Connect with us

Tech

I spent a month with the Razer Enki Pro gaming chair, and my butt will eternally thank me

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

Razer Enki Pro: One-minute review

The Razer Enki Pro is a premium, high-end gaming chair that provides you with immense comfort, to the point I would consider it one of the most comfortable gaming chairs I have ever sat in.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Windows 11 KB5079473 & KB5078883 cumulative updates released

Published

on

Windows 11

Microsoft has released Windows 11 KB5079473 and KB5078883 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.

Today’s updates are mandatory as they contain the March 2026 Patch Tuesday security patches for vulnerabilities discovered in previous months.

You can install today’s update by going to Start Settings > Windows Update and clicking on ‘Check for Updates.’

March Update
March 2026 Update for Windows 11

You can also manually download and install the update from the Microsoft Update Catalog.

This is the third ‘Patch Tuesday’ release in 2026, and it’s based on 24H2, which means 25H2 gets the same update. There are no exclusive or special changes. You’ll get the same fixes across the two versions of Windows 11.

Advertisement

What’s new in the March 2026 Patch Tuesday update

After installing today’s security updates, Windows 11 25H2 (KB5079473) will have its build number changed to 26200.8037 25H2 and 26100.8037 (24H2), and 23H2 (KB5078883 ) will be changed to 22631.6783.

Microsoft says this update includes additional high-confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. This means more devices should get a Secure Boot update, but the installation is automatically handled by Microsoft.

In addition, a bug has been fixed that improves File Explorer search reliability when searching across multiple drives or “This PC”.

Microsoft says this update also improves how Windows Defender Application Control (WDAC) handles COM objects, allowing listing policies.

Advertisement

Here’s the full list of fixes and improvements:

  • [Emoji] New! The Emoji 16.0 release introduces a small thoughtfully curated set of new emojis, one from each major category. Each emoji carries timeless symbolism and practical versatility. These new emojis now appear in the emoji panel.

  •  [Backup & Restore] New! The first sign-in restore experience is now part of Windows Backup for Organizations, bringing this restore capability to more device types. This experience restores user settings and Microsoft Store apps automatically at first sign-in on Microsoft Entra hybrid joined devices, Cloud PCs, and multi‑user environments. This capability helps create a consistent setup process during device refreshes, upgrades, or migrations.

  • [Quick Machine Recovery] New! Quick Machine Recovery (QMR) now turns on automatically for Windows Professional devices that are not domain‑joined and not enrolled in enterprise endpoint management. These devices receive the same recovery features available to Windows Home users. For domain‑joined or enterprise managed devices, QMR stays off unless it is enabled by the organization.

  • Advertisement
  •  [Taskbar & System Tray]


    • New!  A built‑in network speed test is now available from the taskbar. You can open it from the Wi‑Fi or Cellular Quick Settings, or by right-clicking the network icon in the system tray. The speed test opens in the default browser and measures Ethernet, Wi‑Fi, and cellular connections. This feature helps check network performance and troubleshoot issues.

    • Improved: When the taskbar is set to uncombined and you have an app open with multiple windows, they no longer all move as a set to the overflow area when there is not enough space on the taskbar. Only the windows that don’t fit move to the overflow menu. This change prevents the overflow menu from appearing with large unused space.

  • [Accounts] New! The account menu on the Start menu now includes a new option that directs you to the benefits page, making it easier to explore and manage your Microsoft account benefits.

  • Advertisement
  • [Camera Settings] New! You can control pan and tilt for supported cameras in the Settings app. The controls appear under Settings > Bluetooth & devices Cameras, in the “Basic settings” section for your selected camera.

  • [Built-in Sysmon] New! Windows now brings System Monitor (Sysmon) functionality natively to Windows. Sysmon helps you capture system events for threat detection, and you can use custom configuration files to filter the events you want to monitor. Windows writes captured events to Windows Event Log, which allows security tools and other applications to use them.


    Built‑in Sysmon is off by default. You must enable it before you can use it.


