Connect with us

Tech

New ‘Zombie ZIP’ technique lets malware slip past security tools

Published

on

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed “Zombie ZIP” helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products.

Trying to extract the files with standard utilities like WinRAR or 7-Zip results in errors or corrupted data. The technique works by manipulating ZIP headers to trick parsing engines into treating compressed data as uncompressed.

Instead of flagging the archive as potentially dangerous, security tools trust the header and scan the file as if it were a copy of the original in a ZIP container.

The “Zombie ZIP” technique was devised by Bombadil Systems security researcher Chris Aziz, who found that it works against 50 of the 51 AV engines on VirusTotal.

Advertisement

“AV engines trust the ZIP Method field. When Method=0 (STORED), they scan the data as raw uncompressed bytes. But the data is actually DEFLATE compressed – so the scanner sees compressed noise and finds no signatures,” the researcher explains.

A threat actor can create a loader that ignores the header and treats the archive for what it is: data compressed using the standard Deflate algorithm used in modern ZIP files.

The researcher has published a proof-of-concept (PoC) on GitHub, sharing sample archives and additional details on how the method works.

To cause popular extraction tools (e.g., 7-Zip, unzip, WinRAR) to generate an error, the researcher says that the CRC value that ensures data integrity has to be set to the uncompressed payload’s checksum.

Advertisement

“However, a purpose-built loader that ignores the declared method and decompresses as DEFLATE recovers the payload perfectly,” Aziz says.

Yesterday, the CERT Coordination Center (CERT/CC) published a bulletin to warn about “Zombie ZIP” and raise awareness of the risks posed by malformed archive files.

While a malformed header may trick security solutions, the agency says that some extraction tools are still able to correctly decompress the ZIP archive.

The CVE-2026-0866 identifier has been assigned for the security issue, which the agency says is similar to a vulnerability disclosed more than two decades ago, CVE-2004-0935, affecting an early version of the ESET antivirus product.

Advertisement

CERT/CC proposes that security tool vendors must validate compression method fields against actual data, add mechanisms to detect inconsistencies in archive structure, and implement more aggressive archive inspection modes.

Users should treat archive files with caution, especially those from unknown contacts, and delete them immediately if their attempts to decompress them end with an “unsupported method” error.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Apple A18 Pro vs M1: How do the chips compare?

Published

on

Apple’s affordable MacBook Neo is now available to buy, and we’re keen to learn more about its A18 Pro chip.

First introduced in the iPhone 16 Pro and iPhone 16 Pro Max, A18 Pro promised to usher in “a new era of pro performance”. So, how does the A18 Pro compare to Apple’s first in-house processor, the desktop-level M1? With a four-year age gap between the two, is it a guarantee that the newer A18 Pro offers a faster performance than the 2020 M1? Or, because the M1 is designed for PCs, does it still reign supreme?

We’ve dissected the specs of both the A18 Pro and M1 and highlighted the key differences between the two below. 

Want to know more about the MacBook Neo? Visit our MacBook Neo vs MacBook Air M1 and MacBook Neo vs iPad guides to see how the new affordable laptop measures up to its closest alternatives. 

Advertisement

Otherwise, make sure you check out our list of the best student laptops and overall best laptops to find your next purchase.

Advertisement

Which devices include the A18 Pro chip?

Apple’s A18 Pro chip can be found in the following devices:

Remember that the A18 Pro is not the same as the A18 Bionic chip, which powers the iPhone 16e, iPhone 16 and iPhone 16 Plus.

Advertisement
MacBook Neo lifestyleMacBook Neo lifestyle
MacBook Neo. Image Credit (Apple)

Which devices include the M1 chip?

The M1 chip launched back in 2020 and was found within the MacBook Air and MacBook Pro. Unsurprisingly, as it’s been nearly six years since the launch, the MacBooks sporting M1 aren’t readily available to buy.

M1 has up to 8-core GPU

When Apple launched the M1, it was hailed as including “Apple’s most advanced GPU” and featured up to eight cores (in the MacBook Pro, or seven within the MacBook Air) which could run nearly 25,000 threads at once. This enabled the chip to handle more intensive and demanding tasks like rendering 3D scenes and video editing easier.

Advertisement

In our MacBook Air M1 review, we concluded that the GPU unit was “very capable” and able to cope brilliantly with everyday tasks and intensive ones like rendering 4K HDR video and opening large Raw files in Lightroom. We also found that its GPU was able to output to the 4K Pro Display XDR Monitor, which was something that previous MacBook Airs had struggled with.

Front right angled view of a silver-gray Macbook Air M1 standing on a wooden tableFront right angled view of a silver-gray Macbook Air M1 standing on a wooden table
MacBook Air M1. Image Credit (Trusted Reviews)

Instead, the A18 Pro is fitted with a six-core GPU. Promised to be up to 20% faster than the previous generation, Apple claims that the A18 Pro’s GPU should drive graphics rendering for Apple Intelligence and visuals for gaming too. While in our experience some titles weren’t quite optimised, overall we found AAA games from the App Store ran brilliantly.

With this in mind, yes the A18 Pro is fitted with a slightly smaller six-core GPU, we still found that the chip runs brilliantly within the iPhone 16 Pro and iPhone 16 Pro Max.

Advertisement
iPhone-16-Pro-Max-review-7iPhone-16-Pro-Max-review-7
iPhone 16 Pro Max. Image Credit (Trusted Reviews)

M1 includes an 8-core CPU

Following on from the above, regardless of whether you opted for the MacBook Air or MacBook Pro, the M1 boasts an eight-core CPU. Made up of four performance and four high-efficiency cores, the CPU was once hailed by Apple as being the “world’s fastest” in a low-power silicon and “the world’s best CPU performance per watt”. 

