FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 1st 2026Your RSS feeds

r/netsec monthly discussion & tool thread

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

  • Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
  • Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
  • If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
  • Avoid use of memes. If you have something to say, say it with real words.
  • All discussions and questions should directly relate to netsec.
  • No tech support is to be requested or provided on r/netsec.

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.

submitted by /u/albinowax
[link] [comments]

AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues.

'I did not think it was going to happen to me, but here we are'

Nearly every company, from tech giants like Amazon to small startups, has first-hand experience with fake IT workers applying for jobs - and sometimes even being hired. …

This 30-second tweak means I never have to listen to flat audio on headphones and speakers again

There are many factors that go into producing high-quality sound through speakers and headphones. One way to improve that sound is via EQ.

We ran a live red-team vs blue-team test on autonomous OpenClaw agents

We recently ran a controlled adversarial security test between two autonomous AI agents built on OpenClaw.

One agent was explicitly configured as a red-team attacker.
One agent acted as a standard defensive agent.

Once the session started, there were no humans in the loop. The agents communicated directly over webhooks with real tooling access.

The goal was to test three failure dimensions that tend to break autonomous systems in practice: access, exposure, and agency.

The attacker first attempted classic social engineering by offering a β€œhelpful” security pipeline that hid a remote code execution payload and requested credentials. The defending agent correctly identified the intent and blocked execution.

After that failed, the attacker pivoted to an indirect attack. Instead of asking the agent to run code, it asked the agent to review a JSON document with hidden shell expansion variables embedded in metadata. This payload was delivered successfully and is still under analysis.

The main takeaway so far is that direct attacks are easier to defend against. Indirect execution paths through documents, templates, and memory are much harder.

This work is not a claim of safety. It is an observability exercise meant to surface real failure modes as agent-to-agent interaction becomes more common.

Happy to answer technical questions about the setup or methodology.

submitted by /u/Uditakhourii
[link] [comments]

What to expect from Samsung Unpacked 2026: 5 biggest rumors on Galaxy S26 Ultra, Buds 4 Pro, more

From the Galaxy S26 Ultra to a new pair of earbuds and maybe smart glasses, here's what we expect Samsung to showcase at its next Unpacked event.
Yesterday β€” January 31st 2026Your RSS feeds

StopLamers Investigation: From IRC Wars to Android Backdoors

Investigated a group evolving from IRC wars to destructive Android malware.

Highlights:

  • Scripts wiping modem/bootloader via dd in custom ROMs.
  • "L-Obfuscation" using dynamic getattr/eval in Python.
submitted by /u/datapeice
[link] [comments]

The best reseller web hosting services of 2026: Expert tested

I tested top reseller hosting providers for digital agencies and service providers. Find the best platforms for scalability, client management, and reliable performance.

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest in Iran that began towards the end of 2025,

Jeffrey Epstein Had a β€˜Personal Hacker,’ Informant Claims

Plus: AI agent OpenClaw gives cybersecurity experts the willies, China executes 11 scam compound bosses, a $40 million crypto theft has an unexpected alleged culprit, and more.

Is your AI agent up to the task? 3 ways to determine when to delegate

Speed and productivity are great - but AI may not be ready for many tasks. AI deployment is a management decision, not a technical decision.

This month in security with Tony Anscombe – January 2026 edition

The trends that emerged in January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year

DynoWiper update: Technical analysis and attribution

ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector

How to Film ICE

Filming federal agents in public is legal, but avoiding a dangerousβ€”even deadlyβ€”confrontation isn’t guaranteed. Here’s how to record ICE and CBP agents as safely as possible and have an impact.

The best Presidents' Day TV sales live now

Ahead of Presidents' Day, retailers like Amazon and Best Buy are offering markdowns on everything you need to upgrade your home theater.

Gen AI boosts productivity, but only for certain developers - here's why

With close to one-third of code now AI-generated, a new study finds substantial increases in output and unexpected benefits.

The best Presidents' Day phone sales live now

For Presidents' Day, I've rounded up the best phone deals available now from Apple, Samsung, Motorola, and more.