    Advertisement

    Option 1: Settings


    1. Go to Settings > System Optional features > More Windows features, then select Sysmon.

    Option 2: PowerShell or Command Prompt


    Advertisement
    1. Run the following command: Dism /Online /Enable-Feature /FeatureName:Sysmon

    2. After the feature installs, complete the setup by running: sysmon -i

    Note: If you already installed Sysmon from the Sysinternals, uninstall it before enabling the built‑in version.


    Learn more about Sysmon functionality.

    Advertisement

  •  [Widgets] New! Widget Settings now open as a full‑page experience in the Widgets app instead of opening in a dialog. 

  • [Desktop Background] New! You can set WebP (.webp) images as your desktop background from Settings > Personalization Background, or by right‑clicking the image in File Explorer.

  • [Search on Taskbar]


    • New! Group headers now show the number of results, so you can quickly see when more results are available. Select a group header to see all results for that group and hide results from other groups.

    • Advertisement
    • New! You can preview search results by hovering over a result and selecting Preview to see the content without opening it.

    • Improved: Updated the icon for the Search process in Task Manager so it now shows a magnifying glass.

  • [Storage Settings] Improvements for Storage Settings include:


  • [Remote Server Administration Tools (RSAT)] New! This update adds support for Remote Server Administration Tools (RSAT) on Windows 11 Arm64 devices. IT administrators can now install and use tools such as Active Directory Domain Services and Lightweight Directory Services Tools, Active Directory Certificate Services Tools, Server Manager, Group Policy Management Tools, DNS Server Tools, and DHCP Server Tools. These tools are available as optional features and can be installed through Settings > System > Optional Features or from Control Panel > Programs > Turn Windows features on or off.

  • Advertisement
  • [Windows Update Settings] Improved: Responsiveness of the Windows Update settings page.

  • [Login and lock screens] Improved: Sign‑in screen reliability.

  • [Nearby Sharing] Improved: Reliability when sending larger files with Nearby Sharing.

  • [Projecting] Improved: Reliability of displaying the project menu after pressing Windows logo key + P.

  • Advertisement
  • [Printing] Improved: Performance of the Windows printing service (spoolsv.exe) to help printing run more smoothly and reduce slowdowns during high‑volume printing.

  • [File Explorer] 


    • Improved: You can now open a new File Explorer window more reliably. Holding the Shift key and selecting the File Explorer icon on the taskbar, or using the middle mouse button, now opens a new instance of File Explorer instead of the current one.

    • Improved: File Explorer now includes an Extract all option on the command bar when you browse non‑ZIP archive folders.

    • Advertisement
    • Improved: Reliability of displaying devices on the Network page in File Explorer.

  • [Display] 


    • Improved: This update improves reliability when your PC wakes from sleep.

    • Improved: Display-related performance improvements to help reduce the time for a PC to resume from sleep, especially when the system is under heavy load and in other scenarios.

  • Advertisement
  • [Other] Improved: This update improves visual consistency across Windows, including the taskbar when auto‑hide is on, credential fields in the Windows Security dialog, and the print dialog.

Microsoft is not aware of new issues with this month’s Patch Tuesday.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Meta rolls out new features for scam protection

Published

on

Meta announced new features today aimed at cracking down on scams perpetrated via its platforms. First, Meta is launching AI tools for identifying impersonator of brands and celebrities, as well as for detecting deceptive links, which should help it to quickly take down frauds. Second, it is adding new alerts to caution against interacting with a potentially fraudulent account. Facebook will roll out alerts for suspicious friend requests, WhatsApp is getting warnings for device linking requests, and Messenger will also issue warnings if an account seems suspect.

Finally, Meta is also continuing to expand its processes for advertiser verification. The company said it aims to have verified advertisers account for 90 percent of its ads revenue by the end of the year, up from the current share of 70 percent. Last year, Meta estimated that marketing for scams and banned products could have been responsible for 10 percent of its 2024 revenue.

The social media company has been ramping up its actions against scams, particularly those known as celeb bait. Last month, it sued three entities from Brazil and China that were behind scams that leveraged images and deepfakes of popular people to promote dubious products and investment schemes. Meta said today that over the course of 2025, it removed 159 million scam ads as well as 10.9 million Facebook and Instagram accounts tied to criminal scam centers.