Advertisement

A18 Pro, on the other hand, is fitted with a 6-core CPU with two performance and four energy cores. Apple promises that the CPU runs 15% faster while using 20% less power than its predecessor. While we’re yet to review the MacBook Neo, Apple does promise it will see up to 16-hours of battery life on a single charge, which is a promising claim. 

A18 Pro supports hardware accelerated ray tracing

One area where the A18 Pro has the edge over the M1 is with gaming, as it features hardware-accelerated ray tracing which enables the chip to showcase advanced light, shadow and reflection in video games. Essentially, it helps games look more realistic than otherwise.

In fact, the A18 Pro promises its hardware-accelerated ray tracing is up to two times faster than before.

Advertisement

In comparison, although the M1’s up-to-eight-core GPU will offer support for games, it does lack ray tracing capabilities, which means games won’t boast that photorealistic finish.

iPhone 16 Pro - gamingiPhone 16 Pro - gaming
Gaming on the iPhone 16 Pro. Image Credit (Trusted Reviews)

Advertisement

Both support Apple Intelligence

We should disclaim that although the MacBook Neo is powered by A18 Pro, it benefits from macOS and won’t run on iOS found on the iPhone. This is important to note, as it means the MacBook Neo will support desktop apps and not just rely on mobile ones.

Otherwise, both the A18 Pro and M1 chips are fitted with a 16-core Neural Engine and, subsequently, supports the Apple Intelligence toolkit, allowing you access to tools such as Image Playground, Notification Summaries, Live Translation and more.

Advertisement

Source link

Continue Reading

Tech

Netgear Nighthawk WiFi 7 router is back to its best price

Published

on

Slow home internet rarely comes down to your broadband plan alone, as outdated routers often struggle to keep up with modern streaming, gaming and smart home demands despite quietly running everything in the background.

But with the Netgear Nighthawk WiFi 7 Router (RS700S) now £549.99, down from £699.99, replacing an ageing router with something built for modern streaming and gaming demands becomes a far easier upgrade to justify.

Deal NETGEAR WiFi 7 Router Nighthawk Tri-Band WiFi 7 RS700SDeal NETGEAR WiFi 7 Router Nighthawk Tri-Band WiFi 7 RS700S

Netgear Nighthawk WiFi 7 router is back to its best price

The Netgear Nighthawk WiFi 7 router is officially back at its best price, offering a rare chance to grab top‑tier wireless performance without paying price.

View Deal

Advertisement

The Netgear Nighthawk WiFi 7 Router (RS700S) is built around the WiFi 7 standard, which pushes wireless speeds significantly beyond previous generations while helping reduce latency during heavy network traffic.

In practical terms, that means large game downloads, high-resolution video streaming and connected devices competing for bandwidth should run more smoothly without the frustrating slowdowns common with older routers.

Tri-band connectivity also plays a major role here, allowing devices to distribute themselves across multiple wireless bands so phones, laptops, televisions and consoles are not all fighting for the same signal.

Advertisement

Advertisement

Where this router really stretches its legs is raw throughput, with wireless speeds rated up to 19Gbps, giving it the headroom needed for 4K streaming, cloud gaming and large file transfers happening simultaneously.

The Whatsapp LogoThe Whatsapp Logo

Get Updates Straight to Your WhatsApp

Join Now

In fact, we actually ranked the Netgear Nighthawk RS700 as the fastest router in our Best Router guide, thanks to its ability to maintain exceptional speeds across demanding home networks.

Coverage is another major focus, with the antenna design aiming to deliver a reliable signal across up to roughly 3,500 square feet, helping larger homes avoid the frustrating dead zones common with weaker routers.

Advertisement

The Netgear Nighthawk WiFi 7 Router (RS700S) also includes security features designed to help protect connected devices, an increasingly important consideration as more smart home products rely on constant internet access.

For households packed with streaming devices, gaming systems and smart home tech, this discount makes RS700S a far more compelling upgrade than usual.

Advertisement

SQUIRREL_PLAYLIST_10148964

Advertisement

Source link

Continue Reading

Tech

Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

Published

on

Lest you thought Microsoft would have all the fun introducing new AI features for white collar enterprise work this week with its Copilot Cowork announcement yesterday, Google is here to take back the spotlight.

The search giant and, increasingly, AI leader today announced a sweeping series of updates to its Gemini AI models embedded into Google Workspace — the productivity suite of cloud-based apps including Drive, Docs, Sheets, Slides, and more. They’re being made available both to individual consumers and enterprises, though you’ll need an AI Pro ($20 per month) or higher subscription plan for the former, and your enterprise will need to be enrolled in the “Gemini Alpha” program and have the features switched on by an administrator.

The biggest news: it’s now possible to have Gemini automatically create these file types from a single text prompt and fill them out with information gathered from other files and apps throughout you, the user’s Google Workspace, including emails, chats, files, and the open web via Google Search.

Advertisement

By synthesizing information across these disparate apps and experiences, Gemini acts as an assistant capable of drafting, iterating, and perfecting complex, finished, professional-grade content in seconds, effectively ending the era of the manual “dig” for information.

The message is simple: the era of searching across multiple windows, tabs, files and folders for your information is over — Gemini will do it and put it all together for you in a nearly finished product, simply from a plain English (or language of your choosing) natural language text prompt!

And best of all for enterprise technical leaders — this feature is now provided first-party by Google themselves, short-cutting or eliminating large parts of the need to build their own orchestration system (if they don’t wish to pursue this route and have most of their data in these Google applications, albeit).