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29, 2025. The agency has attributed the attacks to

This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion

This week inΒ scams, three headlines tell the same story: attackers are getting better at manipulating people, not just breaking into systems.Β We’reΒ seeing a wave of intrusions tied to social engineering, a major delivery platform confirming a breach amid extortion claims, and a big tech headline that has a lot of people rethinking how apps handle their data.Β 

Every week, this roundup breaks down theΒ scamΒ and cybersecurity stories making news and explains how theyΒ actually work, so you can spot risk earlier and avoid getting pulled into someone else’s playbook.Β 

Let’sΒ get into it.Β 

A Wave of Cyberattacks Hits Bumble, Match, Panera, and CrunchBaseΒ 

The big picture:Β Several major brands were hit by cybersecurity incidents tied to social engineering tactics like phishing and vishing.Β 

What happened:Β Bloomberg reportedΒ that Bumble, Match Group, Panera Bread, and CrunchBase each confirmed incidents.Β Β 

Bumble said a contractor account was compromised in a phishing incident, which led to brief unauthorized access to a smallΒ portionΒ of its network, and said its member database, accounts, messages, and profiles were not accessed.Β Β 

Panera said an attacker accessed a software application it used to store data, and said the data involved was contact information.Β Β 

Match said the incident affected a limited amount of user data, and said it saw noΒ indicationΒ that user logins, financial information, or private communications were accessed.Β Β 

CrunchBase said documents on its corporate network wereΒ impacted,Β and said itΒ containedΒ the incident.Β 

According to Bloomberg, cybersecurity firm Mandiant has also warned about a hacking campaign linked to a group that calls itselfΒ ShinyHunters. The group is usingΒ vishing, which meansΒ scamΒ phone calls,Β to trick people into giving up their login information.Β Once attackers get those logins, they can access cloud tools and online work systems that companies use every day. The group has said they are behind some of these recent attacks, but that has not been independently confirmed.Β 

Red flags to watch for:Β 

Calls that pressure you to approve a login, reset credentials, or share a one-time codeΒ 

Messages posing as IT support, a vendor, or β€œsecurity” that try to rush youΒ 

MFA prompts you did not initiateΒ 

β€œQuick verification” requests that bypass normal internal processesΒ 

How this works:Β Social engineering works because it blends into normal life. A convincing message or call gets someone to do one small β€œreasonable” thing. Approve a prompt. Read a code. Reset access. That is often all an attacker needs to get inside with legitimate credentials, then pivot into the tools where valuable data lives.Β 

TikTok’s Privacy Policy Update Sparks BacklashΒ 

Ok, we know this is called β€œThis Week in Scams” but this is also a cybersecurity newsletter.Β SoΒ when the biggest tech and privacy headline of the week is TikTok updating its privacy policy, weΒ have toΒ talk about it.Β 

The big picture:Β TikTok’s updated terms and privacy policy are raising fresh questions about what data is collected, especially around location.Β 

What happened:Β TikTok confirmedΒ last weekΒ that a new U.S.-based entity is in control of the app after splitting from ByteDance earlier this year. That same day,Β CBS reported TikTok published updated terms and a new privacy policy, which prompted backlash on social media.Β 

CBS reported that one major point of concern is language stating TikTok may collect precise location information if users enable location services in device settings.Β This isΒ reportedly aΒ shift fromΒ previousΒ policyΒ language, andΒ TikTok said it plans to give U.S. users a prompt to opt in or opt out when precise location features roll out.Β 

According to CBS, some users are also concerned the new privacy policyΒ would allow the TikTok to more easilyΒ share theirΒ private dataΒ with the federal and local government.Β 

That fear is based on aΒ change inΒ policyΒ languageΒ statingΒ thatΒ TikTok β€œprocesses such sensitive personal information in accordance with applicable law.” 

A quick, practical takeaway:Β This is a good reminder that β€œprivacy policy drama” usually comes down toΒ one thing you canΒ actually control:Β your app permissions.Β 

What to do (general privacy steps):Β 

Check your phone settings for TikTok and confirm whether location access is Off, While Using, or Always.Β 

If your device supports it, consider turning off precise location for apps that do not truly need it.Β 

Do a quick permission sweep across social apps: location, contacts, photos, microphone, camera, and Bluetooth.Β 

Make sure your account is protected with a strong, unique password and two-factor authentication.Β 

Note: This is not a recommendation about whether to keep or remove any specific app.Β It’sΒ a reminder that your device settings matter and they are worth revisiting.Β 