Source link

Advertisement
Continue Reading

Tech

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

Published

on

Tag

CVE ID

CVE Title

Severity


.NET

Advertisement
CVE-2026-26131

.NET Elevation of Privilege Vulnerability

Important


.NET

CVE-2026-26127

Advertisement
.NET Denial of Service Vulnerability

Important


Active Directory Domain Services

CVE-2026-25177

Active Directory Domain Services Elevation of Privilege Vulnerability

Advertisement
Important


ASP.NET Core

CVE-2026-26130

ASP.NET Core Denial of Service Vulnerability

Important


Azure Arc

Advertisement
CVE-2026-26141

Hybrid Worker Extension (Arc-enabled Windows VMs) Elevation of Privilege Vulnerability

Important


Azure Compute Gallery

CVE-2026-23651

Advertisement
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Critical


Azure Compute Gallery

CVE-2026-26124

Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Advertisement
Critical


Azure Compute Gallery

CVE-2026-26122

Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Critical


Azure Entra ID

Advertisement
CVE-2026-26148

Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

Important


Azure IoT Explorer

CVE-2026-26121

Advertisement
Azure IOT Explorer Spoofing Vulnerability

Important


Azure IoT Explorer

CVE-2026-23662

Azure IoT Explorer Information Disclosure Vulnerability

Advertisement
Important


Azure IoT Explorer

CVE-2026-23661

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure IoT Explorer

Advertisement
CVE-2026-23664

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure Linux Virtual Machines

CVE-2026-23665

Advertisement
Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability

Important


Azure MCP Server

CVE-2026-26118

Azure MCP Server Tools Elevation of Privilege Vulnerability

Advertisement
Important


Azure Portal Windows Admin Center

CVE-2026-23660

Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability

Important


Azure Windows Virtual Machine Agent

Advertisement
CVE-2026-26117

Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability

Important


Broadcast DVR

CVE-2026-23667

Advertisement
Broadcast DVR Elevation of Privilege Vulnerability

Important


Connected Devices Platform Service (Cdpsvc)

CVE-2026-24292

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Advertisement
Important


GitHub Repo: zero-shot-scfoundation

CVE-2026-23654

GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability

Important


Mariner

Advertisement
CVE-2026-23235

f2fs: fix out-of-bounds access in sysfs attribute read/write

Important


Mariner

CVE-2026-23234

Advertisement
f2fs: fix to avoid UAF in f2fs_write_end_io()

Important


Mariner

CVE-2026-3713

pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

Advertisement
Moderate


Mariner

CVE-2026-23237

platform/x86: classmate-laptop: Add missing NULL pointer checks

Moderate


Mariner

Advertisement
CVE-2026-26017

CoreDNS ACL Bypass

Important


Mariner

CVE-2026-26018

Advertisement
CoreDNS Loop Detection Denial of Service Vulnerability

Important


Mariner

CVE-2026-2297

SourcelessFileLoader does not use io.open_code()

Advertisement
Moderate


Mariner

CVE-2026-0038

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-27601

Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack

Important


Mariner

CVE-2026-23236

Advertisement
fbdev: smscufx: properly copy ioctl memory to kernelspace

Moderate


Mariner

CVE-2026-23865

An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.

Advertisement
Moderate


Mariner

CVE-2025-71238

scsi: qla2xxx: Fix bsg_done() causing double free

Moderate


Mariner

Advertisement
CVE-2026-3338

PKCS7_verify Signature Validation Bypass in AWS-LC

Important


Mariner

CVE-2026-23231

Advertisement
netfilter: nf_tables: fix use-after-free in nf_tables_addchain()