Prompt to document, spreadsheet, slide deck and more

The rollout spans the entire Workspace suite, with specific features tailored to the unique demands of each application:

Advertisement

Google Docs: “Help me create”: The new “Help me create” experience allows users to generate fully formatted first drafts by simply describing their goal. Because Gemini can access Drive, Gmail, and Chat, a user can prompt: “Draft a newsletter using the meeting minutes from my January HOA meeting and the list of upcoming events”. The result is a contextualized document that includes smart chips and structured formatting, rather than a generic template.

Google Sheets gets a 9x speed boost: The most striking efficiency claim in this release involves “Fill with Gemini”. A 95-participant study conducted by Google found that using Gemini to auto-populate tables with categorized or summarized data was 9x faster than manual entry for 100-cell tasks. Users can now describe a goal—like optimizing a weekly schedule to maximize profit while balancing staff skills—and Gemini handles the multi-step construction from start to finish.

Google Slides gets narrative-first design: Slides is receiving updates that allow Gemini to act as a design collaborator. It can now turn rough brainstorm sketches into editable diagrams and generate slide layouts that balance visual weight and hierarchy while matching the theme of an existing deck. Google also teased an upcoming feature that will generate an entire presentation from a single prompt based on a reference document.

Google Drive: The Knowledge Base: Perhaps the most fundamental shift is in Google Drive, which is moving from “passive storage” to an “active knowledge base” that compiles data from multiple files and file types stored there and allows Gemini to access it and move it around as needed in creating and editing projects.

Advertisement
  • AI Overviews: Similar to Google Search, Drive will now provide a summarized answer with citations at the top of search results, removing the need to open multiple files to find a specific detail.

  • Ask Gemini in Drive: This allows for complex, cross-file queries, such as comparing multiple catering proposals or synthesizing months of research on a specific topic.

  • Projects: Users can now save curated lists of sources as “projects” to share with others, maintaining built-in security and compliance controls.

Not just Gemini — numerous Google AI models power this experience

While the user interface of the new Workspace updates is designed for simplicity, the backend architecture relies on a specialized ensemble of Google’s most advanced AI models.

These features are not powered by a single general-purpose engine but rather a suite of task-specific models developed by Google DeepMind and Google Research.

  • Gemini 3 Flash & Deep Think: The core text generation, summarization, and reasoning capabilities—such as “Help me create” in Docs and “AI Overviews” in Drive—are driven by the Gemini 3 family. Specifically, Gemini 3 Flash is utilized for high-speed summarization, while Gemini 3 Deep Think handles more complex reasoning tasks involving science, research, and engineering.

  • Google Research OR-Tools: To solve the “advanced optimization problems” in Sheets, such as complex employee scheduling or budget maximization, Google integrates its OR-Tools (Operations Research tools) alongside DeepMind’s logic models.

  • Nano Banana 2 (Gemini 3 Flash Image): The professional layouts and editable diagrams found in Slides are generated by Nano Banana 2, a state-of-the-art multi-image-to-image model. This model handles everything from text-to-image generation to complex style transfers, ensuring that new slides match a company’s existing brand aesthetics.

  • Veo & Lyria 3: For multimedia integration, Google utilizes Veo for high-fidelity video generation and Lyria 3 for professional-grade music and vocal arrangements, both of which include SynthID watermarking for AI identification.

Licensing and availability

Google is positioning these features as premium additions to its ecosystem. The new Gemini capabilities are rolling out in beta starting today.

Feature Set

Advertisement

Target Audience

Availability

Google AI Ultra & Pro

Individual power users

Advertisement

English (Global for Docs, Sheets, Slides)

Gemini Alpha

Business/Enterprise customers

English (Global for Docs, Sheets, Slides)

Advertisement

Google Drive Updates

U.S. Customers (Initial)

English (U.S. Only for now)

The Gemini Alpha program is a pre-release initiative that allows Google Workspace administrators to grant users early access to experimental AI features before they are made generally available.

Advertisement

To participate, your organization must have a supported subscription — such as Business Standard, Business Plus, Enterprise, or Education tiers — along with Google AI Pro or Ultra add-ons.

Participation is managed entirely by your Google Workspace administrator, as the program is turned off by default. An admin can manually enable accessvia the Google Admin console by navigating to Menu > Generative AI > Gemini for Workspace and selecting the Alpha features panel. Once enabled, eligible users can begin reimagining their content creation journeys using these next-generation tools.

For business users, Google emphasizes that these features are built with “enterprise-grade data protections,” ensuring that sensitive company data used to ground Gemini’s responses remains confidential and is not used to train global models

Community and leadership reactions

The announcement was met with immediate traction on social media, spearheaded by CEO Sundar Pichai. In a post on X, Pichai highlighted the practical, time-saving nature of the updates:

Advertisement

“New Gemini updates to make @GoogleWorkspace more personal, helpful and collaborative… no more digging through folders.”

The reaction from the broader tech community has focused heavily on the “9x faster” claim for Sheets, a metric that resonates with data analysts and project managers who spend a significant portion of their week on manual data entry.

Yulie Kwon Kim, VP of Product for Workspace, framed the release as a fundamental reimagining of content creation, stating that Gemini is no longer just a “tool” but a “partner that works alongside you throughout the creative process”.

As these features move from beta to general availability in the coming months, the true test will be how effectively Gemini handles the nuance of complex, real-world data without human intervention. For now, Google has signaled its intent: the era of starting with a blank page is officially over.

