Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

FBI.gov email accounts are being sold online, could be used to spread malware on an industrial scale - here's what you need to know

TechRadar News - Fri, 08/15/2025 - 16:50
  • Compromised FBI.gov emails are being sold for $40 on encrypted dark web channels
  • Criminals use stolen government accounts to submit forged emergency requests to tech companies
  • Sellers offer full SMTP, POP3, or IMAP credentials for complete account control

Cybersecurity researchers have raised concerns over the sale of compromised FBI.gov and other government email accounts on the dark web, warning the activity could enable malware campaigns on a large scale.

A report from Abnormal AI claims these accounts are being offered through encrypted messaging services such as Telegram and Signal, with some priced as low as $40.

In some cases, sellers have offered bundles containing multiple US government accounts, including those with FBI.gov domains, which carry a high level of credibility.

Hackers offer full access and high credibility

The cost of these accounts is relatively small, but the potential impact is substantial because the accounts can be used to impersonate trusted authorities.

When purchased, typically using cryptocurrency, the buyer receives full SMTP, POP3, or IMAP credentials. This level of access allows control over the account through any email client, enabling the sending of messages, attaching malicious files, or accessing online platforms that require government verification.

Some ads encourage buyers to submit fraudulent emergency data requests.

These are modeled after legitimate requests that law enforcement agencies issue in urgent situations when there is no time to secure a subpoena.

Technology companies and telecom providers are legally obliged to respond to valid requests, meaning forged ones could potentially lead to the disclosure of sensitive data such as IP addresses, emails, and phone numbers.

Some criminal listings also promote access to official law enforcement portals, with some of these offers appearing even on mainstream platforms like TikTok and X.

Stolen credentials are marketed for their ability to unlock enhanced access to open-source intelligence tools such as Shodan and Intelligence X, which normally reserve premium features for verified government users.

The methods used to obtain these accounts are often straightforward but effective.

One major approach is credential stuffing, where attackers exploit password reuse across multiple platforms.

Another method involves infostealer malware, which is software designed to extract saved login credentials from browsers and email clients.

Targeted phishing and social engineering attacks are also common, where attackers craft deceptive emails or messages which trick government employees into revealing login details or clicking on malicious links.

Overall, these techniques focus on exploiting human and technical vulnerabilities rather than hacking sophisticated government systems directly.

That said, emails originating from domains such as .gov and .police tend to bypass many technical filters, making recipients more likely to open attachments or click on embedded links.

This advantage increases the success rate of phishing attempts or malware delivery.

While compromised law enforcement accounts have been sold for years, researchers say there has been a recent shift toward marketing specific criminal use cases rather than simply offering access.

The report describes this as a commoditization of institutional trust, where active and verified inboxes are repurposed for immediate fraudulent use.

You might also like
Categories: Technology

Today's Wordle Hints, Answer and Help for Aug. 16, #1519

CNET News - Fri, 08/15/2025 - 16:20
Here are hints and the answer for today's Wordle, No. 1,519 for Saturday, Aug. 16.
Categories: Technology

Call of Duty: Black Ops 7 Leak Claims Nov. 14 Release Date, No Switch 2 Version Yet

CNET News - Fri, 08/15/2025 - 16:15
What new conspiracies will be revealed in Black Ops 7?
Categories: Technology

Today's NYT Connections Hints, Answers and Help for Aug. 16, #797

CNET News - Fri, 08/15/2025 - 16:14
Here are some hints and the answers for the NYT Connections puzzle No. 797 for Saturday, Aug. 16.
Categories: Technology

Booking.com phishing scam uses secret characters to trick victims - last-minute holiday hunters beware

TechRadar News - Fri, 08/15/2025 - 16:03
  • Cybercriminals are using the Japanese alphabet to spoof Booking.com
  • Scammers are targeting people with listings on the site
  • Users are advised to carefully review incoming messages

Cybercriminals are spoofing Booking.com with a clever use of Unicode characters in their phishing landing pages to spread malware.

Independent security researcher alias JAMESWT recently reported seeing phishing emails being sent to people listing their real estate on the popular lodging reservation service. In the email, the victims are told that someone complained about their listing, and that they should review it fast or face termination.

The email also provides the link which when opened, at first glance looks legitimate. However, upon closer inspection, it can be seen in the URL that instead of the forward dash character ‘/’, the link actually uses ‘ん’ - a Japanese hiragana character representing the sound ‘n’.

