Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: target Clear Filter

Japan’s Hayabusa2 Is Chasing an Asteroid for a 2031 Landing, but New Data Spells Trouble

On December 6, 2020, the Hayabusa2 spacecraft dropped off pristine samples from asteroid Ryugu in the Australian outback, becoming the world’s second asteroid sample return mission, after the first Hayabusa mission returned dusty samples from asteroid Itokawa in 2010. But Hayabusa2 still has more to offer. That same spacecraft is currently on its way to another distant space rock, aiming to snag more samples to help scientists compile the solar system’s origin story. Recent observations of the

Hayabusa2’s 2031 Landing Plan Faces an Unexpected Asteroid Nightmare

On December 6, 2020, the Hayabusa2 spacecraft dropped off pristine samples from asteroid Ryugu in the Australian outback, becoming the world’s second asteroid sample return mission, after the first Hayabusa mission returned dusty samples from asteroid Itokawa in 2010. But Hayabusa2 still has more to offer. That same spacecraft is currently on its way to another distant space rock, aiming to snag more samples to help scientists compile the solar system’s origin story. Recent observations of the

France says Apple notified victims of new spyware attacks

In Brief Apple has notified a number of individuals that their devices were targeted in a spyware campaign, according to the French government. France’s national cybersecurity response unit said on Thursday that it was aware that Apple on September 3 sent a new notification to affected customers whose Apple devices may have been hacked. The cybersecurity unit said receiving a threat notification means that at least one of the devices linked to a customer’s iCloud account “has been targeted an

Bank of America boosts Apple stock target on Google antitrust win

Just a few days ago, Bank of America reiterated its cautiously optimistic outlook on Apple’s stock market performance, with a $250 price target. Following yesterday’s ruling on the Google antitrust case, it has raised its projection. $260 is the new $250 In last week’s investor note, Bank of America Research analyst Wamsi Mohani said that while he didn’t predict a stellar iPhone 17 performance out of the gate, he still backed Apple’s stock with a “Buy” rating and a price target of $250. Speci

Target Promo Codes and Deals: Up to 50% Off

Target has set itself apart from big box retailers like Walmart by having trendy clothes, homegoods branded by reality TV stars and, of course, in-store Starbucks. With malls and traditional department stores in decline, Target has even become the go-to destination for stay-at-home parents who need to get out of the house (and maybe get a Frappuccino). In recent years, the store has cemented themselves as a notch above similar retailers with exclusive products with a more high-end feel, while st

Topics: 50 circle free ll target

Hackers chained Apple and WhatsApp flaws in ‘advanced spyware campaign’

A few days ago, Apple fixed a vulnerability on iOS and macOS that “may have been exploited in an extremely sophisticated attack against specific targeted individuals.” Now, new details have emerged, and it appears that the hacking campaign also leveraged a now-fixed WhatsApp flaw to target its victims. Here are the details. Meta warns dozens of potentially affected users As reported by TechCrunch, Meta has confirmed that it fixed a WhatsApp flaw (CVE-2025-55177) that, when used in combination

WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware

WhatsApp said on Friday that it fixed a security bug in its iOS and Mac apps that was being used to stealthily hack into the Apple devices of “specific targeted users.” The Meta-owned messaging app giant said in its security advisory that it fixed the vulnerability, known officially as CVE-2025-55177, which was used alongside a separate flaw found in iOS and Macs, which Apple fixed last week and tracks as CVE-2025-43300. Apple said at the time that the flaw was used in an “extremely sophistica

WhatsApp patches vulnerability exploited in zero-day attacks

WhatsApp has patched a security vulnerability in its iOS and macOS messaging clients that was exploited in targeted zero-day attacks. The company says this zero-click flaw (tracked as CVE-2025-55177) affects WhatsApp for iOS prior to version 2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78. "Incomplete authorization of linked device synchronization messages in WhatsApp [..] could have allowed an unrelated user to trigger processing of content from an arbitrar