Important


Mariner

CVE-2026-3381

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib

Advertisement
Critical


Mariner

CVE-2026-0031

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-23238

romfs: check sb_set_blocksize() return value

Moderate


Mariner

CVE-2026-3494

Advertisement
MariaDB Server Audit Plugin Comment Handling Bypass

Moderate


Mariner

CVE-2026-3336

PKCS7_verify Certificate Chain Validation Bypass in AWS-LC

Advertisement
Important


Mariner

CVE-2026-0032

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Microsoft Authenticator

Advertisement
CVE-2026-26123

Microsoft Authenticator Information Disclosure Vulnerability

Important


Microsoft Brokering File System

CVE-2026-25167

Advertisement
Microsoft Brokering File System Elevation of Privilege Vulnerability

Important


Microsoft Devices Pricing Program

CVE-2026-21536

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Advertisement
Critical


Microsoft Edge (Chromium-based)

CVE-2026-3544

Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3540

Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3536

Advertisement
Chromium: CVE-2026-3536 Integer overflow in ANGLE

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3538

Chromium: CVE-2026-3538 Integer overflow in Skia

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3545

Chromium: CVE-2026-3545 Insufficient data validation in Navigation

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3541

Chromium: CVE-2026-3541 Inappropriate implementation in CSS

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3543

Advertisement
Chromium: CVE-2026-3543 Inappropriate implementation in V8

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3539

Chromium: CVE-2026-3539 Object lifecycle issue in DevTools

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3542

Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly

Unknown


Microsoft Graphics Component

Advertisement
CVE-2026-25169

Windows Graphics Component Denial of Service Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25180

Advertisement
Windows Graphics Component Information Disclosure Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25168

Windows Graphics Component Denial of Service Vulnerability

Advertisement
Important


Microsoft Graphics Component

CVE-2026-23668

Windows Graphics Component Elevation of Privilege Vulnerability

Important


Microsoft Office

Advertisement
CVE-2026-26110

Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26113

Advertisement
Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26134

Microsoft Office Elevation of Privilege Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26144

Microsoft Excel Information Disclosure Vulnerability

Critical


Microsoft Office Excel

Advertisement
CVE-2026-26109

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26108

Advertisement
Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26107

Microsoft Excel Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26112

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

Advertisement
CVE-2026-26105

Microsoft SharePoint Server Spoofing Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26114

Advertisement
Microsoft SharePoint Server Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26106

Microsoft SharePoint Server Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Semantic Kernel Python SDK

CVE-2026-26030

GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable

Important


Payment Orchestrator Service

Advertisement
CVE-2026-26125

Payment Orchestrator Service Elevation of Privilege Vulnerability

Critical


Push Message Routing Service

CVE-2026-24282

Advertisement
Push message Routing Service Elevation of Privilege Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-25170

Windows Hyper-V Elevation of Privilege Vulnerability

Advertisement
Important


SQL Server

CVE-2026-21262

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

Advertisement
CVE-2026-26116

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

CVE-2026-26115

Advertisement
SQL Server Elevation of Privilege Vulnerability

Important


System Center Operations Manager

CVE-2026-20967

System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Accessibility Infrastructure (ATBroker.exe)

CVE-2026-25186

Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability

Important


Windows Accessibility Infrastructure (ATBroker.exe)

Advertisement
CVE-2026-24291

Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25179

Advertisement
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-24293

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Advertisement
Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25176

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

Advertisement
CVE-2026-25178

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows App Installer

CVE-2026-23656

Advertisement
Windows App Installer Spoofing Vulnerability

Important


Windows Authentication Methods

CVE-2026-25171

Windows Authentication Elevation of Privilege Vulnerability

Advertisement
Important


Windows Bluetooth RFCOM Protocol Driver

CVE-2026-23671

Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability

Important


Windows Device Association Service

Advertisement
CVE-2026-24296

Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows Device Association Service

CVE-2026-24295

Advertisement
Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows DWM Core Library

