Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: domain Clear Filter

You Had No Taste Before AI

There’s been an influx of people telling others to develop taste to use AI. Designers. Marketers. Developers. All of them touting the same message. It’s ironic, though. These are the same people who never questioned why their designs all look identical, never iterated beyond the first draft, and never asked if their work actually solved the problem at hand. They’re not alone. The loudest voices preaching about taste and AI are often the ones who never demonstrated taste before AI. What is Tast

DataTables CDN Outage – post incident review

Outage - post incident review By Allan Jardine On 29th July 2025, the DataTables.net site had a major outage as a result of an attack. This took out the main site with its examples and documentation, the support forum, and the sub-domains, including, most importantly, the DataTables CDN. Digging into such an event, when something has gone so wrong, is not a fun thing to do, but it is important for me to do so I can learn what I can do better in future, for you so you can understand what happe

Active phishing campaign targeting crates.io users

We received multiple reports of a phishing campaign targeting crates.io users (from the rustfoundation.dev domain name), mentioning a compromise of our infrastructure and asking users to authenticate to limit damage to their crates. These emails are malicious and come from a domain name not controlled by the Rust Foundation (nor the Rust Project), seemingly with the purpose of stealing your GitHub credentials. We have no evidence of a compromise of the crates.io infrastructure. We are taking s

Security Bite: How browsers use a psychological trick to protect millions from phishing every day

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

Ask HN: Gandi is holding my domain hostage. What can I do?

The short version of the story is that I was on a two-year internet hiatus. During that time my Gandi account with a decade-old domain name got locked. I have been emailing back and fourth with their Abuse department for the better part of a week and they’re slow-walking me at best. I had assurances from the CEO, who I reached via text, that if it wasn’t resolved today to text him back. He has now gone dark on me. I used to love Gandi, but they’re holding my domain name hostage. This doesn’t s

The Tiny Caribbean Island Investors Are Chasing for Their AI Plans

The beaches of this British overseas territory are usually its biggest draw. Tourists flock here for soft sand, turquoise seas, and the sense of seclusion found on an island with just 16,000 residents. But in the age of artificial intelligence, Anguilla’s most valuable asset may be two letters that make up its internet domain: .ai. Back in the 1980s, when the internet was still taking shape, countries and territories were each assigned their own suffix, such as.us for the United States, .uk fo

A German ISP changed their DNS to block my website

My website: Publishing Germany's secret internet blocklist In Germany, we have the Clearingstelle Urheberrecht im Internet (CUII) - literally 'Copyright Clearinghouse for the Internet', a private organization that decides what websites to block, corporate interests rewriting our free internet. No judges, no transparency, just a bunch of ISPs and major copyright holders deciding what your eyes can see. I decided to create a website, cuiiliste.de, to find blocked domains, as the CUII refuses to

A German ISP tampered with their DNS – specifically to sabotage my website

My website: Publishing Germany's secret internet blocklist In Germany, we have the Clearingstelle Urheberrecht im Internet (CUII) - literally 'Copyright Clearinghouse for the Internet', a private organization that decides what websites to block, corporate interests rewriting our free internet. No judges, no transparency, just a bunch of ISPs and major copyright holders deciding what your eyes can see. I decided to create a website, cuiiliste.de, to find blocked domains, as the CUII refuses to

PyPI now blocks domain resurrection attacks used for hijacking accounts

The Python Package Index (PyPI) has introduced new protections against domain resurrection attacks that enable hijacking accounts through password resets. PyPI is the official repository for open-source Python packages. It is used by software developers, product maintainers, and companies working with Python libraries, tools, and frameworks. Accounts of project maintainers publishing software on PyPI are linked to email addresses. In the case of some projects, the email address is tied to a do

PyPI Preventing Domain Resurrection Attacks

Preventing Domain Resurrection Attacks Summary PyPI now checks for expired domains to prevent domain resurrection attacks, a type of supply-chain attack where someone buys an expired domain and uses it to take over PyPI accounts through password resets. These changes improve PyPI's overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts. Since early June 2025, PyPI has unverified over 1,800 email addresses when

The Big Oops in type systems: This problem extends to FP as well

The Big Oops in Type Systems: This Problem Extends to FP as Well Building on Casey Muratori's critique (youtube) of "compile time hierarchies that match the domain model," this problem extends beyond OOP to encompass a broader pattern in static type systems, particularly functional programming approaches that attempt to "make illegal states unrepresentable." Type systems are often ranked in a "correctness hierarchy", with Idris/Haskell at the top, Java/C# in the middle, Python/JavaScript at th

Ars spoke with the military’s chief orbital traffic cop—here’s what we learned

Agrawal was in the room, too. "I was on the crew that needed to count the pieces," he told Ars. "I didn’t know the significance of what was happening until after many years, but the Chinese had clearly changed the nature of the space environment." The 2007 anti-satellite test also clearly changed the trajectory of Agrawal's career. We present part of our discussion with Agrawal below, and we'll share the rest of the conversation tomorrow. The text has been lightly edited for brevity and clarity