AI is the latest escalation in the cloud contest — and enterprise technical leaders should take note

For CTOs, CIOs, and product managers, the deep integration of Gemini into Google Workspace is not merely a suite of new features; it is a fundamental shift toward an “agentic” operating model.

Advertisement

This announcement arrives just 24 hours after Microsoft unveiled “Copilot Cowork,” a cloud-based AI agentic tool designed to compl

ete work on a user’s behalf across the entire Microsoft 365 suite. Both tech giants are now converging on a singular vision: the AI assistant as an execution layer that can navigate multiple files, formats, and data sources to independently plan and deliver finished workplace materials.

By transforming static storage into an active knowledge base, these platforms are providing technical leaders with a framework to reduce the “digital debt” of searching through siloed applications, effectively reimagining white-collar work as a series of delegated outcomes rather than manual tasks.

The scale of this transformation is underpinned by Google’s massive and rapidly expanding footprint. As of early 2026, Google Workspace has surpassed 3 billion monthly active users globally. Within this ecosystem, the paid enterprise segment is seeing explosive growth, with approximately 11 million paying business customers—up from 8 million just one year prior.

Advertisement

More specifically, over 8 million paid Gemini Enterprise seats have already been deployed across more than 2,800 companies. While Microsoft leverages a multi-model architecture incorporating Anthropic’s Claude models for its “Cowork” features, Google is doubling down on its own integrated stack of Gemini 3 and DeepMind logic to provide a seamless, context-aware environment for its vast user base.

From an interpretive standpoint, this “Gemini-fication” of work represents the democratization of advanced analytics. When a manager can use natural language to solve complex optimization problems in Sheets or generate entire presentations from a single prompt, the traditional boundaries of professional roles begin to blur.

While early studies suggest these agentic tools can lead to productivity gains of 15% to 35%, the real value for technical leaders lies in headcount leverage—the ability to maintain high output with leaner teams.

As AI assistants evolve into autonomous agents that navigate enterprise data to “do the work for you,” the role of the knowledge worker is shifting from “creator” to “orchestrator,” requiring a strategic pivot in how enterprises hire and measure human talent in an AI-first economy.

Advertisement

Source link

Continue Reading

Tech

Windows 11 KB5079473 & KB5078883 cumulative updates released

Published

on

Windows 11

Microsoft has released Windows 11 KB5079473 and KB5078883 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.

Today’s updates are mandatory as they contain the March 2026 Patch Tuesday security patches for vulnerabilities discovered in previous months.

You can install today’s update by going to Start Settings > Windows Update and clicking on ‘Check for Updates.’

March Update
March 2026 Update for Windows 11

You can also manually download and install the update from the Microsoft Update Catalog.

This is the third ‘Patch Tuesday’ release in 2026, and it’s based on 24H2, which means 25H2 gets the same update. There are no exclusive or special changes. You’ll get the same fixes across the two versions of Windows 11.

Advertisement

What’s new in the March 2026 Patch Tuesday update

After installing today’s security updates, Windows 11 25H2 (KB5079473) will have its build number changed to 26200.8037 25H2 and 26100.8037 (24H2), and 23H2 (KB5078883 ) will be changed to 22631.6783.

Microsoft says this update includes additional high-confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. This means more devices should get a Secure Boot update, but the installation is automatically handled by Microsoft.

In addition, a bug has been fixed that improves File Explorer search reliability when searching across multiple drives or “This PC”.

Microsoft says this update also improves how Windows Defender Application Control (WDAC) handles COM objects, allowing listing policies.

Advertisement

Here’s the full list of fixes and improvements:

  • [Emoji] New! The Emoji 16.0 release introduces a small thoughtfully curated set of new emojis, one from each major category. Each emoji carries timeless symbolism and practical versatility. These new emojis now appear in the emoji panel.

  •  [Backup & Restore] New! The first sign-in restore experience is now part of Windows Backup for Organizations, bringing this restore capability to more device types. This experience restores user settings and Microsoft Store apps automatically at first sign-in on Microsoft Entra hybrid joined devices, Cloud PCs, and multi‑user environments. This capability helps create a consistent setup process during device refreshes, upgrades, or migrations.

  • [Quick Machine Recovery] New! Quick Machine Recovery (QMR) now turns on automatically for Windows Professional devices that are not domain‑joined and not enrolled in enterprise endpoint management. These devices receive the same recovery features available to Windows Home users. For domain‑joined or enterprise managed devices, QMR stays off unless it is enabled by the organization.

  • Advertisement
  •  [Taskbar & System Tray]


    • New!  A built‑in network speed test is now available from the taskbar. You can open it from the Wi‑Fi or Cellular Quick Settings, or by right-clicking the network icon in the system tray. The speed test opens in the default browser and measures Ethernet, Wi‑Fi, and cellular connections. This feature helps check network performance and troubleshoot issues.

    • Improved: When the taskbar is set to uncombined and you have an app open with multiple windows, they no longer all move as a set to the overflow area when there is not enough space on the taskbar. Only the windows that don’t fit move to the overflow menu. This change prevents the overflow menu from appearing with large unused space.

  • [Accounts] New! The account menu on the Start menu now includes a new option that directs you to the benefits page, making it easier to explore and manage your Microsoft account benefits.

  • Advertisement
  • [Camera Settings] New! You can control pan and tilt for supported cameras in the Settings app. The controls appear under Settings > Bluetooth & devices Cameras, in the “Basic settings” section for your selected camera.

