-
Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation in the…
-
Preserving content provenance by integrating Content Credentials into Cloudflare Images
Today, we are thrilled to announce the integration of the Coalition for Content Provenance and Authenticity (C2PA) provenance standard into Cloudflare Images. Content creators and publishers can seamlessly preserve the entire provenance chain — from how an image was created and by whom, to every subsequent edit — across the Cloudflare network. What is the…
-
9 Best Endpoint Management Software in 2025
Keeping track of laptops, phones, and IoT devices can feel like herding cats, especially with remote work on the rise. That’s where endpoint management software steps in making it easier to protect data, stay compliant, and manage your tech. In this article, I’ll dive into what endpoint management is and share 9 standout tools to…
-
Code injection attacks using publicly disclosed ASP.NET machine keys
In December 2024, Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and building protections against this activity, we observed an insecure practice whereby developers have incorporated various publicly…
-
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Inspiration can spark in an instant when you’re at a conference. Perhaps you discover a new tool during a keynote that could save you hours of time. Or maybe a peer shares a story over coffee that makes you rethink an approach. One conversation, one session, or one event could give you fresh ideas, renewed…
-
A Great Use for AI: Wasting Scammers Time!
We may have found the killer app for AI. Well, actually, British telecom provider O2 has. As The Guardian reports, they have an AI chatbot that acts like a 78-year-old grandmother and receives phone calls. Of course, since the grandmother—Daisy, by name—doesn’t get any real phone calls, anyone calling that number is probably a scammer.…
-
How Do We Deal With Microplastics In The Ocean?
Like the lead paint and asbestos of decades past, microplastics are the new awful contaminant that we really ought to do something about. They’re particularly abundant in the aquatic environment, and that’s not a good thing. While we’ve all seen heartbreaking photos of beaches strewn with water bottles and fishing nets, it’s the invisible threat…
-
Lorentz Cannon Fires Lightning
[Editor’s note: This video disappeared, but there’s another version here at the moment. We’re leaving the links as-were in case they come back up soon.] The aptly named [LightingOnDemand] has created a Lorentz cannon that can fire a lightning bolt. Honestly, as you can see in the video below, it looks like something from a…
-
A Tube, The Wooden Kind
While we aren’t heavy-duty woodworkers, we occasionally make some sawdust as part of a project, and we admire people who know how to make wood and do what they want. We were surprised when [Newton Makes] showed a wooden dowel that was quite long and was mostly hollow. The wall was thin, the hole was…
-
Lorem Ipsum 36? Dolor Sit Amet Keyboard!
You know, it’s a tale as old as custom mechanical keyboards. [penkia] couldn’t find any PCBs with 36 keys and Gateron low-profile switch footprints, so they made their own and called it the LoremIpsum36. Isn’t it lovely? This baby runs on an RP2040, which sits flush as can be in a cutout in the PCB.…