UK sentences “serial hacker” of 3,000 sites to 20 months in prison

A 26-year old in the UK who claimed to have hacked thousands of websites was sentenced to 20 months in prison after pleading guilty earlier this year. Al-Tahery Al-Mashriky of Rotherham, UK, was arrested in 2022 based on information received from U.S. law enforcement and charged for stealing log in details of millions of Facebook users, and hacking websites belonging to the government in Yemen, an Israeli news outlet, and organizations in the U.S. and Canada. Al-Mashriky pleaded guilty to the

SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks

Enterprise security company SonicWall is urging its customers to disable a core feature of its most recent line-up of firewall devices after security researchers reported an uptick in ransomware incidents targeting SonicWall customers. In a statement this week, SonicWall said it had observed a “notable increase” of security incidents targeting its Generation 7 firewalls where customers have its VPN enabled. The company said it is “actively investigating these incidents to determine whether they

The Longest Sightline on Earth

See, all the examples above are limited by the curvature of the earth, and that is why the horizon seems to be the limiting factor. But there are two additional variables in play that can allow for some truly amazing sightlines: the height of the target and the temperature of the air. The height of the target is intuitively obvious, as we all realize we can see Calgary's skyline from way further away than 4.7 km. In fact, Calgary's skyline can be seen at least 50 km away since the height of the

Spikes in malicious activity precede new security flaws in 80% of cases

Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing attempts targeting edge networking devices are a precursor to the disclosure of new security vulnerabilities (CVEs) within six weeks. This has been discovered by threat monitoring firm GreyNoise, which reports these occurrences are not random, but are rather characterized by repeatable and statistically significant patterns. GreyNoise bases this on

Spikes in malicious activity precede new CVEs in 80% of cases

Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing attempts targeting edge networking devices are a precursor to the disclosure of new security vulnerabilities (CVEs) within six weeks. This has been discovered by threat monitoring firm GreyNoise, which reports these occurrences are not random, but are rather characterized by repeatable and statistically significant patterns. GreyNoise bases this on

Show HN: I built this to talk Danish to my girlfriend – works with any language

Ever wanted to text your foreign partner or chat with international friends but felt held back by missing vocabulary? Don't let language barriers stop you from connecting. No sign-ups, no subscriptions. Just open the app and start learning. Perfect for spontaneous moments when you need to express something important. Every correction is saved. Review your mistakes, practice pronunciation, and track your progress as you naturally improve. Hear how every correction should sound with high-qualit

Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies

A technical exploration of modern phishing tactics, from basic HTML pages to advanced MFA-bypassing techniques, with analysis of infrastructure setup and delivery methods used by phishers in 2025. Introduction In 2025, phishing is still the most prevalent kind of cyber attack on the planet. Indeed, 1.2% of the global email traffic is phishing. That's 3.4 billion emails each day, but only a low number results in a compromise since "only" 3% of employees would click on a malicious link. However,

nimbme – Nim bare-metal environment

nimbme Nim bare-metal environment for embedded targets. headless mode Actual implemented target: raspberry pi1 / pi zero (bcm2835) General target requirements: at least 4KiB ram at least 20KiB flash 1 UART for terminal 1 hardware timer [cycle counter] software interrupt mechanism features cooperative scheduler (actual simple round-robin scheme / deadline-scheduler planned) code runs under system-mode (armv6) async programming model (requirement: do not block the event loop) easy po

I fought in Ukraine and here's why FPV drones kind of suck

In 2024 and 2025, I served for six months as an international volunteer on a first-person view attack drone team in the Armed Forces of Ukraine. My team was deployed in the Donbas region, in one of the hottest sectors of the front. When I joined the team, I was excited to work with a cutting-edge tool. By the end of my deployment, I was a bit disillusioned. Let me tell you why. First-person view drones are unmanned aerial vehicles with four propellers located at the four corners of the craft, r