Typosquatting

Hiragana is one of the three main scripts used in written Japanese, alongside katakana and kanji.

Those that fail to spot the trick and open the site will get served a malicious MSI installer from a CDN link. The researcher added that samples of the malicious site are already available on the cybersecurity platform MalawareBazaar, and that the any.run analysis already shows the infection chain.

It is believed that the attackers are spoofing Booking.com to deliver infostealers and remote access trojans (RAT).

Replacing a single character in the URL, in order to trick victims into opening websites, is a long-established practice. It is called “typosquatting” and banks on the victims not being careful when reviewing the URL they are opening.

Booking.com, being one of the most popular lodging reservation services in the world, is often spoofed in such attacks, together with the likes of Amazon, Microsoft, DHL, and others.

Defending against these attacks is relatively easy, and requires users to slow down and carefully review incoming communications, especially unsolicited messages. Double-checking links, attachments, websites, and thinking twice about sharing sensitive data is the best course of action these days.

Via BleepingComputer

You might also like
Categories: Technology

Today's NYT Strands Hints, Answers and Help for Aug. 16 #531

CNET News - Fri, 08/15/2025 - 15:53
Here are hints and answers for the NYT Strands puzzle for Aug. 16, No. 531.
Categories: Technology

Every Free Battlefield 6 Open Beta Challenges Reward You Can Earn

CNET News - Fri, 08/15/2025 - 15:46
If you play the open beta during its second weekend, you can earn operator skins, weapon skins and other cosmetic goodies.
Categories: Technology

Crowdfunded AI smartphone with free global internet, detachable keyboard, and square screen gets over $1 million in pledges - and it's strangely mesmerizing

TechRadar News - Fri, 08/15/2025 - 15:29
  • iKKO MindOne has raised over $1.2 million through its crowdfunding campaign
  • A 4.02-inch AMOLED display is protected by sapphire glass with curved, impact-resistant edges
  • The device’s 50MP rotating camera doubles as both front and rear photography hardware

The iKKO MindOne is a crowdfunded smartphone that has raised over $1.2 million, promising a compact yet capable design for work and travel.

Measuring 86x72mm and 8.9mm thick, only slightly wider than a credit card, this business smartphone uses a 4.02-inch AMOLED display with precision-curved edges to improve resistance against cracks and drops.

Marketed partly as a rugged smartphone, the MindOne uses sapphire glass with a claimed 9H hardness rating, designed to resist scratches and moderate impact.

Dual-purpose camera protected by sapphire glass

The device features a 50MP Sony 1/1.56-inch sensor with custom OIS and F1.88 aperture, similar to many smartphones on the market.

The rotating module flips 180 degrees, serving as both front and rear camera, and is protected by sapphire glass, promising higher-quality selfies and flexibility for video calls without sacrificing main camera performance.

The iKKO MindOne integrates a virtual SIM system with two modes.

NovaLink provides free global access for built-in AI tools in more than 60 regions, while a paid vSIM service covers over 140 countries for full data use, including browsing and streaming.

It also supports a nano SIM slot that offers global 4G+ LTE bands for traditional connectivity.

The manufacturer chose 4G+ over 5G for better roaming stability, lower heat output, and improved battery life.

The device runs Android 15 alongside iKKO AI OS, a dedicated workspace for focused tasks.

It also supports Google Mobile Services, and the company promises three major Android version upgrades and five years of security patches.

Switching between the two is done via a physical button, and selected Android apps can be brought into the AI environment.

The device supports real-time translation, voice notes, transcription, and summarization, with no subscription fees and claims of zero personal data collection.

Powered by the MediaTek MT8781, a low-power 4G+ platform, the MindOne carries a 2200mAh battery designed for all-day use in a compact form.

An optional snap-on QWERTY keyboard case adds tactile typing, a Cirrus Logic CS43198 DAC with 3.5mm headphone jack, and a 500mAh auxiliary battery.

This accessory could appeal to those needing precise text entry or high-fidelity audio, although it increases the device’s size and weight.

The iKKO MindOne offers an intriguing take on making a mobile phone truly mobile, but whether it moves from a well-funded crowdfunding project to a reliable everyday tool will depend on how these features perform beyond early marketing.