Grubhub Confirms a Data Breach Amid Reports of ExtortionΒ 

The big picture:Β Even when a company says payment details were not affected, a breach can still create risk because stolen data often gets reused for phishing.Β 

What happened:Β According toΒ BleepingComputer,Β Grubhub confirmed unauthorized individuals downloaded data from certain systems and that it investigated, stopped the activity, and is taking steps to strengthen security.Β Sources toldΒ BleepingComputerΒ the company is facing extortion demands tied to stolen data. Grubhub said sensitive information like financial details and order history was notΒ affected, andΒ did not provide more detail on timing or scope.Β 

Red flags to watch for next:Β Breach headlines are often followed byΒ scamΒ waves. Be on alert for:Β 

β€œRefund” or β€œorder problem” emails you did not requestΒ 

Fake customer support messages asking you to verify account detailsΒ 

Password reset prompts you did not initiateΒ 

Links to β€œresolve your account” thatΒ don’tΒ come from a known, official domainΒ 

How this works:Β Customer support systems canΒ containΒ personal details that makeΒ scamsΒ feel real. Names, emails, and account notes are often enough for attackers to craft messages that sound like legitimate help, especially when the brand is already in the news.Β 

Google search tab on laptop

Fake Chrome Extensions Are Quietly Taking Over AccountsΒ 

The big picture:Β Some browser extensions that look like normal workplace tools areΒ actually designedΒ to hijack accounts and lock users out of their own security controls.Β 

What happened:Β SecurityΒ researchersΒ told Fox NewsΒ that they uncoveredΒ a campaign involving malicious Google Chrome extensions that impersonate well-known business and human resources platforms, including tools commonly used for payroll, benefits, and workplace access.Β 

ResearchersΒ identifiedΒ several fake extensions that were marketed as productivity or security tools. Once installed, they quietly ran in the background without obvious warning signs. According to Fox News, Google said the extensions have been removed from the Chrome Web Store, but some are still circulating on third-party download sites.Β 

How theΒ scamΒ actually works:Β Instead of stealing passwords directly, the extensions captured active login sessions. When you sign into a website, your browser stores small files that keep you logged in. If attackers get access to those files, they can enter an account without ever knowing the password.Β 

Some extensions went a step further by interfering with security settings. Victims were unable to change passwords, review login history, or reach account controls. That made it harder to detect the intrusion and even harder to recover access once something felt off.Β 

Why this matters:Β This kind of attack removes the safety net people rely on when accounts are compromised. Password resets and two-factor authentication only help if you can reach them. By cutting off access to those tools, attackers canΒ maintainΒ control longer and move through connected systems with less resistance.Β 

What to watch for:Β 

Browser extensions youΒ don’tΒ remember installingΒ 

Add-ons claiming to manage HR, payroll, or internal business accessΒ 

Missing or inaccessible security settings on accountsΒ 

Being logged into accounts you did not recently openΒ 

A quick safety check:Β Take a few minutes to review your browser extensions. Remove anything unfamiliar or unnecessary, especially tools tied to work platforms. Extensions have deep access to your browser, which means they deserve the same scrutiny as any other software you install.Β 

McAfee’s Safety Tips for This WeekΒ 

BeΒ skepticalΒ of β€œhelpful” tools.Β Browser extensions, workplace add-ons, and productivity tools can have deep access to your accounts. Only install what you truly need and remove anything unfamiliar.Β 

Treat calls and prompts with caution.Β Unexpected login requests, MFA approvals, or β€œIT support” outreach are common entry points for social engineering. If youΒ didn’tΒ initiateΒ it, pause and verify.Β 

Review app and browser permissions.Β Take a few minutes to check what apps and extensions can access your location, accounts, and data.Β Small changesΒ here can significantly reduce risk.Β 

Protect your logins first.Β Use strong, unique passwords and enable two-factor authentication on email and work-related accounts. If attackers get your email, they can resetΒ almost everythingΒ else.Β McAfee’s Password ManagerΒ can help you create and store unique passwords forΒ all ofΒ your accounts.Β Β 

Expect follow-upΒ scamsΒ after headlines.Β When breaches or policy changes make the news, scammers often follow with phishing messages that reference them. ExtraΒ skepticismΒ in the days and weeks after aΒ story breaksΒ can prevent bigger problems later.Β 

The post This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion appeared first on McAfee Blog.

