Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ability Clear Filter

You should update your Samsung phone ASAP - this zero-day flaw just got patched

Kerry Wan/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Samsung issued a patch for a zero-day vulnerability. Android devices are affected by ongoing attacks in the wild. Samsung users should accept security updates immediately. Samsung recently issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as CVE-2025-21043. The security fla

Update your Samsung phone ASAP to patch this zero-day flaw exploited in the wild

Sabrina Ortiz/ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Samsung issued a patch for a zero-day vulnerability. Android devices are affected by ongoing attacks in the wild. Samsung users should accept security updates immediately. Samsung has issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as CVE-2025-21043. The security flaw

Stop waiting on NVD — get real-time vulnerability alerts now

In today’s fast-paced digital environment, cybersecurity is no longer optional - it’s essential. Vulnerability management has become a core component of every security strategy and keeping track of vulnerability alerts is an issue facing many businesses. It doesn’t take much for even a small business to have hundreds, if not thousands of software across their systems. With nearly 10% of vulnerabilities exploited in 2024, a business could easily have dozens of possible breaches in the offing if

SAP warns of high-severity vulnerabilities in multiple products

As hackers exploit a high-severity vulnerability in SAP’s flagship Enterprise Resource Planning software product, the software maker is warning users of more than two dozen newly detected vulnerabilities in its other widely used products, including a security flaw with a maximum-severity rating of 10. SAP on Tuesday said the highest-severity vulnerability—with a rating of 10 out of a possible 10—was found in NetWeaver, a platform that serves as the technical foundation for many of the company’s

As hackers exploit one high-severity SAP flaw, company warns of 3 more

As hackers exploit a high-severity vulnerability in SAP’s flagship Enterprise Resource Planning software product, the software maker is warning users of more than two dozen newly detected vulnerabilities in its other widely used products, including a security flaw with a maximum-severity rating of 10. SAP on Tuesday said the highest-severity vulnerability—with a rating of 10 out of a possible 10—was found in NetWeaver, a platform that serves as the technical foundation for many of the company’s

Computing’s Top 30: Nipun Jaswal

To keep his edge, international cybersecurity expert Nipun Jaswal does more than stay up on current security threats and trends; he literally keeps his hands in the game, regularly coding—in up to 10 different languages—and doing lab work including exploring attack vectors and hunkering down with disassemblers and debuggers. Remaining “deeply technical” is not just part of his practice, it’s also fundamental to his leadership philosophy, which centers on staying curious and “close to the core o

Critical SAP S/4HANA vulnerability now exploited in attacks

A critical SAP S/4HANA code injection vulnerability is being leveraged in attacks in the wild to breach exposed servers, researchers warn. The flaw, tracked as CVE-2025-42957, is an ABAP code injection problem in an RFC-exposed function module of SAP S/4HANA, allowing low-privileged authentication users to inject arbitrary code, bypass authorization, and fully take over SAP. The vendor fixed the vulnerability on August 11, 2025, rating it critical (CVSS score: 9.9). However, several systems h

Got a great browser interoperability idea? Apple wants to hear from you

Entries are now open for Interop 2026, a yearly effort where anyone, from users to web developers, can submit their best ideas to improve cross-browser interoperability. Here’s how to participate. Interop started in 2022, when Apple, Bocoup, Google, Italia, Microsoft, and Mozilla came together “to commit to improve interoperability in 15 key areas that will have the most impact on web developer experience.” The project, which stemmed from Google’s Compat initiative, gained enough traction to b

Google deletes net-zero pledge from sustainability website

Pichai added that he knew the “road ahead would not be easy,” but Google “aimed to prove that a carbon-free future is both possible and achievable fast enough to prevent the most dangerous impacts of climate change.” “Today, I’m proud to announce that we intend to be the first major company to operate carbon free — 24 hours a day, seven days a week, 365 days a year,” he said, in a video announcement . Google’s CEO Sundar Pichai stood smiling in a leafy-green California garden in September 2020

Meet the Top 10 AI-Proof Jobs That Everyone Wants

AI is rapidly scaling in the workforce and creating fears of an employment crisis, as workers and people entering the workforce try to figure out if their career is on the chopping block. That quick pace is backed by emerging data. As a result, people are trying to find “AI-proof” jobs that can guarantee job security as companies around the world choose to automate tasks instead of hiring new workers. Although no study can definitively say which occupations are 100% AI-proof and which are doom

