Destructive malware available in NPM repo went unnoticed for 2 years

Destructive malware available in NPM repo went unnoticed for 2 years

Researchers have found malicious software that received more than 6,000 downloads from the NPM repository over a two-year span, in yet another discovery showing the hidden threats users of such open source archives face. Eight packages using names that closely mimicked those of widely used legitimate packages contained destructive payloads designed to corrupt or delete…

Report calls for regulation of “legally and ethically flawed” VMware

Report calls for regulation of “legally and ethically flawed” VMware

VMware’s business model under Broadcom is “legally and ethically flawed,” a group of cloud service provider (CSP) customers and partners alleged in a report released today. The report (PDF) comes from the European Cloud Competition Observatory (ECCO), which describes itself as “independent monitoring body” composed of members of the Cloud Infrastructure Services Providers in Europe…

New Claude 4 AI model refactored code for 7 hours straight

New Claude 4 AI model refactored code for 7 hours straight

On Thursday, Anthropic released Claude Opus 4 and Claude Sonnet 4, marking the company’s return to larger model releases after primarily focusing on mid-range Sonnet variants since June of last year. The new models represent what the company calls its most capable coding models yet, with Opus 4 designed for complex, long-running tasks that can…

Authorities carry out global takedown of infostealer used by cybercriminals

Authorities carry out global takedown of infostealer used by cybercriminals

A consortium of global law enforcement agencies and tech companies announced on Wednesday that they have disrupted the infostealer malware known as Lumma. One of the most popular infostealers worldwide, Lumma has been used by hundreds of what Microsoft calls “cyber threat actors” to steal passwords, credit card and banking information, and cryptocurrency wallet details….

“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall

“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall

Signal Messenger is warning the users of its Windows Desktop version that the privacy of their messages is under threat by Recall, the AI tool rolling out in Windows 11 that will screenshot, index, and store almost everything a user does every three seconds. Effective immediately, Signal for Windows will by default block the ability…

Apple legend Jony Ive takes control of OpenAI’s design future

Apple legend Jony Ive takes control of OpenAI’s design future

On Wednesday, OpenAI announced that former Apple design chief Jony Ive and his design firm LoveFrom will take over creative and design control at OpenAI. The deal makes Ive responsible for shaping the future look and feel of AI products at the chatbot creator, extending across all of the company’s ventures, including ChatGPT. Jony Ive…

Windows 11’s most important new feature is post-quantum cryptography. Here’s why.

Windows 11’s most important new feature is post-quantum cryptography. Here’s why.

Microsoft is updating Windows 11 with a set of new encryption algorithms that can withstand future attacks from quantum computers in an attempt to jump-start what’s likely to be the most formidable and important technology transition in modern history. Computers that are based on the physics of quantum mechanics don’t yet exist outside of sophisticated…

Chicago Sun-Times prints summer reading list full of fake books

Chicago Sun-Times prints summer reading list full of fake books

On Sunday, the Chicago Sun-Times published an advertorial summer reading list containing at least 10 fake books attributed to real authors, according to multiple reports on social media. The newspaper’s uncredited “Summer reading list for 2025” supplement recommended titles including “Tidewater Dreams” by Isabel Allende and “The Last Algorithm” by Andy Weir—books that don’t exist…

Balancing hard and soft skills: the key to high-performing IT teams

Balancing hard and soft skills: the key to high-performing IT teams

Because technology changes so quickly, IT teams must constantly learn new things, from cloud platforms and coding languages to AI tools, data science methods, and security measures. But relying on technical skills alone isn’t enough to guarantee success. Many organizations now see that balancing strong technical abilities, a.k.a. hard skills, with soft skills such as…