You might also like
Categories: Technology

One of the world's biggest mobile firms has launched a $170 AI smartphone which includes a free 18-month sub to Perplexity Pro worth $360 - I wonder what happens on month 19?

TechRadar News - Fri, 08/15/2025 - 13:42
  • Deutsche Telekom T Phone 3 launches at $170 with a €1 bundle offer in Germany
  • Perplexity Pro subscription worth $360 is included free for 18 months with purchase
  • Picsart Pro image editing tools are bundled for three months at no extra cost

Deutsche Telekom has launched the T Phone 3, a new AI-focused smartphone priced at $170, positioning it as an affordable entry point into integrated AI services.

A bundle offer reduces the cost to €1 when purchased with a tariff, and the package also includes an 18-month subscription to Perplexity Pro, valued at $360, along with a three-month Picsart Pro license.

The company has confirmed a "Pro" version of the AI phone will be released later this year, although exact details aren't known.

AI integration and activation methods

The smartphone centers on Perplexity Assistant, providing AI tools for real-time translation, trip planning, tutoring, email drafting, content summarization, and image editing.

Users can activate these functions either by pressing a dedicated magenta button or by double-tapping the power key.

Both voice and text input are supported, aiming to streamline interaction and reduce dependency on conventional app-based workflows.

This approach positions the device as a business smartphone option for users who prioritize efficiency in communication and task management.

The T Phone 3 features improved charging and AI-assisted camera functions compared to its predecessor.

Although not marketed strictly as a rugged smartphone, Deutsche Telekom points to improved durability and the use of recycled materials in its construction.

The device’s longevity in more demanding conditions remains to be seen, although the company emphasizes sustainability in design and component sourcing.

Alongside the smartphone, Deutsche Telekom also launched the T Tablet 2 in Germany, priced from €199 and includes the same 18-month Perplexity Pro subscription and Picsart Pro license.

Like the phone, it supports the dedicated AI activation controls and upgraded performance features, although the smartphone remains the primary focus of the company’s AI device push.

The inclusion of an 18-month subscription is central to the value proposition, yet the long-term appeal will depend on how many users continue paying once the free period ends.

With forecasts predicting that AI smartphones could dominate shipments by 2028, the challenge for Deutsche Telekom will be to maintain relevance when the initial incentives expire.

Via MobileWorldLive

You might also like
Categories: Technology

A company you've never heard of has beaten Dell and Lenovo to launch a notebook with an AMD Ryzen AI MAX+ 395 APU - with the largest battery you'll find on a laptop

TechRadar News - Fri, 08/15/2025 - 13:27
  • Sixunited launches lightweight 16 inch laptop powered by Ryzen AI MAX+ 395 APU
  • AMD's Strix Halo processor has mostly be found in mini PCs to date with a few pricey exceptions
  • Large 99.9Wh battery delivers long runtimes while keeping weight under 1.8kg

Sixunited, a relatively unknown laptop maker from Shanghai, China, has unveiled a new notebook which arrives ahead of Dell and Lenovo in adopting AMD’s latest high-end laptop processor.

The XN77-160M-CS features the AMD Ryzen AI MAX+ 395 APU, also known as Strix Halo, a 16-core chip with integrated Navi 3.5 graphics and a 50 TOPS NPU.

This APU has been rare in the laptop market, with only a handful of models, such as HP’s ZBook Ultra G1a and Asus ROG Flow Z13 announced so far.

Large capacity battery

Sixunited will offer two thermal configurations, 85W and 120W, both supported by a dual-fan cooling system, and paired with LPDDR5X (non-upgradable) memory running at up to 8000 MT/s.

Storage comes from up to two PCIe 4.0x4 SSDs in M.2 2280 format, allowing for large and fast configurations.

Perhaps the most notable aspects of the new laptop is its 99.9Wh battery, which is the largest capacity allowed for most airlines.

Despite the large battery, the chassis weighs under 1.8kg and is built with aluminum and mylar materials.

The laptop includes a 16-inch display at 2560x1600 resolution with a 165Hz refresh rate and 100% sRGB coverage, with an OLED version also planned for the future.

Videocardz notes the XN77-160M-CS is a barebones design, meaning it may appear under different brand names. Sixunited often acts as an OEM supplier for other companies.

Pricing remains unknown for now, but it’s not likely to be cheap. For comparison, Asus’ AI MAX+ 395 laptop starts at $2099, while HP’s device is priced from $4099.