Higher: Favourite Haskell type classes for Rust (2023)

higher The functor hierarchy and other terrible ideas for Rust. Yes, this gives you generalisable monads in Rust. No, they're not very nice compared to Haskell, because Rust's functions aren't quite as first class from the type system's perspective as you might like them to be, type constraints in trait implementations can be a serious headache when you want to implement, say, Functor for HashSet , and the type system can be particularly obtuse at times and need a lot of additional and extreme

Topics: f1 f2 fn target type

APT28 hackers use Signal chats to launch new malware attacks on Ukraine

The Russian state-sponsored threat group APT28 is using Signal chats to target government targets in Ukraine with two previously undocumented malware families named BeardShell and SlimAgent. To be clear, this is not a security issue in Signal. Instead, threat actors are more commonly utilizing the messaging platform as part of their phishing attacks due to its increased usage by governments worldwide. The attacks were first discovered by Ukraine's Computer and Emergency Response (CERT-UA) in M

Canada says telcos were breached in China-linked espionage hacks

In Brief The Canadian government and the FBI say they are aware of malicious activity targeting telecommunication companies across Canada, attributing the intrusions to the China-backed hacking group Salt Typhoon. In a joint advisory out late Friday, the feds said at least one unnamed Canadian telco was hacked in mid-February this year, in which hackers manipulated three Cisco-made routers to allow stealthy traffic collection from its network. The feds say that separate investigations suggest

Targeting Nuclear Scientists Used to Be Covert Ops. Israel Just Blew It Open

At least 14 nuclear scientists are believed to be among those killed in Israel’s Operation Rising Lion, launched on June 13, 2025, ostensibly to destroy or degrade Iran’s nuclear program and military capabilities. Deliberately targeting scientists in this way aims to disrupt Iran’s knowledge base and continuity in nuclear expertise. Among those assassinated were Mohammad Mehdi Tehranchi, a theoretical physicist and head of Iran’s Islamic Azad University, and Fereydoun Abbasi-Davani, a nuclear e

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That's an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of H

Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That's an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of H

Aflac discloses breach amidst Scattered Spider insurance attacks

On Friday, American insurance giant Aflac disclosed that its systems were breached in a broader campaign targeting insurance companies across the United States by attackers who may have stolen personal and health information. Aflac (short for American Family Life Assurance Company) is the largest supplemental insurance provider in the U.S. and a Fortune 500 company that provides insurance services to millions of customers in the U.S. and Japan. In a press release earlier today, the insurance c

Learn Makefiles

I built this guide because I could never quite wrap my head around Makefiles. They seemed awash with hidden rules and esoteric symbols, and asking simple questions didn’t yield simple answers. To solve this, I sat down for several weekends and read everything I could about Makefiles. I've condensed the most critical knowledge into this guide. Each topic has a brief description and a self contained example that you can run yourself. If you mostly understand Make, consider checking out the Makefi

Topics: blah echo make run target

A Visual Guide to Genome Editors

It was Victoria Gray’s first time in London and, despite a sleepless plane ride across the Atlantic Ocean, she wasn’t about to skip sightseeing. While crossing Trafalgar Square, Gray paused briefly to reflect on her experience. “I would never have been able to walk this long before,” she told a NPR reporter. “I feel like I got a second chance.” Four years earlier, in 2019, Gray had become the first patient with sickle cell anemia — a genetic disorder that causes red blood cells to become sticky

Meta approves plan for bigger executive bonuses following 5% layoffs

Meta CEO Mark Zuckerberg appears at the Meta Connect event in Menlo Park, California, on Sept. 25, 2024. Executives at Meta stand to get bigger bonuses this year. The company said in a corporate filing Thursday that it had approved "an increase in the target bonus percentage" for its annual bonus plan for executives. Meta's named executive officers could earn a bonus of 200% of their base salary under the new plan, up from the 75% they earned previously, according to the filing. The updated b