Keep Pydantic out of your Domain Layer

Keep Pydantic out of your Domain Layer Jul 22 2025 You’re probably reading this because you’re using Pydantic yourself. Maybe you’re building a FastAPI application and hit a point where it started getting too big to manage, and you realized you need better separation of concerns. Perhaps you’ve started adopting a clean architecture or onion architecture kind of layering to keep business logic separate from application logic, aiming for better maintainability and testability. But Pydantic is st

Phishers Target Aviation Execs to Scam Customers

KrebsOnSecurity recently heard from a reader whose boss’s email account got phished and was used to trick one of the company’s customers into sending a large payment to scammers. An investigation into the attacker’s infrastructure points to a long-running Nigerian cybercrime ring that is actively targeting established companies in the transportation and aviation industries. A reader who works in the transportation industry sent a tip about a recent successful phishing campaign that tricked an e

“The Bitter Lesson” is wrong. Well sort of

“The Bitter Lesson” is wrong. Well… sort of. Assaf Pinhasi 3 min read · 1 hour ago 1 hour ago -- Listen Share TL;DR There is no dichotomy between domain knowledge vs. “general purpose methods that leverage data+compute”. They are both powerful tools that compensate for each other and need to be balanced and traded off during the model building process. “The bitter lesson” in 30 seconds “The bitter lesson” is one of the most popular opinion pieces about AI research and it’s future. In his w

Hijacking Trust? Bitvise Under Fire for Controlling Domain of FOSS Project PuTTY

Hijacking Trust? Bitvise Under Fire for Controlling Domain of Open-Source Project PuTTY PupRed bigtech bitvise domainsnatcher putty ssh In the open-source world, trust, transparency, and community stewardship form the foundation of public credibility. But a recent case involving the domain name putty.org calls these values into question. The domain, long associated by users with PuTTY, the widely-used open-source SSH and Telnet client, is not controlled by the PuTTY project itself — but by a

Cloudflare Starts Blocking Pirate Sites for UK Users

Cloudflare has become the first internet intermediary beyond local residential ISPs, to block access to pirate sites in the UK. Users attempting to access certain pirate sites are greeted with 'Error 451 - Unavailable for Legal Reasons'. In theory, ISP blocking should prevent UK users from even seeing this notice, but a combination of Cloudflare's blocking mechanism and choices made by some VPN users results in a piracy dead end. Internet service providers BT, Virgin Media, Sky, TalkTalk, EE, a

Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies

A technical exploration of modern phishing tactics, from basic HTML pages to advanced MFA-bypassing techniques, with analysis of infrastructure setup and delivery methods used by phishers in 2025. Introduction In 2025, phishing is still the most prevalent kind of cyber attack on the planet. Indeed, 1.2% of the global email traffic is phishing. That's 3.4 billion emails each day, but only a low number results in a compromise since "only" 3% of employees would click on a malicious link. However,

Finding Dead Websites

As some of the work planned for Marginalia Search this year has been progressing a bit faster than anticipated, there was time to implement an unplanned change. This post details the implementation of a system for detecting when servers are online, to avoid serving dead links and improve data quality, and for detecting when websites have significant changes including ownership transfers and parking. Table Of Contents Feature Rationale Availability detection is useful not just for filtering o

New Veeam RCE flaw lets domain users hack backup servers

​Veeam has released security updates today to fix several Veeam Backup & Replication (VBR) flaws, including a critical remote code execution (RCE) vulnerability. Tracked as CVE-2025-23121, this security flaw was reported by security researchers at watchTowr and CodeWhite, and it only impacts domain-joined installations. As Veeam explained in a Tuesday security advisory, the vulnerability can be exploited by authenticated domain users in low-complexity attacks to gain code execution remotely on

Model Once, Represent Everywhere: UDA (Unified Data Architecture) at Netflix

Model Once, Represent Everywhere: UDA (Unified Data Architecture) at Netflix Netflix Technology Blog Follow 15 min read · 2 days ago 2 days ago -- 8 Listen Share By Alex Hutter, Alexandre Bertails, Claire Wang, Haoyuan He, Kishore Banala, Peter Royal, Shervin Afshar As Netflix’s offerings grow — across films, series, games, live events, and ads — so does the complexity of the systems that support it. Core business concepts like ‘actor’ or ‘movie’ are modeled in many places: in our Enterprise G

Microsoft fixes unreachable Windows Server domain controllers

Microsoft has resolved a known issue that caused some Windows Server 2025 domain controllers to become unreachable after a restart and triggered app or service failures. As Redmond explained when it acknowledged the bug in April, servers loading the standard firewall profile instead of the domain firewall one after rebooting will have issues managing network traffic correctly. Because of this issue, services and applications running on impacted domain controller servers or remote devices may f