Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: mise Clear Filter

Self-propagating supply chain attack hits 187 npm packages

Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack, with a malicious self-propagating payload to infect other packages. The coordinated worm-style campaign dubbed 'Shai-Hulud' started yesterday with the compromise of the @ctrl/tinycolor npm package, which receives over 2 million weekly downloads. Since then, the campaign has expanded significantly and now includes packages published under CrowdStrike's npm namespace. From tinycolor to

How Gemini's 'on-premise' upgrade could help your enterprise and advance sovereign AI

Google / Elyse Betters Picaro / ZDNET Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Gemini on Google Distributed Cloud is now available to customers. The approach brings advanced models into enterprise data centers. Gemini on GDC could support new capabilities for on-premise gen AI. There are several obstacles to the successful deployment of artificial intelligence (AI) in the enterprise, including managing staff who are unsure how to use the technology, and c

Self-Guaranteeing Promises

Companies break promises all the time. A self-guaranteeing promise does not require you to trust anyone. You can verify a self-guaranteeing promise yourself. File over app is a self-guaranteeing promise. If files are in your control, in an open format, you can use those files in another app at any time. Not an export. The exact same files. It’s good practice to test this with any self-proclaimed file-over-app app you use. “Stainless steel” is a self-guaranteeing promise. You can test it yourse

Jan – Ollama alternative with local UI

Jan - Local AI Assistant Getting Started - Docs - Changelog - Bug reports - Discord Jan is an AI assistant that can run 100% offline on your device. Download and run LLMs with full control and privacy. Installation The easiest way to get started is by downloading one of the following versions for your respective operating system: Download from jan.ai or GitHub Releases. Features Local AI Models : Download and run LLMs (Llama, Gemma, Qwen, etc.) from HuggingFace : Download and run LLMs (L

Topics: build jan make mise run

Microsoft warns of high-severity flaw in hybrid Exchange deployments

Microsoft has warned customers to mitigate a high-severity vulnerability in Exchange Server hybrid deployments that could allow attackers to escalate their privileges in Exchange Online cloud environments without leaving any traces. Exchange hybrid configurations connect on-premises Exchange servers to Exchange Online (part of Microsoft 365), allowing for seamless integration of email and calendar features between on-premises and cloud mailboxes, including shared calendars, global address lists

Formula E cars keep getting faster and faster: What’s next for the sport?

In addition to being bigger and heavier, teams are also going to have high- and low-downforce configurations. Racing drivers will always want more grip, but the addition of aerodynamics to push cars down onto the track surface can fundamentally change the racing, and not always in a way that makes for an entertaining spectacle for the audience. That said, Formula E isn’t adding downforce to Gen 4 just because. Change is never easy "This was a hot topic. No mitigation: car performance, car perf

Formula E wraps up season 11—where does the all-EV series go next?

In addition to being bigger and heavier, teams are also going to have high- and low-downforce configurations. Racing drivers will always want more grip, but the addition of aerodynamics to push cars down onto the track surface can fundamentally change the racing, and not always in a way that makes for an entertaining spectacle for the audience. That said, Formula E isn’t adding downforce to Gen 4 just because. Change is never easy "This was a hot topic. No mitigation: car performance, car perf

The Promised LAN

🖧 The Promised LAN The Promised LAN is a closed, membership only network of friends that operate a 24/7 always-on LAN party, running since 2021. The vast majority of documentation is maintained on the LAN, but this website serves to give interested folks, prospective members or friends an idea of what the Promised LAN is, and how it works. A Manifesto for The Promised LAN For background on why we started the lan, what we hope to achieve, and how we approach the social-technical dynamics, we h

US nuclear weapons agency reportedly hacked in SharePoint attacks

Unknown threat actors have reportedly breached the National Nuclear Security Administration's network in attacks exploiting a recently patched Microsoft SharePoint zero-day vulnerability chain. NNSA is a semi-autonomous U.S. government agency part of the Energy Department that maintains the country's nuclear weapons stockpile and is also tasked with responding to nuclear and radiological emergencies within the United States and abroad. A Department of Energy spokesperson confirmed in a stateme

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware

The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised devices. This occurred after maintainer accounts were hijacked via phishing, followed by unauthorized owner changes that went unnoticed for several hours, potentially compromising many developers who downloaded the new releases. The 'is' package is a lightweight JavaScript utility library that provides a wide variety of type checking and value v

New Research Shows Data Breaches Keep Coming. Here's How to Protect Yourself

The personal data of Americans continues to be under threat from cybercriminals looking to steal it for their own financial gain, according to a new report from the Identity Theft Resource Center. The nonprofit group, which focuses on helping victims of identity theft, said Wednesday that 1,732 data compromises were reported for the first six months of this year, resulting in 165.7 million victim notifications. The number of reported compromises represents an 11% increase from the same period

Bank Warns That Robotaxi Companies May Have Overlooked Severe Obstacles to Actually Making Money

Bank Warns That Robotaxi Companies May Have Overlooked Severe Obstacles to Actually Making Money They're not convinced. Cost Benefit As Elon Musk's Tesla triples down on an autonomous ridehailing service, analysts are ringing the alarm bells, warning that even if the technology were swiftly perfected, it could take many years for robotaxis to become profitable. As Business Insider reports, analysts at HSBC warn that the market for driverless taxis — if there even is one — is being "widely ov

Tools I love: mise(-en-place)

Tools I love: mise(-en-place) tools cli mise Once in a while you get introduced to a tool that instantly changes the way you work. For me, mise is one of those tools. mise is the logical conclusion to a lot of the meta-tooling that exists around language-specific version and package managers like asdf, nvm, uv, pyenv etc. It makes it exceptionally easy to install, use, and manage software. It also allows you to manage environment variables and declare tasks (run commands). The first step in g

Topics: jj mise toml tools use

Actively exploited vulnerability gives extraordinary control over server fleets

Hackers are exploiting a maximum-severity vulnerability that has the potential to give them complete control over thousands of servers, many of which handle mission-critical tasks inside data centers, the US Cybersecurity and Infrastructure Security Agency is warning. The vulnerability, carrying a severity rating of 10 out of a possible 10, resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavai

Active exploitation of AMI management tool imperils thousands of servers

Hackers are exploiting a maximum-severity vulnerability that has the potential to give them complete control over thousands of servers, many of which handle mission-critical tasks inside data centers, the US Cybersecurity and Infrastructure Security Agency is warning. The vulnerability, carrying a severity rating of 10 out of a possible 10, resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavai

Keylogger campaign hitting Outlook Web Access on vulnerable Exchange servers goes global

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust Facepalm: Keylogging malware is a particularly dangerous threat, as it is typically designed to capture login credentials or other sensitive data from users. When you add a compromised Exchange server to the mix, it creates an even nastier situation for any organization. Researchers from Positive Technologies recently unveiled a new study on a keylogger-based campaign targeting organizations worldw

Keylogger campaign hitting Microsoft Exchange servers goes global

Serving tech enthusiasts for over 25 years.TechSpot means tech analysis and advice you can trust Facepalm: Keylogging malware is a particularly dangerous threat, as it is typically designed to capture login credentials or other sensitive data from users. When you add a compromised Exchange server to the mix, it creates an even nastier situation for any organization. Researchers from Positive Technologies recently unveiled a new study on a keylogger-based campaign targeting organizations worldw

Scania confirms insurance claim data breach in extortion attempt

Automotive giant Scania confirmed it suffered a cybersecurity incident where threat actors used compromised credentials to breach its Financial Services systems and steal insurance claim documents. Scania told BleepingComputer that the attackers emailed several Scania employees, threatening to leak the data online unless their demands were met. Scania is a major Swedish manufacturer of heavy trucks, buses, and industrial and marine engines and is a member of the Volkswagen Group. The company,

Double-A shooter MindsEye goes from promising GTA killer to triple-A dumpster fire seconds after launch

In context: Developer Build A Rocket Boy and publisher IO Interactive positioned their genre-bending sci-fi shooter MindsEye as the next big blockbuster of 2025. Instead, it's breaking blocks in ways no one expected. Mission-breaking bugs and crippling glitches made the game nearly unplayable. MindsEye launched Tuesday with high hopes – and fell apart within seconds. The brainchild of former Grand Theft Auto producer Leslie Benzies, the third-person action-adventure follows Jacob Diaz, a soldie