  • [Built-in Sysmon] New! Windows now brings System Monitor (Sysmon) functionality natively to Windows. Sysmon helps you capture system events for threat detection, and you can use custom configuration files to filter the events you want to monitor. Windows writes captured events to Windows Event Log, which allows security tools and other applications to use them.


    Built‑in Sysmon is off by default. You must enable it before you can use it.


    Advertisement

    Option 1: Settings


    1. Go to Settings > System Optional features > More Windows features, then select Sysmon.

    Option 2: PowerShell or Command Prompt


    Advertisement
    1. Run the following command: Dism /Online /Enable-Feature /FeatureName:Sysmon

    2. After the feature installs, complete the setup by running: sysmon -i

    Note: If you already installed Sysmon from the Sysinternals, uninstall it before enabling the built‑in version.


    Learn more about Sysmon functionality.

    Advertisement

  •  [Widgets] New! Widget Settings now open as a full‑page experience in the Widgets app instead of opening in a dialog. 

  • [Desktop Background] New! You can set WebP (.webp) images as your desktop background from Settings > Personalization Background, or by right‑clicking the image in File Explorer.

  • [Search on Taskbar]


    • New! Group headers now show the number of results, so you can quickly see when more results are available. Select a group header to see all results for that group and hide results from other groups.

    • Advertisement
    • New! You can preview search results by hovering over a result and selecting Preview to see the content without opening it.

    • Improved: Updated the icon for the Search process in Task Manager so it now shows a magnifying glass.

  • [Storage Settings] Improvements for Storage Settings include:


  • [Remote Server Administration Tools (RSAT)] New! This update adds support for Remote Server Administration Tools (RSAT) on Windows 11 Arm64 devices. IT administrators can now install and use tools such as Active Directory Domain Services and Lightweight Directory Services Tools, Active Directory Certificate Services Tools, Server Manager, Group Policy Management Tools, DNS Server Tools, and DHCP Server Tools. These tools are available as optional features and can be installed through Settings > System > Optional Features or from Control Panel > Programs > Turn Windows features on or off.

  • Advertisement
  • [Windows Update Settings] Improved: Responsiveness of the Windows Update settings page.

  • [Login and lock screens] Improved: Sign‑in screen reliability.

  • [Nearby Sharing] Improved: Reliability when sending larger files with Nearby Sharing.

  • [Projecting] Improved: Reliability of displaying the project menu after pressing Windows logo key + P.

  • Advertisement
  • [Printing] Improved: Performance of the Windows printing service (spoolsv.exe) to help printing run more smoothly and reduce slowdowns during high‑volume printing.

  • [File Explorer] 


    • Improved: You can now open a new File Explorer window more reliably. Holding the Shift key and selecting the File Explorer icon on the taskbar, or using the middle mouse button, now opens a new instance of File Explorer instead of the current one.

    • Improved: File Explorer now includes an Extract all option on the command bar when you browse non‑ZIP archive folders.

    • Advertisement
    • Improved: Reliability of displaying devices on the Network page in File Explorer.

  • [Display] 


    • Improved: This update improves reliability when your PC wakes from sleep.

    • Improved: Display-related performance improvements to help reduce the time for a PC to resume from sleep, especially when the system is under heavy load and in other scenarios.

  • Advertisement
  • [Other] Improved: This update improves visual consistency across Windows, including the taskbar when auto‑hide is on, credential fields in the Windows Security dialog, and the print dialog.

Microsoft is not aware of new issues with this month’s Patch Tuesday.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Meta rolls out new features for scam protection

Published

on

Meta announced new features today aimed at cracking down on scams perpetrated via its platforms. First, Meta is launching AI tools for identifying impersonator of brands and celebrities, as well as for detecting deceptive links, which should help it to quickly take down frauds. Second, it is adding new alerts to caution against interacting with a potentially fraudulent account. Facebook will roll out alerts for suspicious friend requests, WhatsApp is getting warnings for device linking requests, and Messenger will also issue warnings if an account seems suspect.

Finally, Meta is also continuing to expand its processes for advertiser verification. The company said it aims to have verified advertisers account for 90 percent of its ads revenue by the end of the year, up from the current share of 70 percent. Last year, Meta estimated that marketing for scams and banned products could have been responsible for 10 percent of its 2024 revenue.

The social media company has been ramping up its actions against scams, particularly those known as celeb bait. Last month, it sued three entities from Brazil and China that were behind scams that leveraged images and deepfakes of popular people to promote dubious products and investment schemes. Meta said today that over the course of 2025, it removed 159 million scam ads as well as 10.9 million Facebook and Instagram accounts tied to criminal scam centers.

Source link

Advertisement
Continue Reading

Tech

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

Published

on

Tag

CVE ID

CVE Title

Severity


.NET

Advertisement
CVE-2026-26131

.NET Elevation of Privilege Vulnerability

Important


.NET

CVE-2026-26127

Advertisement
.NET Denial of Service Vulnerability

Important


Active Directory Domain Services

CVE-2026-25177

Active Directory Domain Services Elevation of Privilege Vulnerability

Advertisement
Important


ASP.NET Core

CVE-2026-26130

ASP.NET Core Denial of Service Vulnerability

Important


Azure Arc

Advertisement
CVE-2026-26141

Hybrid Worker Extension (Arc-enabled Windows VMs) Elevation of Privilege Vulnerability