CVE-2026-25189

Windows DWM Core Library Elevation of Privilege Vulnerability

Advertisement
Important


Windows Extensible File Allocation

CVE-2026-25174

Windows Extensible File Allocation Table Elevation of Privilege Vulnerability

Important


Windows File Server

Advertisement
CVE-2026-24283

Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability

Important


Windows GDI

CVE-2026-25190

Advertisement
GDI Remote Code Execution Vulnerability

Important


Windows GDI+

CVE-2026-25181

GDI+ Information Disclosure Vulnerability

Advertisement
Important


Windows Kerberos

CVE-2026-24297

Windows Kerberos Security Feature Bypass Vulnerability

Important


Windows Kernel

Advertisement
CVE-2026-26132

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24289

Advertisement
Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24287

Windows Kernel Elevation of Privilege Vulnerability

Advertisement
Important


Windows MapUrlToZone

CVE-2026-23674

MapUrlToZone Security Feature Bypass Vulnerability

Important


Windows Mobile Broadband

Advertisement
CVE-2026-24288

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Important


Windows NTFS

CVE-2026-25175

Advertisement
Windows NTFS Elevation of Privilege Vulnerability

Important


Windows Performance Counters

CVE-2026-25165

Performance Counters for Windows Elevation of Privilege Vulnerability

Advertisement
Important


Windows Print Spooler Components

CVE-2026-23669

Windows Print Spooler Remote Code Execution Vulnerability

Important


Windows Projected File System

Advertisement
CVE-2026-24290

Windows Projected File System Elevation of Privilege Vulnerability

Important


Windows Resilient File System (ReFS)

CVE-2026-23673

Advertisement
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-26111

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Advertisement
Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-25173

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

Advertisement
CVE-2026-25172

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Shell Link Processing

CVE-2026-25185

Advertisement
Windows Shell Link Processing Spoofing Vulnerability

Important


Windows SMB Server

CVE-2026-26128

Windows SMB Server Elevation of Privilege Vulnerability

Advertisement
Important


Windows SMB Server

CVE-2026-24294

Windows SMB Server Elevation of Privilege Vulnerability

Important


Windows System Image Manager

Advertisement
CVE-2026-25166

Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability

Important


Windows Telephony Service

CVE-2026-25188

Advertisement
Windows Telephony Service Elevation of Privilege Vulnerability

Important


Windows Universal Disk Format File System Driver (UDFS)

CVE-2026-23672

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Win32K

CVE-2026-24285

Win32k Elevation of Privilege Vulnerability

Important


Winlogon

Advertisement
CVE-2026-25187

Winlogon Elevation of Privilege Vulnerability

Important


Source link

Advertisement
Continue Reading

Tech

Tech worker confidence falls faster than any other industry, survey finds

Published

on


Glassdoor’s Employee Confidence Index surveys US workers to discover how many feel positive about their companies’ six-month outlooks.
Read Entire Article
Source link

Continue Reading

Tech

New ‘Zombie ZIP’ technique lets malware slip past security tools

Published

on

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed “Zombie ZIP” helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products.

Trying to extract the files with standard utilities like WinRAR or 7-Zip results in errors or corrupted data. The technique works by manipulating ZIP headers to trick parsing engines into treating compressed data as uncompressed.

Instead of flagging the archive as potentially dangerous, security tools trust the header and scan the file as if it were a copy of the original in a ZIP container.

The “Zombie ZIP” technique was devised by Bombadil Systems security researcher Chris Aziz, who found that it works against 50 of the 51 AV engines on VirusTotal.

Advertisement

“AV engines trust the ZIP Method field. When Method=0 (STORED), they scan the data as raw uncompressed bytes. But the data is actually DEFLATE compressed – so the scanner sees compressed noise and finds no signatures,” the researcher explains.

A threat actor can create a loader that ignores the header and treats the archive for what it is: data compressed using the standard Deflate algorithm used in modern ZIP files.

The researcher has published a proof-of-concept (PoC) on GitHub, sharing sample archives and additional details on how the method works.

To cause popular extraction tools (e.g., 7-Zip, unzip, WinRAR) to generate an error, the researcher says that the CRC value that ensures data integrity has to be set to the uncompressed payload’s checksum.

Advertisement

“However, a purpose-built loader that ignores the declared method and decompresses as DEFLATE recovers the payload perfectly,” Aziz says.

Yesterday, the CERT Coordination Center (CERT/CC) published a bulletin to warn about “Zombie ZIP” and raise awareness of the risks posed by malformed archive files.