‘Magic’ Weaves New Mechanics and Cards for Spider-Man Set

Less than a month out from Magic: The Gathering’s Spider-Man set, Wizards of the Coast has given it a full unveiling with reveals of more cards and gameplay mechanics for its crossover with Marvel’s webhead and friends. Wizards previously revealed a selection of cards at San Diego Comic-Con back in July. Like those, this new selection sports some amazing art from the company’s internal artists and creatives who’ve previously drawn Spider-Man over the character’s decades-long history, which is o

SQLite's documentation about its durability properties is unclear

One of the most important properties of a database is durability. Durability means that after a transaction commits, you can be confident that, absent catastrophic hardware failure, the changes made by the commit won't be lost. This should remain true even if the operating system crashes or the system loses power soon after the commit. On Linux, and most other Unix operating systems, durability is ensured by calling the fsync system call at the right time. Durability comes at a performance cost

SQLite's Durability Settings Are a Mess

One of the most important properties of a database is durability. Durability means that after a transaction commits, you can be confident that, absent catastrophic hardware failure, the changes made by the commit won't be lost. This should remain true even if the operating system crashes or the system loses power soon after the commit. On Linux, and most other Unix operating systems, durability is ensured by calling the fsync system call at the right time. Durability comes at a performance cost

The sisters “paradox” – counter-intuitive probability

It seems simple, but it isn't There are a couple of famous counter-intuitive problems in probability theory and the sisters "paradox" is one of them. I'll tell you the problem, let you guess the solution, and then give you some of the background. Here's the problem: a family has two children. You're told that at least one of them is a girl. What's the probability both are girls? (International Film Service / American Releasing Co., Public domain, via Wikimedia Commons) Assume that the pr

Uncertain<T>

You know what’s wrong with people? They’re too sure of themselves. Better to be wrong and own it than be right with caveats. Hard to build a personal brand out of nuance these days. People are attracted to confidence — however misplaced. But can you blame them? (People, that is) Working in software, the most annoying part of reaching Senior level is having to say “it depends” all the time. Much more fun getting to say “let’s ship it and iterate” as Staff or “that won’t scale” as a Principal.

The sisters "paradox" – counter-intuitive probability

It seems simple, but it isn't There are a couple of famous counter-intuitive problems in probability theory and the sisters "paradox" is one of them. I'll tell you the problem, let you guess the solution, and then give you some of the background. Here's the problem: a family has two children. You're told that at least one of them is a girl. What's the probability both are girls? (International Film Service / American Releasing Co., Public domain, via Wikimedia Commons) Assume that the pr

Important machine learning equations

Motivation Machine learning (ML) is a powerful field driven by mathematics. Whether you’re building models, optimizing algorithms, or simply trying to understand how ML works under the hood, mastering the core equations is essential. This blog post is designed to be your go-to resource, covering the most critical and “mind-breaking” ML equations—enough to grasp most of the core math behind ML. Each section includes theoretical insights, the equations themselves, and practical implementations in

The Most Important Machine Learning Equations: A Comprehensive Guide

Motivation Machine learning (ML) is a powerful field driven by mathematics. Whether you’re building models, optimizing algorithms, or simply trying to understand how ML works under the hood, mastering the core equations is essential. This blog post is designed to be your go-to resource, covering the most critical and “mind-breaking” ML equations—enough to grasp most of the core math behind ML. Each section includes theoretical insights, the equations themselves, and practical implementations in

Critical Docker Desktop flaw lets attackers hijack Windows hosts

A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active. The security issue is a server-side request forgery (SSRF) now identified as CVE-2025-9074, and it received a critical severity rating of 9.3. “A malicious container running on Docker Desktop could access the Docker Engine and launch additional containers without requiring the Docker socket to be mou

AI Isn’t Coming for Hollywood. It's Already Arrived

Lady Gaga probably wasn’t thinking that a coup would unfold in her greenhouse. Then again, she was cohosting a party there with Sean Parker, the billionaire founder of Napster and first president of Facebook. It was February 2024, and the singer had invited guests to her $22.5 million oceanside estate in Malibu to mark the launch of a skin-care nonprofit. One of the organization’s trustees was her boyfriend, whose day job was running the Parker Foundation. In the candlelit space, beside floor-t

