Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: entity Clear Filter

Qantas Data Breach Impacts 5.7 Million Customers. Here's What We Know

Qantas suffered a data breach that has impacted 5.7 million customers. Ryan Fletcher/Getty Images Qantas, Australia's largest airline, has confirmed that the personal information of 5.7 million customers was compromised in a data breach detected at the end of June. Bad actors gained access to customers' names, email addresses, phone numbers, birthdates, meal preferences and frequent flyer numbers via a third-party platform used by a Qantas call center. According to the airline, the stolen inf

Qantas Contacted by Hackers Responsible for Data Breach Affecting Millions of Customers

Qantas disclosed a cybersecurity incident on July 2 potentially affecting 6 million customers. Ryan Fletcher/Getty Images Qantas has been contacted by a cyber criminal claiming responsibility for the data breach that affected 6 million customers. A company spokesperson confirmed Qantas is working to validate this, adding that since it's a criminal matter, the company "won't be commenting any further on the detail of the contact." There's also no evidence that any of the stolen information has

Qantas Breach Comprises Data of Up to 6 Million Customers

Qantas disclosed a cybersecurity incident on July 2 potentially affecting 6 million customers. Ryan Fletcher/Getty Images Australian airline Qantas has disclosed a cyberattack potentially comprising the data of 6 million customers. Cybercriminals gained access to customers' names, email addresses, phone numbers, birthdates and frequent flyer numbers via a third-party platform used by a company call center, it said. In the wrong hands, this data could lead to phishing attacks orchestrated by ba

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more From passwords to passkeys to a veritable alphabet soup of other options — second-factor authentication (2FA)/one-time passwords (OTP), multi-factor authentication (MFA), single sign-on (SSO), silent network authentication (SNA) — when it comes to a preeminent or even preferred type of identity authentication, there is little consensus amo

Vitalik Buterin has reservations about Sam Altman’s World project

Ethereum co-founder Vitalik Buterin is arguing that the digital identification approach being promoted by Sam Altman’s World project has real privacy risks. Previously known as Worldcoin, World was created under Altman and Alex Blania’s Tools for Humanity. The organization says it can help distinguish between AI agents and human beings by scanning users’ eyeballs and creating a unique identity for them on the blockchain. In a lengthy post, Buterin noted that World’s approach of using zero-know

Cisco warns of max severity RCE flaws in Identity Services Engine

Cisco has published a bulletin to warn about two critical, unauthenticated remote code execution (RCE) vulnerabilities affecting Cisco Identity Services Engine (ISE) and the Passive Identity Connector (ISE-PIC). The flaws, tracked under CVE-2025-20281 and CVE-2025-20282, are rated with max severity (CVSS score: 10.0). The first impacts ISE and ISE-PIC versions 3.4 and 3.3, while the second affects only version 3.4. The root cause of CVE-2025-20281 is an insufficient validation of user-supplied

3 key takeaways from the Scattered Spider attacks on insurance firms

Scattered Spider continues to dominate the headlines, with the latest news linking the hackers to attacks on U.S. insurance giant Aflac, Philadelphia Insurance Companies, and Erie Insurance, disclosed through SEC Form 8-K filings which indicate the theft of sensitive customer data and operational disruption. This comes at the same time that Google Threat Intelligence Group shared that it “is now aware of multiple intrusions in the U.S. which bear the hallmarks of Scattered Spider activity”, spe

Enterprises must rethink IAM as AI agents outnumber humans 10 to 1

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Stolen credentials are responsible for 80% of enterprise breaches. Every major security vendor has converged on the same conclusion: Identity is now the control plane for AI security. Scale alone demands this shift. Enterprises managing 100,000 employees will handle more than one million identities when AI agents enter production. Traditi

75 million deepfakes blocked: Persona leads the corporate fight against hiring fraud

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more As remote work has become the norm, a shadowy threat has emerged in corporate hiring departments: sophisticated AI-powered fake candidates who can pass video interviews, submit convincing resumes, and even fool human resources professionals into offering them jobs. Now, companies are racing to deploy advanced identity verification technol

Using Home Assistant, adguard home and an $8 smart outlet to avoid brain rot

Beating Brainrot by Button The internet is the bane of my existence. Ads, distractions, sponsored content, bad news, bad ideas, more ads, social media, antisocial media, even more ads. Also, I’m a software developer, so the internet is basically indispensable for me, a central pillar of my income and a convenient way to communicate with friends, family, loved ones, associates, acquaintances, people from my sports club, superpositions of all previous groups and enemies alike. And I think my com

Ethan Hunt Doesn’t Die in the New ‘Mission Impossible,’ But They Considered It

When the eighth Mission: Impossible film changed its title to “The Final Reckoning,” we all had the same thought: Tom Cruise’s character, Ethan Hunt, was going to die. It would have been the most obvious way to add some real finality to the franchise, but we now know that doesn’t happen. Instead, Ethan lives, as does his sworn enemy, the Entity. And, in a new interview, writer-director Christopher McQuarrie discussed those crucial decisions and many more. In an extended, spoiler-filled conversa

Identity Assertion Authorization Grant

This specification provides a mechanism for an application to use an identity assertion to obtain an access token for a third-party API using Token Exchange [ RFC8693 ] and JWT Profile for OAuth 2.0 Authorization Grants [ RFC7523 ]. ¶ This note is to be removed before publishing as an RFC.¶ The latest revision of this draft can be found at https://drafts.aaronpk.com/draft-parecki-oauth-identity-assertion-authz-grant/draft-parecki-oauth-identity-assertion-authz-grant.html. Status information fo

Datalog in miniKanren

A browser with Wasm GC and tail call support is required for this demo. We recommend using either Mozilla Firefox or Google Chrome. Datalog in miniKanren Having access to an embedded logical programming language makes some tasks really easy. One prerequisite for RealTalk is some form of Datalog, and I built one in Scheme using miniKanren so that I had access to all of the internals. This page explains the naive Datalog implementation I did before modifying some of it to fit my version of Dynam