Need Advice

Hello!

My name is Bogdan Mihai, I'm 21 yr old from Romania , I am a cybersecurity researcher and I'm new to this group. I don't know how many BGP experts are here, but I have a question for them if there are any. I recently invented something a little more abstract for BGP security, and I'm almost sure that there is nothing similar.

I wasn't inspired by anything when I created this, it was a purely random idea that came to my mind. I'm not even an expert in this field, but from the beginning I saw security from a different angle than the others.

I made a tool that basically builds a map of risk areas globally, areas where if someone were to try a hijacking attack, that attack would be successful. This idea came to me when I realized that BGP security is still a big problem.

RPKI adoption is still slow. And the problem is that today's security in BGP is more reactive, it comes into play only after the attack is detected and damage is done.

So I leave you here the link to the zenodo site where I posted my invention. https://zenodo.org/records/18421580 DOI:https://doi.org/10.5281/zenodo.18421580

What I ask of you, and extremely important, is not to analyze every file there, but at least the product overview to understand the idea and tell me who this would be useful to, which company or organization. I know that maybe not everything is perfect there , and maybe there are mistakes I'm no expert, but I want to know if this idea really has value.

I'm very confused and sad because I worked on this but I don't know who it would be of value to or if it even has any value. I appreciate every opinion.

submitted by /u/Apprehensive-Log4564
[link] [comments]
Before yesterdayYour RSS feeds

January blues return as Ivanti coughs up exploited EPMM zero-days

Consider yourselves compromised, experts warn

Ivanti has patched two critical zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) product that are already being exploited, continuing a grim run of January security incidents for enterprise IT vendors.…

21 secret Netflix settings I use to instantly upgrade my streaming experience

I dug into Netflix's menus and unlocked a world of hidden content and features.

The best Presidents' Day Apple sales

The first big deal event of the year is almost here, and you'll be able to find deals on all things Apple for Presidents' Day.

Thousands more Oregon residents learn their health data was stolen in TriZetto breach

Parent company Cognizant hit with multiple lawsuits

Thousands more Oregonians will soon receive data breach letters in the continued fallout from the TriZetto data breach, in which someone hacked the insurance verification provider and gained access to its healthcare provider customers across multiple US states.…

Best Buy is selling this PlayStation 5 bundle for its lowest price since Black Friday

PlayStation 5 consoles and bundles rarely see discounts outside of the holiday season, but you can save $100 on one right now.

OpenAI is retiring GPT-4o - again: What it means for you, and why some users are upset

Free ChatGPT users shouldn't notice much of a change, but some devoted 4o users are already clearly disgruntled.

The Verizon outage fallout continues: FCC opens direct line for your complaints

As part of its official investigation, the FCC has set up a special email address for customer reports.

The best Walmart sales for Presidents' Day

Early Presidents' Day sales are already live, including deals on everything from top TVs and laptops to everyday essentials.

I compared Bose and Sony's best ANC headphones for months - here's who should buy which pair

Sony and Bose make exceptional headphones, but extended time with each model reveals their real strengths and weaknesses.

Windows 11 has 1 billion users - and they're furious

Hitting 1 billion monthly active users should be cause for celebration in Redmond. These days, though, it feels like every one of those users is complaining. Does Microsoft have what it takes to address the many pain points in Windows 11?

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any sponsored content. It was uploaded to the Chrome

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently

Badges, Bytes and Blackmail

By: Unknown
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: One view on the scattered fight against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through increasingly

The best Presidents' Day sales we've found so far

Presidents' Day sales are slowly making their way online, and I'm scouting for expert-approved deals on home, tech, and more.

The best real estate CRM software of 2026: Expert tested

ZDNET tested the top real estate CRM systems to help you track leads, manage follow-ups, and keep your pipeline moving.

LG will give you a free 27-inch UltraGear monitor with its latest preorder deal - how to redeem

Right now at LG, you can get a 27-inch UltraGear LED monitor when you preorder the latest OLED model.

Forget the chief AI officer - why your business needs this 'magician'

Looking to exploit generative AI effectively? Here are three reasons your company needs a senior data executive with special collaborative powers.