AI Isn’t Coming for Hollywood. It Has Already Arrived

Lady Gaga probably wasn’t thinking that a coup would unfold in her greenhouse. Then again, she was cohosting a party there with Sean Parker, the billionaire founder of Napster and first president of Facebook. It was February 2024, and the singer had invited guests to her $22.5 million oceanside estate in Malibu to mark the launch of a skin-care nonprofit. One of the organization’s trustees was her boyfriend, whose day job was running the Parker Foundation. In the candlelit space, beside floor-t

Copilot broke audit logs, but Microsoft won't tell customers

Like most tech companies, Microsoft is going all-in on AI. Their flagship AI product, Copilot (in all its various forms), allows people to utilize AI in their daily work to interact with Microsoft services and generally perform tasks. Unfortunately, this also creates a wide range of new security problems. On July 4th, I came across a problem in M365 Copilot: Sometimes it would access a file and return the information, but the audit log would not reflect that. Upon testing further, I discovered

Countrywide natural experiment links built environment to physical activity

Study design We conducted a countrywide, prospective, longitudinal physical activity study of US residents that evaluated their physical activity levels within the context of the walkability of their built environments before and after relocation (‘participants’). We leveraged the naturally occurring physical activity data that was captured by a health app on participants’ phones to compare each person’s physical activity levels before and after they relocated to a different area within the USA

Texas law gives grid operator power to disconnect data centers during crisis

Dive Brief: Data centers and other large, non-critical power consumers connected to the Electric Reliability Council of Texas transmission grid must accept curtailment during firm load shed events under a landmark law Republican Gov. Greg Abbott signed Friday. Senate Bill 6 pairs mandatory curtailment with a voluntary demand response procurement program under which loads of 75 MW or more could ramp down or switch to backup generation at utilities’ request. It also includes new interconnection

Fun with Finite State Transducers

ENOSUCHBLOG Programming, philosophy, pedaling. Aug 14, 2025 Tags: devblog, programming, rust, zizmor I recently solved an interesting problem inside zizmor with a type of state machine/automaton I hadn’t used before: a finite state transducer (FST). This is just a quick write-up of the problem and how I solved it. It doesn’t go particularly deep into the data structures themselves. For more information on FSTs themselves, I strongly recommend burntsushi’s article on transducers (which is wha

Plex warns users to patch security vulnerability immediately

Plex has notified some of its users on Thursday to urgently update their media servers due to a recently patched security vulnerability. The company has yet to assign a CVE-ID to track the flaw and didn't provide additional details regarding the patch, only saying that it impacts Plex Media Server versions 1.41.7.x to 1.42.0.x. Yesterday, four days after releasing security updates that addressed the mysterious security bug, Plex emailed those running affected versions to update their software

Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug

Over 3,300 Citrix NetScaler devices remain unpatched against a critical vulnerability that allows attackers to bypass authentication by hijacking user sessions, nearly two months after patches were released. Tracked as CVE-2025-5777 and referred to as CitrixBleed 2, this out-of-bounds memory read vulnerability results from insufficient input validation, enabling unauthenticated attackers to access restricted memory regions remotely on devices configured as a Gateway (VPN virtual server, ICA Pro

High-severity WinRAR 0-day exploited for weeks by 2 groups

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July 18, when its telemetry spotted a file in an unusual directory path. By July 24, ESET determined that the behavior was linked to the exploitation of an unknown vulnerability

High-severity WinRAR 0-day exploited for weeks by 2 groups

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July 18, when its telemetry spotted a file in an unusual directory path. By July 24, ESET determined that the behavior was linked to the exploitation of an unknown vulnerability

Claude can now reference past chats, if you want it to

Claude is getting a better, if selective, memory. Rather than acting as perfect catalog of everything you've talked about or shared, Anthropic says the AI chatbot now has the ability to reference past chats when asked, so you don't have to re-explain yourself. The feature seems like it could help you pick up a work project after time away, or query Claude for the details of a past research session that you don't quite remember. The key point is that Claude has to be prompted: It doesn't call on