer’s prompt. Unfortunately, under the hood, the vibes are bad. According to a recent report published by data security firm Veracode, about half of all AI-generated code contains security flaws. Veracode tasked over 100 different large language models with completing 80 separate coding tasks, from using different coding languages to building different types of applications. Per the repor

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

Launch HN: Gecko Security (YC F24) – AI That Finds Vulnerabilities in Code

Hey HN, I'm JJ, Co-Founder of Gecko Security ( https://www.gecko.security ). We're building a new kind of static analysis tool that uses LLMs to find complex business logic and multi-step vulnerabilities that current scanners miss. We’ve used it to find 30+ CVEs in projects like Ollama, Gradio, and Ragflow ( https://www.gecko.security/research ). You can try it yourself on any OSS repo at ( https://app.gecko.security ). Anyone who’s used SAST (Static Application Security Testing) tools knows th

‘The Conjuring: Last Rites’ Teases the Warrens’ Final Dance With the Devil

It’s been over a decade since The Conjuring hit theaters and terrified audiences enough to spark what’s now an ever-expanding cinematic universe, with Annabelle and The Nun spawning adjacent series. But the supernatural adventures of Ed and Lorraine Warren—based on the real-life paranormal investigators and played in the Conjuring movies by Patrick Wilson and Vera Farmiga—are coming to an end in The Conjuring: Last Rites. We now have a second trailer for the fourth Conjuring movie, directed by

Two critical Android 16 security features you're not using (but absolutely should)

JEFF PACHOUD/Getty Images Although Google's earlier-than-expected release of Android 16 was missing a few important features, the updated OS does deliver improved security that every Android user would be well-advised to enable. I'll explain these two key security features and how to find and enable them. Also: How to clear your Android phone cache (and why it greatly improves performance) 1. Identity Check This feature was added in 2024, but it didn't receive much attention until the relea

'The Thursday Murder Club,' 'My Oxford Year' and More New Netflix Movies You Shouldn't Miss in August

As we enter the dog days of summer, Netflix's August slate of movies is giving us something to look forward to. This month, the platform is dropping dozens of new films, including some great originals like the romance My Oxford Year, starring Sofia Carson, and the ensemble mystery The Thursday Murder Club. The streamer is also premiering a few exciting new documentaries this month, including The Truth About Jussie Smollett?, in which the actor speaks out about the assault he's accused of stagin

App Store safety again called into question by Tea app

Apple has frequently argued that it is reasonable for it to have monopolistic control over the sale of iPhone apps because it vets them for safety and security. This has been called into question over scam apps accepted into the App Store, and the same questions are being asked regarding the Tea app. The so-called dating advice app has been revealed to have major security vulnerabilities, which have exposed private chats and personal data of tens of thousands of women … Egregious security flaw

China summons Nvidia over potential security concerns in H20 chips

What just happened? Nvidia's relief at being allowed to resume export of its China-specific H20 chips may be short-lived. The country's cyberspace regulator says that it met with Nvidia to discuss national security concerns related to the H20, including potential tracking and backdoors. The Cyberspace Administration of China (CAC) said that Nvidia was asked to "clarify and submit relevant supporting documentation regarding security risks, including potential vulnerabilities and backdoors, assoc

Apple security bounties pay up to $2M, but it only paid $1k for a critical bug

Apple encourages security researchers to seek out and report vulnerabilities in its devices and apps, in return for which it pays bug bounties of up to $2M. However, one security researcher who reported a Safari vulnerability Apple graded as Critical, and gave a severity score of 9.8 out of 10, says they were paid only $1,000 … Apple upgraded its security bounty program back in 2022, and stated then that its average payout was $40,000 and that it had on twenty occasions paid a six-figure sum f

Figma will IPO on July 31

Figma is a design and product development platform—where teams come together to turn ideas into the world’s best digital products and experiences. Today, we’re announcing the pricing of Figma’s initial public offering of 36,937,080 shares of Class A common stock at a public offering price of $33.00 per share. The shares are expected to begin trading on the New York Stock Exchange on July 31, 2025 under the ticker symbol "FIG." The offering is expected to close on August 1, 2025, subject to the

Critical vulnerability in AI coding platform Base44 allowing unauthorized access

One of the most profoundly transformed domains in the wake of the LLM revolution has been code generation, especially the rise of vibe coding, where natural language prompts replace traditional programming. This shift has empowered millions of users with little to no technical background to build fully functional applications with ease. Platforms like Loveable, Bolt, and Base44 are on the front of this movement - they have enabled the creation of millions of applications spanning from persona

Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Shadow AI is the $670,000 problem most organizations don’t even know they have. IBM’s 2025 Cost of a Data Breach Report, released today in partnership with the Ponemon Institute, reveals that breaches involving employees’ unauthorized use of AI tools cost organizations an average of $4.63 million. That’s nearly 16% more than the global ave

Security Bite: iPhone users are more reckless online, new study finds

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

Palo Alto Networks agrees to buy CyberArk for $25 billion

In Brief Cybersecurity giant Palo Alto Networks announced on Wednesday its intent to acquire identity management and security company CyberArk for $25 billion. The deal, a mix of cash and stock, marks Palo Alto’s entrance into the identity security space, according to a company press release. Palo Alto has been on a shopping spree since Nikesh Arora took over as CEO and chairman of the company in 2018, according to the Financial Times, which estimated the company has spent more than $7 billion