Important


Azure Compute Gallery

CVE-2026-23651

Advertisement
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Critical


Azure Compute Gallery

CVE-2026-26124

Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Advertisement
Critical


Azure Compute Gallery

CVE-2026-26122

Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Critical


Azure Entra ID

Advertisement
CVE-2026-26148

Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

Important


Azure IoT Explorer

CVE-2026-26121

Advertisement
Azure IOT Explorer Spoofing Vulnerability

Important


Azure IoT Explorer

CVE-2026-23662

Azure IoT Explorer Information Disclosure Vulnerability

Advertisement
Important


Azure IoT Explorer

CVE-2026-23661

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure IoT Explorer

Advertisement
CVE-2026-23664

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure Linux Virtual Machines

CVE-2026-23665

Advertisement
Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability

Important


Azure MCP Server

CVE-2026-26118

Azure MCP Server Tools Elevation of Privilege Vulnerability

Advertisement
Important


Azure Portal Windows Admin Center

CVE-2026-23660

Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability

Important


Azure Windows Virtual Machine Agent

Advertisement
CVE-2026-26117

Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability

Important


Broadcast DVR

CVE-2026-23667

Advertisement
Broadcast DVR Elevation of Privilege Vulnerability

Important


Connected Devices Platform Service (Cdpsvc)

CVE-2026-24292

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Advertisement
Important


GitHub Repo: zero-shot-scfoundation

CVE-2026-23654

GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability

Important


Mariner

Advertisement
CVE-2026-23235

f2fs: fix out-of-bounds access in sysfs attribute read/write

Important


Mariner

CVE-2026-23234

Advertisement
f2fs: fix to avoid UAF in f2fs_write_end_io()

Important


Mariner

CVE-2026-3713

pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

Advertisement
Moderate


Mariner

CVE-2026-23237

platform/x86: classmate-laptop: Add missing NULL pointer checks

Moderate


Mariner

Advertisement
CVE-2026-26017

CoreDNS ACL Bypass

Important


Mariner

CVE-2026-26018

Advertisement
CoreDNS Loop Detection Denial of Service Vulnerability

Important


Mariner

CVE-2026-2297

SourcelessFileLoader does not use io.open_code()

Advertisement
Moderate


Mariner

CVE-2026-0038

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-27601

Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack

Important


Mariner

CVE-2026-23236

Advertisement
fbdev: smscufx: properly copy ioctl memory to kernelspace

Moderate


Mariner

CVE-2026-23865

An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.

Advertisement
Moderate


Mariner

CVE-2025-71238

scsi: qla2xxx: Fix bsg_done() causing double free

Moderate


Mariner

Advertisement
CVE-2026-3338

PKCS7_verify Signature Validation Bypass in AWS-LC

Important


Mariner

CVE-2026-23231

Advertisement
netfilter: nf_tables: fix use-after-free in nf_tables_addchain()

Important


Mariner

CVE-2026-3381

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib

Advertisement
Critical


Mariner

CVE-2026-0031

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Mariner

Advertisement
CVE-2026-23238

romfs: check sb_set_blocksize() return value

Moderate


Mariner

CVE-2026-3494

Advertisement
MariaDB Server Audit Plugin Comment Handling Bypass

Moderate


Mariner

CVE-2026-3336

PKCS7_verify Certificate Chain Validation Bypass in AWS-LC

Advertisement
Important


Mariner

CVE-2026-0032

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Important


Microsoft Authenticator

Advertisement
CVE-2026-26123

Microsoft Authenticator Information Disclosure Vulnerability

Important


Microsoft Brokering File System

CVE-2026-25167

Advertisement
Microsoft Brokering File System Elevation of Privilege Vulnerability

Important


Microsoft Devices Pricing Program

CVE-2026-21536

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Advertisement
Critical


Microsoft Edge (Chromium-based)

CVE-2026-3544

Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3540

Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3536

Advertisement
Chromium: CVE-2026-3536 Integer overflow in ANGLE

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3538

Chromium: CVE-2026-3538 Integer overflow in Skia

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3545

Chromium: CVE-2026-3545 Insufficient data validation in Navigation

Unknown


Microsoft Edge (Chromium-based)

Advertisement
CVE-2026-3541

Chromium: CVE-2026-3541 Inappropriate implementation in CSS

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3543

Advertisement
Chromium: CVE-2026-3543 Inappropriate implementation in V8

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3539

Chromium: CVE-2026-3539 Object lifecycle issue in DevTools

Advertisement
Unknown


Microsoft Edge (Chromium-based)

CVE-2026-3542

Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly

Unknown


Microsoft Graphics Component

Advertisement
CVE-2026-25169

Windows Graphics Component Denial of Service Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25180

Advertisement
Windows Graphics Component Information Disclosure Vulnerability

Important


Microsoft Graphics Component

CVE-2026-25168

Windows Graphics Component Denial of Service Vulnerability

Advertisement
Important


Microsoft Graphics Component

CVE-2026-23668

Windows Graphics Component Elevation of Privilege Vulnerability

Important


Microsoft Office

Advertisement
CVE-2026-26110

Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26113

Advertisement
Microsoft Office Remote Code Execution Vulnerability

Critical


Microsoft Office

CVE-2026-26134

Microsoft Office Elevation of Privilege Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26144

Microsoft Excel Information Disclosure Vulnerability

Critical


Microsoft Office Excel

Advertisement
CVE-2026-26109

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26108

Advertisement
Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office Excel

CVE-2026-26107

Microsoft Excel Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Office Excel

CVE-2026-26112

Microsoft Excel Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

Advertisement
CVE-2026-26105

Microsoft SharePoint Server Spoofing Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26114