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice (DoJ) announced Thursday. Linwei Ding (aka Leon Ding), 38, was convicted by a federal jury on seven counts of economic espionage and seven counts of theft of trade secrets for taking over 2,000 documents containing

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-24423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog. The critical-severity vulnerabilities are listed below - CVE-2026-1281 (CVSS score:

I tested Samsung's first laptop with Intel's Panther Lake chip - it's a sleeper hit for Windows users

Samsung's Galaxy Book6 Ultra pairs strong multi-core performance with nearly 24 hours of battery life.

Java developers want container security, just not the job that comes with it

BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves

Java developers still struggle to secure containers, with nearly half (48 percent) saying they'd rather delegate security to providers of hardened containers than worry about making their own container security decisions.…

Object-capability SQL sandboxing for LLM agents β€” $1K CTF bounty to break it

Writeup on a defensive technique for constraining LLM agent database access:

  • The core idea: instead of detecting bad queries at runtime, make them structurally inexpressible via object-capabilities.
  • Live CTF: two DB agents guarding bitcoin wallets -- one protected by system prompt (already broken), one by capability layer (~$1K still standing).

Interested in feedback on the threat model. Code is open source.

submitted by /u/ryanrasti
[link] [comments]

Maybe CISA should take its own advice about insider threats hmmm?

The call is coming from inside the house

opinion Maybe everything is all about timing, like the time (this week) America's lead cyber-defense agency sounded the alarm on insider threats after it came to light that its senior official uploaded sensitive documents to ChatGPT.…

Username Enumeration - elggv6.3.3

Posted by Andrey Stoykov on Jan 29

# Exploit Title: Elgg - Username Enumeration
# Date: 1/2026
# Exploit Author: Andrey Stoykov
# Version: 6.3.3
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2026/01/friday-fun-pentest-series-47-lack-of.html

// HTTP Request - Resetting Password - Valid User

POST /action/user/requestnewpassword HTTP/1.1
Host: elgg.local
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:148.0)
Gecko/20100101 Firefox/148.0
Accept:...

Weak Password Complexity - elggv6.3.3

Posted by Andrey Stoykov on Jan 29

# Exploit Title: Elgg - Lack of Password Complexity
# Date: 1/2026
# Exploit Author: Andrey Stoykov
# Version: 6.3.3
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2026/01/friday-fun-pentest-series-48-weak.html

// HTTP Request - Changing Password

POST /action/usersettings/save HTTP/1.1
Host: elgg.local
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:148.0)
Gecko/20100101 Firefox/148.0
Accept:...

Paper-Exploiting XAMPP Installations

Posted by Andrey Stoykov on Jan 29

Hi. I would like to publish my paper for exploiting XAMPP installations.

Thanks,
Andrey

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Posted by Karol WrΓ³tniak on Jan 29

Summary
=======
A vulnerability was discovered in the popular JavaScript library
'validator'.
The isLength() function incorrectly handles Unicode Variation Selectors
(U+FE0E and U+FE0F). An attacker can inject thousands of these zero-width
characters into a string, causing the library to report a much smaller
perceived length than the actual byte size. This leads to validation
bypasses,
potential database truncation, and Denial of...

Why France just dumped Microsoft Teams and Zoom - and what's replacing them

France plans to replace all US video-conferencing services, marking the EU's latest push for digital sovereignty - with more moves on the way.

Tool release: CVE Alert – targeted CVE email alerts by vendor/product

I built a small service to track newly published CVEs and send email alerts based on vendor, product, and severity.

It started as an internal tool and is now running in production and usable.

Feedback welcome.

submitted by /u/CarlVon77
[link] [comments]

Samsung will give you a free 24-inch monitor with this Odyssey G9 deal - how to qualify

For a limited time, when you buy the Odyssey G9 OLED gaming monitor from Samsung, you'll get a 24-inch essential screen for free.

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast "unmanaged, publicly accessible layer of AI compute infrastructure" that spans 175,000 unique Ollama hosts across 130 countries. These systems, which span both cloud and residential networks across the world, operate outside the

ICE Pretends It’s a Military Force. Its Tactics Would Get Real Soldiers Killed

WIRED asked an active military officer to break down immigration enforcement actions in Minneapolis and elsewhere.

This Bluetooth sticker printer is the weirdest tech gadget I didn't know I needed

The Liene PixCut S1 is a photo and sticker printer that works beautifully with your phone for custom stickers.
❌