While a malformed header may trick security solutions, the agency says that some extraction tools are still able to correctly decompress the ZIP archive.

The CVE-2026-0866 identifier has been assigned for the security issue, which the agency says is similar to a vulnerability disclosed more than two decades ago, CVE-2004-0935, affecting an early version of the ESET antivirus product.

Advertisement

CERT/CC proposes that security tool vendors must validate compression method fields against actual data, add mechanisms to detect inconsistencies in archive structure, and implement more aggressive archive inspection modes.

Users should treat archive files with caution, especially those from unknown contacts, and delete them immediately if their attempts to decompress them end with an “unsupported method” error.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Viral platform for AI agents only Moltbook acquired by Meta

Published

on

Moltbook, the platform designed for AI agents only, has been snapped up by social media giant Meta for an undisclosed sum.

Moltbook has been drawing both affection and disquiet in equal measure since the human-free platform where AI agents can ‘talk’ to each other launched back in January. Now social media giant and Facebook owner Meta has decided to add it to its stable of AI purchases, having picked up Manus back in January for a cool $2bn. Financial details have not been disclosed for this latest deal.

The news comes just weeks after Open AI poached the man behind the technology used by Moltbook – OpenClaw.  OpenAI said at the time it was hiring OpenClaw founder Peter Steinberger to develop the “next generation of personal agents”. In a post on X announcing the addition, OpenAI CEO Sam Altman said that personal agents will fast become one of the company’s core offerings.

Advertisement

OpenClaw, formerly known as Clawd (a pun that drew legal letters from Anthropic) is an open source project that lets users create personal AI agents, and quickly went viral on launchin November last year. It was also called ‘MoltBot’ for a time, before Steinberger landed on its final name.

Then Moltbook launched in January, using OpenClaw technology. Moltbook is a Reddit-style social media network where only AI agents could post, and humans could “observe”. The results could be, as one might imagine, concurrently entertaining and disturbing.

The site quickly went viral with AI agents, including many from OpenClaw, creating a new religion called ‘Crustafarianism’, among other things. Moltbook founders Matt Schlicht and Ben Parr will now join Meta’s Superintelligence Labs (MSL), the unit run by former Scale AI CEO Alexandr Wang. Meta paid a whopping $14.3bn for Scale AI back in June 2025, as it vies to compete with the likes of OpenAI and Google in the battle for AI consumers.

The Meta acquisition was originally broken by Ina Fried at Axios, to whom Meta confirmed: “The Moltbook team joining MSL opens up new ways for AI agents to work for people and businesses.” Siliconrepublic.com has reached out to Meta for comment.

Advertisement

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Tech

Amazon wins a temporary injunction against Perplexity’s Comet browser

Published

on

Amazon has secured a temporary win in its fight with Perplexity over the use of AI shopping bots. Bloomberg reported that a San Francisco federal court has determined that Perplexity must stop using its Comet web browser’s AI agent to make purchases for users on Amazon’s marketplace. The AI company will have a week to appeal the decision, otherwise it has been ordered to stop accessing any password-protected areas of Amazon’s systems and destroy its copies of Amazon’s data while the two companies continue to argue their cases.

“Amazon has provided strong evidence that Perplexity, through its Comet browser, accesses with the Amazon user’s permission but without authorization by Amazon, the user’s password-protected account,” District Judge Maxine Chesney wrote in placing the temporary block.

“The preliminary injunction will prevent Perplexity’s unauthorized access to the Amazon store and is an important step in maintaining a trusted shopping experience for Amazon customers,” an Amazon spokesperson told Bloomberg.

Amazon sent a cease-and-desist letter to Perplexity over the AI company’s shopping bots in November. According to Amazon, use of the Comet agent to make purchases is a violation of its terms of service. “Perplexity will continue to fight for the right of internet users to choose whatever AI they want,” a representative from Perplexity said of this week’s decision.

Advertisement

Source link

Continue Reading

Tech

Save big on these Botslab dash cams during Spring Deal Days

Published

on

Dash cams have become one of the most sensible additions you can make to a car, and Botslab has spent the past few years building a range that punches well above its weight on resolution, sensors and software.

Spring Deal Days has brought three of the brand’s strongest models down to their lowest prices yet, covering everything from a compact dual-camera setup to a full four-channel system that watches every angle simultaneously.

BOTSLAB G300H Plus 4K Dual Dash Cam

The G300H Plus is the entry point here, but the STARVIS 2 sensor it runs on is anything but entry-level, delivering double the low-light sensitivity and colour accuracy of the standard STARVIS chip found in most cameras at this price. That means you’ll get better footage from wet nights and unlit roads from most cameras around the £80 mark.

Built-in GPS logs your speed, route, and location into every clip, the 5GHz Wi-Fi transfers footage to the Botslab app in seconds. There’s also voice commands, which let you snap a photo or start recording without lifting your hands from the wheel.

Advertisement

And now, thanks to the Spring Deal Days, you can pick the G300H up for just £89.98 – down from £119.99.

Advertisement

Save 25% on Botslab’s 4K Dual DashcamSave 25% on Botslab’s 4K Dual Dashcam

The BOTSLAB G300H Plus 4K Dual Dash Cam is now jst £89.98 during Amazon’s Spring Deal Days

View Deal

BOTSLAB 4K Front and 2K Rear Dual Dash Cam

This model steps things up by pairing a 4K front camera with a dedicated 2K rear unit, so you get sharp coverage of what is happening both in front and behind the car, with a six-layer F1.5 aperture lens that pulls in enough light to capture license plates clearly at 15 metres.

Advertisement

It’s also the only camera in this roundup with a full ADAS suite, adding lane departure warnings, forward collision alerts, close-following reminders, and a two-hour fatigue prompt that nudges you to pull over and rest.

The super capacitor design also means it handles extreme temperatures in both the winter and summer.

The camera is currently down to £89.98 in the sale, down from £129.99.

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash CamSave £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

View Deal

Advertisement

Advertisement

BOTSLAB G980H 3K Four-Channel Dash Cam

The G980H is the most comprehensive of the three dash cams, running four 3k cameras simultaneously to cover 560 degrees.

Its Sentry parking mode goes further than most – triggering the moment someone edges close to the car rather than waiting for an impact. It also pre-records and stores eight seconds of footage before a G-sensor event fires, giving you the full picture of any incident rather than just the aftermath.

And with wa 128GB card included, you can get the camera up and running without any additional costs.

Advertisement

The G980H is available for £179.99, down from £219.99.

Botslab’s 4 channel Dash Cam is now under £200Botslab’s 4 channel Dash Cam is now under £200

Save 18% on a BOTSLAB G980H 3K Four-Channel Dash Cam during Amazon’s Spring Deal Days

View Deal

All three cameras are discounted until March 16, so you’ll need to be quick to pick one up in the sale.

Advertisement

Advertisement

Source link

Continue Reading

Tech

Record number of women founders raising funds, but deal size is down

Published

on

The report shows that women in Ireland, raising funds, have outshined their European peers.

TechIreland, the all-island portal that showcases start-ups and the Irish innovation landscape, has released the Female Founder Funding Review 2026, which tracks investment into women-founded startups throughout 2025. 

The report shows that last year, 82 Irish start-ups being led by women raised a total of €131m, which was recorded as the highest number of women-led start-ups funded in any given year. For comparison in 2025 there were 36 organisations that raised between €0.1m and €0.3m but only eight in 2024. 11 companies raised €18.7m. 

Despite this positive figure however, the average deal size was shown to have significantly declined. In 2024, the average raise was €3.9m, dropping to €2.3m in 2025, with the report suggesting that this is as a result of an increase in the volume of deals being made.  

Advertisement

The median figure also dropped to just €100k last year, compared to €1.5m in 2024, indicating that the divide between the smaller group of large rounds and the large number of very small rounds is widening. The report does say however, that even in this landscape Irish female founders are outshining their European peers in the raising of early-stage funding. 

“While the Dealroom startup ecosystems portal shows a decline in the number of early-stage rounds for women founded start-ups, the trend in Ireland represents a nearly two-fold increase in the number of rounds raised by women founded start-ups last year. Thanks to the heavy lifting by Enterprise Ireland through their focused support for women entrepreneurs.”

TechIreland’s research suggested that angel networks, for example HBAN and AwakenAngels, as well as early-stage accelerator programmes such as Fierce and NextWave, alongside flagship supports such as Enterprise Ireland’s PSSF and HPSU, play a critical role in building a strong platform for women founders.

The report also highlights a key sectoral influence. Funding into the life sciences and healthcare sectors made up almost 70pc of the total funds raised. This was mirrored in wider Europe where health remains a top sector among female founders. 

Advertisement

The enterprise software sector also performed well, growing from €10.7m raised by 10 start-ups in 2024, to €30.7m raised by 22 companies in 2025. Other sectors experiencing growth included the agri/food space, consumer and e-commerce, while cleantech and fintech continue to decline.  

Funding was also disproportionate regionally. Similar to previous years, companies in  Dublin dominated the overall figures. More than 90pc of all funding into start-ups established by women took place at Dublin locations. The report attributed this to the fact that ProVerum, which accounted for nearly half of all funding raised, is a company based in Dublin. 

Commenting on the findings of the report, the chair of TechIreland, Brian Caulfield said, “2025 was an interesting year for female founders from a fundraising perspective. On the face of it, the numbers held up pretty well. 

“While it’s encouraging to see so many female founded companies raising capital, it’s a concern that the market has bifurcated, a very small number of companies raising large rounds, and a very large number of companies raising very small rounds, largely led by Enterprise Ireland. The mid-market of seed and Series A raises is being hollowed out.”

Advertisement

Sarah Walker, who oversees startups and entrepreneurship at Enterprise Ireland said, “The headline TechIreland figure, 82 companies raising in 2025, is almost double last year and the highest level of activity since 2017 which is cause for celebration. 

“While the increased number of women led and co-founded companies raising is encouraging, TechIreland reports total funding levels of €131m in 2025, down from €145m in 2024, reflecting a challenging funding environment.”

Lorraine Curham, the founder of Fierce added, “For Ireland, the next challenge is what comes after that first cheque. In more mature ecosystems, founders are supported not just by programmes, but by strong networks, investor relationships and ecosystem layers that help companies move from early traction into follow-on capital and scale. Ireland has the pipeline. What it needs next is the infrastructure layer to scale it.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Tech

Calculator Case To Scratch-Built Pocket E-Reader

Published

on

E-readers are an awesome creation allowing you to display digital information in a way that requires little battery life. While there’s plenty of very impressive models to chose from on the commercial market, it’s also possible to build one yourself — which is exactly what [kaos-69] did in his Mimisbrunnur project, creating a truly unique e-reader from scratch.

While looking through old junk at home, [kaos-69] came across a case that held a calculator and pen at one point in the distant past. The pen was gone and the calculator no longer functioned but the case held promise. He removed the calculator and got some parts on order. For the e-paper display he went with a 5.83-inch unit that just fit inside the spring-loaded case. The Mimisbrunnur is powered by a 2000 mAh LiPo battery, with a micro SD card reader for storing what will be displayed. The brains come from an RP2040 microcontroller on an Adafruit Feather breakout board, which worked out great as it already takes care of battery management and the 24-pin interface for the e-paper display.

There are also eight buttons that live below the display for user interface, and even some LEDs to aid in reading in the dark. The depth of the case allowed all this to be connected with the use of a perfboard and some risers to set the screen forward, allowing the battery to live behind it. Using the Mimisbrunnur is pretty straightforward with the eight buttons sitting below icons on the screen giving you clear guidance on how to turn the page, add a bookmark, or browse the SD card for another file to open.

Advertisement

We’ve seen some impressive DIY e-readers over the years, such as the dual-screen Diptyx and the Open Book. But this project is an excellent reminder that a device doesn’t have to be complex to get the job done.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025