Advertisement
Microsoft SharePoint Server Remote Code Execution Vulnerability

Important


Microsoft Office SharePoint

CVE-2026-26106

Microsoft SharePoint Server Remote Code Execution Vulnerability

Advertisement
Important


Microsoft Semantic Kernel Python SDK

CVE-2026-26030

GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable

Important


Payment Orchestrator Service

Advertisement
CVE-2026-26125

Payment Orchestrator Service Elevation of Privilege Vulnerability

Critical


Push Message Routing Service

CVE-2026-24282

Advertisement
Push message Routing Service Elevation of Privilege Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-25170

Windows Hyper-V Elevation of Privilege Vulnerability

Advertisement
Important


SQL Server

CVE-2026-21262

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

Advertisement
CVE-2026-26116

SQL Server Elevation of Privilege Vulnerability

Important


SQL Server

CVE-2026-26115

Advertisement
SQL Server Elevation of Privilege Vulnerability

Important


System Center Operations Manager

CVE-2026-20967

System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Accessibility Infrastructure (ATBroker.exe)

CVE-2026-25186

Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability

Important


Windows Accessibility Infrastructure (ATBroker.exe)

Advertisement
CVE-2026-24291

Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25179

Advertisement
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-24293

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Advertisement
Important


Windows Ancillary Function Driver for WinSock

CVE-2026-25176

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

Advertisement
CVE-2026-25178

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows App Installer

CVE-2026-23656

Advertisement
Windows App Installer Spoofing Vulnerability

Important


Windows Authentication Methods

CVE-2026-25171

Windows Authentication Elevation of Privilege Vulnerability

Advertisement
Important


Windows Bluetooth RFCOM Protocol Driver

CVE-2026-23671

Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability

Important


Windows Device Association Service

Advertisement
CVE-2026-24296

Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows Device Association Service

CVE-2026-24295

Advertisement
Windows Device Association Service Elevation of Privilege Vulnerability

Important


Windows DWM Core Library

CVE-2026-25189

Windows DWM Core Library Elevation of Privilege Vulnerability

Advertisement
Important


Windows Extensible File Allocation

CVE-2026-25174

Windows Extensible File Allocation Table Elevation of Privilege Vulnerability

Important


Windows File Server

Advertisement
CVE-2026-24283

Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability

Important


Windows GDI

CVE-2026-25190

Advertisement
GDI Remote Code Execution Vulnerability

Important


Windows GDI+

CVE-2026-25181

GDI+ Information Disclosure Vulnerability

Advertisement
Important


Windows Kerberos

CVE-2026-24297

Windows Kerberos Security Feature Bypass Vulnerability

Important


Windows Kernel

Advertisement
CVE-2026-26132

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24289

Advertisement
Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-24287

Windows Kernel Elevation of Privilege Vulnerability

Advertisement
Important


Windows MapUrlToZone

CVE-2026-23674

MapUrlToZone Security Feature Bypass Vulnerability

Important


Windows Mobile Broadband

Advertisement
CVE-2026-24288

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

Important


Windows NTFS

CVE-2026-25175

Advertisement
Windows NTFS Elevation of Privilege Vulnerability

Important


Windows Performance Counters

CVE-2026-25165

Performance Counters for Windows Elevation of Privilege Vulnerability

Advertisement
Important


Windows Print Spooler Components

CVE-2026-23669

Windows Print Spooler Remote Code Execution Vulnerability

Important


Windows Projected File System

Advertisement
CVE-2026-24290

Windows Projected File System Elevation of Privilege Vulnerability

Important


Windows Resilient File System (ReFS)

CVE-2026-23673

Advertisement
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-26111

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Advertisement
Important


Windows Routing and Remote Access Service (RRAS)

CVE-2026-25173

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Routing and Remote Access Service (RRAS)

Advertisement
CVE-2026-25172

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important


Windows Shell Link Processing

CVE-2026-25185

Advertisement
Windows Shell Link Processing Spoofing Vulnerability

Important


Windows SMB Server

CVE-2026-26128

Windows SMB Server Elevation of Privilege Vulnerability

Advertisement
Important


Windows SMB Server

CVE-2026-24294

Windows SMB Server Elevation of Privilege Vulnerability

Important


Windows System Image Manager

Advertisement
CVE-2026-25166

Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability

Important


Windows Telephony Service

CVE-2026-25188

Advertisement
Windows Telephony Service Elevation of Privilege Vulnerability

Important


Windows Universal Disk Format File System Driver (UDFS)

CVE-2026-23672

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability

Advertisement
Important


Windows Win32K

CVE-2026-24285

Win32k Elevation of Privilege Vulnerability

Important


Winlogon

Advertisement
CVE-2026-25187

Winlogon Elevation of Privilege Vulnerability

Important


Source link

Advertisement
Continue Reading

Tech

Tech worker confidence falls faster than any other industry, survey finds

Published

on


Glassdoor’s Employee Confidence Index surveys US workers to discover how many feel positive about their companies’ six-month outlooks.
Read Entire Article
Source link

Continue Reading

Tech

Viral platform for AI agents only Moltbook acquired by Meta

Published

on

Moltbook, the platform designed for AI agents only, has been snapped up by social media giant Meta for an undisclosed sum.

Moltbook has been drawing both affection and disquiet in equal measure since the human-free platform where AI agents can ‘talk’ to each other launched back in January. Now social media giant and Facebook owner Meta has decided to add it to its stable of AI purchases, having picked up Manus back in January for a cool $2bn. Financial details have not been disclosed for this latest deal.

The news comes just weeks after Open AI poached the man behind the technology used by Moltbook – OpenClaw.  OpenAI said at the time it was hiring OpenClaw founder Peter Steinberger to develop the “next generation of personal agents”. In a post on X announcing the addition, OpenAI CEO Sam Altman said that personal agents will fast become one of the company’s core offerings.

