Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: abilities Clear Filter

Supermicro server motherboards can be infected with unremovable malware

Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious firmware that runs even before the operating system, making infections impossible to detect or remove without unusual protections in place. One of the two vulnerabilities is the result of an incomplete patch Supermicro released in January, said Alex Matrosov, founder and CEO of Binarly, the security firm that discovered it. He said that the insufficient f

Supermicro server motherboards can be infected with unremovable malware

Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious firmware that runs even before the operating system, making infections impossible to detect or remove without unusual protections in place. One of the two vulnerabilities is the result of an incomplete patch Supermicro released in January, said Alex Matrosov, founder and CEO of Binarly, the security firm that discovered it. He said that the insufficient f

Palworld is getting a farming spinoff

Basically, it sounds like the Palworld version of farming simulator games like Stardew Valley. “Each Pal will lend a hand in farm work by making use of their unique abilities,” Pocketpair says in a press release. “From sowing seeds and watering to harvesting, Pals make for reliable partners. Deepen your relationships with the island residents and Pals through daily conversation and gift-giving, and you may discover unexpected, special stories unfolding.” You’ll also have to defend your farm from

Stop waiting on NVD — get real-time vulnerability alerts now

In today’s fast-paced digital environment, cybersecurity is no longer optional - it’s essential. Vulnerability management has become a core component of every security strategy and keeping track of vulnerability alerts is an issue facing many businesses. It doesn’t take much for even a small business to have hundreds, if not thousands of software across their systems. With nearly 10% of vulnerabilities exploited in 2024, a business could easily have dozens of possible breaches in the offing if

Exclusive: Google wants to make Android phones safer by switching to ‘risk-based’ security updates

Mishaal Rahman / Android Authority For the past decade, Google has consistently published an Android Security Bulletin every month, even if the company wasn’t ready to roll out a security update to its own Pixel devices. These bulletins detail the vulnerabilities that have been fixed in that month’s security release, with issues ranging from low to critical in severity. Given how large and complex the Android operating system and its underlying components are, it’s not unusual to see a dozen or

The DOJ sues Uber (again) for allegedly discriminating against people with disabilities

The US Department of Justice sued Uber on Thursday over disability discrimination… again. The lawsuit claims the company and its drivers "routinely refuse to serve individuals with disabilities." It specifically calls out its handling of passengers with service animals or stowable wheelchairs. The suit was filed in federal court in Northern California. "Despite the importance of its services to people with disabilities, Uber denies people with disabilities full and equal enjoyment of its servic

Uber sued by DOJ for alleged discrimination against disabled riders

A man holds up a smartphone with the Uber app visible on screen, as taxis queue in the background on June 4, 2019. The Department of Justice sued Uber on Thursday, alleging the ride-hailing giant discriminated against riders with disabilities, according to a filing. "Despite the importance of its services to people with disabilities, Uber denies people with disabilities full and equal enjoyment of its services in several critical ways," the complaint, filed in a federal court in San Francisco,

Justice Department sues Uber for allegedly discriminating against people with disabilities

The U.S. Justice Department has filed a lawsuit against Uber, accusing the ride-hailing company of violating federal law by discriminating against people with physical disabilities. In particular, the Department of Justice’s (DOJ) civil rights division claims that the company and its drivers “routinely refuse to serve individuals with disabilities, including individuals who travel with service animals or who use stowable wheelchairs.” Uber is also accused of charging extra fees on riders who n

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

Apple launched a slate of new iPhones on Tuesday loaded with the company's new A19 and A19 Pro chips. Along with an ultra-thin iPhone Air and other redesigns, the new phones come with a less flashy upgrade that could turn out to be the true killer feature. A security improvement called “Memory Integrity Enforcement” combines always-on chip-level protections with software defenses in an effort to harden iPhones against the most common—and commonly exploited—software vulnerabilities. In recent ye

Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days

Today is Microsoft's September 2025 Patch Tuesday, which includes security updates for 81 flaws, including two publicly disclosed zero-day vulnerabilities. This Patch Tuesday also fixes nine "Critical" vulnerabilities, five of which are remote code execution vulnerabilities, 1 is information disclosure, and 2 are elevation of privileges. The number of bugs in each vulnerability category is listed below: 41 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 22 R

Wake Up Babe, Dolby Vision 2 Just Dropped After 10 Years—Yes, It’s Powered by AI

After more than 10 years, Dolby is ready to bring its game-changing Dolby Vision tech into the future with (drum roll) Dolby Vision 2. As a part of IFA 2025, Dolby took the wraps off its sequel to Vision, which brings an array of new capabilities to the company’s proprietary HDR format. Powering Dolby Vision 2 is an all-new engine that enables tools like “Content Intelligence.” Content Intelligence, as you may have guessed, uses AI to better adapt your TV’s picture to content that you’re watchi

AI Mode in Search gets new agentic features and expands globally

AI is making Google Search radically more helpful, so you can ask any question on your mind and get things done. Starting today, we’re bringing more advanced agentic and personalized capabilities to AI Mode so you can make progress on your tasks and get more tailored information based on your interests. We’re also bringing AI Mode to even more people around the world. Read on for more. Get things done with agentic capabilities in AI Mode New agentic capabilities in AI Mode can help you get thi

DeepSeek V3.1 just dropped — and it might be the most powerful open AI yet

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Chinese artificial intelligence startup DeepSeek made waves across the global AI community Tuesday with the quiet release of its most ambitious model yet — a 685-billion parameter system that challenges the dominance of American AI giants while reshaping the competitive landscape through open-source accessibility. The Hangzhou-based compan

Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

OpenReview Anonymous Preprint Submission696 Authors Keywords : Cloud computing security; Hardware security; Systems security TL;DR : Leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Abstract : Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While t

Insta360’s next ultra-compact action camera is getting a redesign

is a senior reporter who’s been covering and reviewing the latest gadgets and tech since 2006, but has loved all things electronic since he was a kid. Posts from this author will be added to your daily email digest and your homepage feed. It hasn’t been officially announced yet, but leaked pics and specs have revealed the new design and capabilities of Insta360’s next ultra-compact action camera. The most notable update, thanks to product shots shared by reliable leaker Roland Quandt, is a new

Why it’s a mistake to ask chatbots about their mistakes

When something goes wrong with an AI assistant, our instinct is to ask it directly: "What happened?" or "Why did you do that?" It's a natural impulse—after all, if a human makes a mistake, we ask them to explain. But with AI models, this approach rarely works, and the urge to ask reveals a fundamental misunderstanding of what these systems are and how they operate. A recent incident with Replit's AI coding assistant perfectly illustrates this problem. When the AI tool deleted a production datab

Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws

Today is Microsoft's August 2025 Patch Tuesday, which includes security updates for 107 flaws, including one publicly disclosed zero-day vulnerability in Windows Kerberos. This Patch Tuesday also fixes thirteen "Critical" vulnerabilities, nine of which are remote code execution vulnerabilities, three are information disclosure, and one is elevation of privileges. The number of bugs in each vulnerability category is listed below: 44 Elevation of Privilege Vulnerabilities 35 Remote Code Execut

Microsoft increases Zero Day Quest prize pool to $5 million

Microsoft will offer up to $5 million in bounty awards at this year's Zero Day Quest hacking contest, which the company describes as the "largest hacking event in history." Last year's Zero Day Quest has also generated significant participation from the security community, following Microsoft's offer of $4 million in rewards for vulnerabilities in cloud and AI products and platforms. After the November hacking competition concluded, Microsoft announced that it had paid $1.6 million, having rece

Intel, Not AMD, Could Be the Secret to Kickass Next-Gen Handheld PCs

Intel is an empire past its prime and is beset on all sides. Just as Paul “Muad’Dib” Atreides of Dune monologued on the many futures he perceived, there is “a narrow way through” for the beleaguered chipmaker. The way forward could be with a newfound gaming focus on its next-gen chips. Its desktop CPUs may be getting a gamer-centric upgrade, but the real surprise may be how it could win out in a market it has yet to truly compete in: handheld gaming. Handheld gaming PCs need Intel to shake thin

Tesla to pay more than $200 million in damages after being found partly liable for fatal Autopilot crash

is a news editor covering technology, gaming, and more. He joined The Verge in 2019 after nearly two years at Techmeme. Posts from this author will be added to your daily email digest and your homepage feed. A federal jury in Florida found Tesla partly liable for a deadly 2019 crash involving Tesla’s Autopilot driver assist software, according to reports from The New York Times and CNBC. Tesla has been ordered to pay $200 million in punitive damages and about $43 million in compensatory damage

CISA warns of hackers exploiting SysAid vulnerabilities in attacks

CISA has warned that attackers are actively exploiting two security vulnerabilities in the SysAid IT service management (ITSM) software to hijack administrator accounts. The two unauthenticated XML External Entity (XXE) flaws, tracked as CVE-2025-2775 and CVE-2025-2776, were reported by watchTowr Labs security researchers in December 2024 and patched in March with the release of SysAid On-Prem version 24.4.60. One month later, watchTowr Labs also published proof-of-concept code, showing that t

Microsoft links Sharepoint ToolShell attacks to Chinese hackers

Several hacking groups with ties to the Chinese government have been linked to a recent wave of widespread attacks targeting a Microsoft SharePoint zero-day vulnerability chain. They used this exploit chain (dubbed "ToolShell") to breach dozens of organizations worldwide after hacking into their on-premise SharePoint servers. "Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting these vulnerabilities targeting internet-facing SharePoint serv

Max severity Cisco ISE bug allows pre-auth command execution, patch now

A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices. The security issue received the maximum severity rating, 10 out of 10, and is caused by insufficient user-supplied input validation checks. It was discovered by Kentaro Kawane, a researcher at the Japanese cybersecurity service GMO Cybersecurity by Ierae, and report

Voxtral – Frontier open source speech understanding models

Voice: the original UI. Voice was humanity’s first interface—long before writing or typing, it let us share ideas, coordinate work, and build relationships. As digital systems become more capable, voice is returning as our most natural form of human-computer interaction. Yet today’s systems remain limited—unreliable, proprietary, and too brittle for real-world use. Closing this gap demands tools with exceptional transcription, deep understanding, multilingual fluency, and open, flexible deploy

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more privileges on the machine. Mechanisms running code below the OS have low-level hardware access

NetBox Labs secures $35M as demand for network infrastructure management surges

The platform’s technical foundation centers on modeling infrastructure relationships in detail. The NetBox model encodes realistic relationships, such as an IP address’s provision on an interface, where the interface is on the switch, and where the switch sits in a rack. In addition, NetBox Labs has expanded the core platform with complementary products that address operational pain points while leveraging the central data repository. NetBox Discovery provides automated network device and serv

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor