Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: operation Clear Filter

Async I/O on Linux in databases

I've been working on a complex multi-model database for a few weeks now, and recently I took time to simplify and test out an idea I had on a simple key-value database. I started with the basics: A hash table in memory, a simple append-only log for persistence and durability, and the classic fsync() call after every write to the log for durability. It worked, but wasn't as fast as it could be. In Kevo, that's the approach I use, but in Klay (not public yet, but will be open sourced when ready)

Resolve (YC W15) Is Hiring an Operations and Billing Lead for Construction VR

Location: Remote Type: Full-time About Us Resolve is an 11-person SaaS startup helping construction companies and builders review faster. Our clients include general contractors, specialty subcontractors, owner operators and engineering companies—companies that build the world around us. We’re growing fast and looking for a detail-oriented, proactive Billing and Operations Lead to take charge of key administrative processes that keep our business humming. What You’ll Do You’ll own and impro

Europol disrupts pro-Russian NoName057(16) DDoS hacktivist group

An international law enforcement operation dubbed "Operation Eastwood" has targeted the infrastructure and members of the pro-Russian hacktivist group NoName057(16), responsible for distributed denial-of-service (DDoS) attacks across Europe, Israel, and Ukraine. Operation Eastwood was led by Europol and Eurojust with support from 12 countries. It took place on July 15, 2025, and targeted the systems and individuals behind the group's activities. NoName057(16) is a pro-Russian hacking group tha

Trump administration to spend $1 billion on ‘offensive’ hacking operations

The Trump administration, through the Department of Defense, plans to spend $1 billion over the next four years on what it calls “offensive cyber operations.” The provision in Trump’s landmark One Big Beautiful Bill does not say what those “offensive cyber operations” are, nor what specific tools or software would qualify. The budget does note that the money will go towards enhancing and improving the capabilities of the U.S. Indo-Pacific Command, which operates in the Asia-Pacific region, incl

Hill Space: Neural nets that do perfect arithmetic (to 10⁻¹⁶ precision)

When understood and used properly, the constraint W = tanh(Ŵ) ⊙ σ(M̂) (introduced in NALU by Trask et al. 2018 ) creates a unique parameter topology where optimal weights for discrete operations can be calculated rather than learned . During training, they're able to converge with extreme speed and reliability towards the optimal solution. Most neural networks struggle with basic arithmetic. They approximate, they fail on extrapolation, and they're inconsistent. But what if there was a way to m

HMD plans to stop selling phones in the US, and you probably know why

Adamya Sharma / Android Authority TL;DR HMD Global has revealed that it is scaling back its operations in the US. The company cites the “challenging geopolitical and economic environment” as the reason for the decision. It will continue to honor warranty coverage and service for existing products. If you’re an HMD Global, the Android phone maker that licenses the Nokia brand, fan who lives in the US, we have some bad news for you. The company has decided to stop selling its phones in the US.

Apple COO Jeff Williams stepping down later this month

Apple has announced that Jeff Williams is stepping down as chief operating officer later this month. Sabih Khan, Apple’s senior vice president of Operations, will assume the COO role as part of what Apple describes as a “long-planned succession.” Williams joined Apple in 1998 as the company’s head of Worldwide Procurement. Prior to joining Apple, he worked at IBM for thirteen years across multiple operations and engineering roles. In his current role at Apple, he oversees the company’s entire w

First-Class Models: The Missing Productivity Revolution

TL;DR: First-class models with branching and merging capabilities represent an almost entirely unused enormous productivity and expressiveness unlock in programming and computer systems. The Current State: Well-Designed Systems, Constrained Users Imagine you’re building an accounting system from scratch. You’d design it properly: a normalized database schema, algebraically defined operations for debits and credits, account reconciliation, and comparison functions. You’d implement data-only, in

Ryuk ransomware’s initial access expert extradited to the U.S.

A member of the notorious Ryuk ransomware operation who specialized in gaining initial access to corporate networks has been extradited to the United States. The suspect is a 33-year-old foreign man who was arrested in April 2025 in his home in Kyiv at the request of the FBI. He was extradited to the United States yesterday, June 18. In 2023, the Ukrainian cyber police, the National Police, and international law enforcement partners began investigating a ransomware operation whose members carr

TikTok gets third extension from Trump as US sale deadline looms

What just happened? TikTok is receiving yet another reprieve from Donald Trump. For the third time since taking office, the president is extending the sales deadline this week, giving the company another 90 days to divest its US business from Chinese parent ByteDance. White House Press Secretary Karoline Leavitt confirmed that Trump will sign an executive order this week that will "keep TikTok up and running" for another 90 days. Leavitt added that the administration will spend the extra time

New Anubis ransomware can encrypt and destroy data, making file recovery impossible

WTF?! Being affected by a dangerous ransomware operation is bad enough, but at least you might have a chance to recover your files somehow. A recently discovered ransomware strain is making things even trickier by offering a new wiping option that allows affiliate criminals to completely destroy data after encryption. Security researchers have discovered a new Ransomware-as-a-Service campaign with highly destructive potential. Anubis has only been around for a few months and fortunately, hasn't

RFK Jr. Orders HHS to Give Undocumented Migrants’ Medicaid Data to DHS

With demonstrations ramping up against the Trump administration, this week was all about protests. With President Donald Trump taking the historic step to deploy US Marines and the National Guard to Los Angeles, we dove into the “long-term dangers” of sending troops to LA, as well as what those troops are permitted to do while they’re there. Of course, it’s not just the military getting involved in the LA protests against the heavy crackdowns by Immigration and Customs Enforcement (ICE). There’

Operation Secure disrupts global infostealer malware operations

An international law enforcement action codenamed "Operation Secure" targeted infostealer malware infrastructure in a massive crackdown across 26 countries, resulting in 32 arrests, data seizures, and server takedowns. Led by Interpol and conducted from January to April 2025, the operation focused on disrupting infostealer malware groups that steal financial and personal data through widespread infections. The data stolen by infostealers commonly includes account credentials, browser cookies,

Tesla’s Robotaxis Are Rolling Out Soon—With One Big Unanswered Question

Self-driving vehicle developers don’t usually love talking about “teleoperation”—when a human guides or drives robot cars remotely. It can feel like a dirty secret. Shouldn’t an autonomous vehicle operate, well, autonomously? But experts say teleoperations are, at least right now, a critical part of any robot taxi service, including Tesla's Robotaxi. The tech, though impressive, is still in development, and the autonomous systems still need humans to guide them through less-common and especiall

Integrating LLMs into security operations using Wazuh

Artificial intelligence (AI) is the simulation of human intelligence in machines, enabling systems to learn from data, recognize patterns, and make decisions. These decisions can include predicting outcomes, automating processes, and detecting anomalies. Large Language Models (LLMs) are specialized AI models designed to process, understand, and generate human-like text. Large Language Models (LLMs) are trained on diverse and extensive textual data. They are designed to understand language and a