Advertisement

OpenClaw, formerly known as Clawd (a pun that drew legal letters from Anthropic) is an open source project that lets users create personal AI agents, and quickly went viral on launchin November last year. It was also called ‘MoltBot’ for a time, before Steinberger landed on its final name.

Then Moltbook launched in January, using OpenClaw technology. Moltbook is a Reddit-style social media network where only AI agents could post, and humans could “observe”. The results could be, as one might imagine, concurrently entertaining and disturbing.

The site quickly went viral with AI agents, including many from OpenClaw, creating a new religion called ‘Crustafarianism’, among other things. Moltbook founders Matt Schlicht and Ben Parr will now join Meta’s Superintelligence Labs (MSL), the unit run by former Scale AI CEO Alexandr Wang. Meta paid a whopping $14.3bn for Scale AI back in June 2025, as it vies to compete with the likes of OpenAI and Google in the battle for AI consumers.

The Meta acquisition was originally broken by Ina Fried at Axios, to whom Meta confirmed: “The Moltbook team joining MSL opens up new ways for AI agents to work for people and businesses.” Siliconrepublic.com has reached out to Meta for comment.

Advertisement

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Tech

Amazon wins a temporary injunction against Perplexity’s Comet browser

Published

on

Amazon has secured a temporary win in its fight with Perplexity over the use of AI shopping bots. Bloomberg reported that a San Francisco federal court has determined that Perplexity must stop using its Comet web browser’s AI agent to make purchases for users on Amazon’s marketplace. The AI company will have a week to appeal the decision, otherwise it has been ordered to stop accessing any password-protected areas of Amazon’s systems and destroy its copies of Amazon’s data while the two companies continue to argue their cases.

“Amazon has provided strong evidence that Perplexity, through its Comet browser, accesses with the Amazon user’s permission but without authorization by Amazon, the user’s password-protected account,” District Judge Maxine Chesney wrote in placing the temporary block.

“The preliminary injunction will prevent Perplexity’s unauthorized access to the Amazon store and is an important step in maintaining a trusted shopping experience for Amazon customers,” an Amazon spokesperson told Bloomberg.

Amazon sent a cease-and-desist letter to Perplexity over the AI company’s shopping bots in November. According to Amazon, use of the Comet agent to make purchases is a violation of its terms of service. “Perplexity will continue to fight for the right of internet users to choose whatever AI they want,” a representative from Perplexity said of this week’s decision.

Advertisement

Source link

Continue Reading

Tech

Save big on these Botslab dash cams during Spring Deal Days

Published

on

Dash cams have become one of the most sensible additions you can make to a car, and Botslab has spent the past few years building a range that punches well above its weight on resolution, sensors and software.

Spring Deal Days has brought three of the brand’s strongest models down to their lowest prices yet, covering everything from a compact dual-camera setup to a full four-channel system that watches every angle simultaneously.

BOTSLAB G300H Plus 4K Dual Dash Cam

The G300H Plus is the entry point here, but the STARVIS 2 sensor it runs on is anything but entry-level, delivering double the low-light sensitivity and colour accuracy of the standard STARVIS chip found in most cameras at this price. That means you’ll get better footage from wet nights and unlit roads from most cameras around the £80 mark.

Built-in GPS logs your speed, route, and location into every clip, the 5GHz Wi-Fi transfers footage to the Botslab app in seconds. There’s also voice commands, which let you snap a photo or start recording without lifting your hands from the wheel.

Advertisement

And now, thanks to the Spring Deal Days, you can pick the G300H up for just £89.98 – down from £119.99.

Advertisement

Save 25% on Botslab’s 4K Dual DashcamSave 25% on Botslab’s 4K Dual Dashcam

The BOTSLAB G300H Plus 4K Dual Dash Cam is now jst £89.98 during Amazon’s Spring Deal Days

View Deal

BOTSLAB 4K Front and 2K Rear Dual Dash Cam

This model steps things up by pairing a 4K front camera with a dedicated 2K rear unit, so you get sharp coverage of what is happening both in front and behind the car, with a six-layer F1.5 aperture lens that pulls in enough light to capture license plates clearly at 15 metres.

Advertisement

It’s also the only camera in this roundup with a full ADAS suite, adding lane departure warnings, forward collision alerts, close-following reminders, and a two-hour fatigue prompt that nudges you to pull over and rest.

The super capacitor design also means it handles extreme temperatures in both the winter and summer.

The camera is currently down to £89.98 in the sale, down from £129.99.

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash CamSave £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

Save £50 on the BOTSLAB 4K Front and 2K Rear Dual Dash Cam

View Deal

Advertisement

Advertisement

BOTSLAB G980H 3K Four-Channel Dash Cam

The G980H is the most comprehensive of the three dash cams, running four 3k cameras simultaneously to cover 560 degrees.

Its Sentry parking mode goes further than most – triggering the moment someone edges close to the car rather than waiting for an impact. It also pre-records and stores eight seconds of footage before a G-sensor event fires, giving you the full picture of any incident rather than just the aftermath.

And with wa 128GB card included, you can get the camera up and running without any additional costs.

Advertisement

The G980H is available for £179.99, down from £219.99.

Botslab’s 4 channel Dash Cam is now under £200Botslab’s 4 channel Dash Cam is now under £200

Save 18% on a BOTSLAB G980H 3K Four-Channel Dash Cam during Amazon’s Spring Deal Days

View Deal

All three cameras are discounted until March 16, so you’ll need to be quick to pick one up in the sale.

Advertisement

Advertisement

Source link

Continue Reading

Trending

Copyright © 2025