Sixunited’s move adds another option for those seeking a compact yet powerful laptop with extended battery life.

It also highlights growing interest in AMD’s Strix Halo platform, which to date has mostly appeared in mini-PCs like the GMKTec EVO-X2, Beelink AI Mini and AOOSTAR NEX395.

You might also like
Categories: Technology

Best Travel Headphones for 2025

CNET News - Fri, 08/15/2025 - 13:23
Do you have upcoming travel plans? We've rounded up the best noise-canceling headphones to pack for all your adventures.
Categories: Technology

Healthy Back-to-School Snacks Kids Will Love, With Registered Dietitian Picks

CNET News - Fri, 08/15/2025 - 11:40
Take the guesswork out of what to throw into their lunch boxes or on their plates after school.
Categories: Technology

Ultrahuman Calls Ring Air the World's Most Accurate Ovulation-Tracking Smart Ring After New Acquisition

CNET News - Fri, 08/15/2025 - 11:17
Ultrahuman created the Ring Air's Cycle and Ovulation Pro PowerPlug using an algorithm designed for intravaginal fertility monitors.
Categories: Technology

The Peanuts Gang Is Back With Apple TV Plus Summer Musical

CNET News - Fri, 08/15/2025 - 10:57
The 40-minute special is the first new musical from the "Peanuts" franchise in more than 35 years.
Categories: Technology

Another devious antivirus killer tool has been found - so make sure you're protected

TechRadar News - Fri, 08/15/2025 - 10:36
  • Crypto24 ransomware group was seen disabling AV protection before deploying the encryptor
  • In some cases, it can even uninstall the AV programs
  • A layered defense is the best approach to mitigate the threat

Security researchers have found another antivirus-killing tool out there that hackers are using before dropping any additional payloads.

Experts from Trend Micro have uncovered custom variant of the open source tool called RealBlindingEDR.

This tool comes with a hardcoded list of antivirus company names:

Trend Micro
Kaspersky
Sophos
SentinelOne
Malwarebytes
Cynet
McAfee
Bitdefender
Broadcom (Symantec)
Cisco
Fortinet
Acronis

When it is deployed on a device, it looks for these names in driver metadata, and if it finds one, it disables kernel-level hooks/callbacks, essentially blinding detection engines. Trend Micro’s researchers found the hackers are also able to silently uninstall antivirus programs altogether, opening the doors and enabling easy deployment of stage-two malware.

Crypto24

The tool was seen in the wild, used by a hacking collective called Crypto24, a nascent ransomware group first spotted in September 2024.

However, the researchers believe the group consists of former members of other, defunct hacking collectives, since its members are highly skilled and experienced.

When it gains initial access, establishes persistence, and removes antivirus roadblocks, the group usually deploys two pieces of malware - a keylogger, and an encryptor. All of the stolen secrets are exfiltrated into a Google Drive using a custom tool.

The identity, or location, of Crypto24 is currently unknown. However, researchers are saying that in its short lifespan, the group successfully hit a number of large organizations in the United States, Europe, and Asia. Most of their targets are in finance, manufacturing, tech, and entertainment.

There are many ways to protect against attacks looking to disable antivirus protection, including opting for a layered defense strategy.

Companies can use a reputable antivirus with tamper protection, enable real-time protection and firewalls, and use a separate anti-malware tool that can work alongside an AV.

Via BleepingComputer

You might also like
Categories: Technology

Apple could be working on its fastest ever Mac if this Mac Pro with M4 Ultra rumor is true

TechRadar News - Fri, 08/15/2025 - 10:01
  • A Mac Pro has again been rumored for launch later this year
  • It'll come with an M4 Ultra based on clues drawn from Apple's internal code
  • M4 UItra could run with a 32-core CPU and an 80-core GPU in theory

The next iteration of the Mac Pro might see Apple powering the computer with an M4 Ultra chip, we've heard again.

It's been a couple of years since the last incarnation of the Mac Pro, which used the M2 Ultra, so it would be a considerable leap in performance to upgrade to a theoretical M4 Ultra – but Macworld reports that this is what's in the cards.

This is based on Apple's internal code that Macworld caught a glimpse of somehow, which contained the identifier 't8152' – and we're told this suggests the use of the M4 Ultra, codenamed 'Hidra' (a name that's previously been aired on the rumor mill via Bloomberg).

There's not much else to this rumor, and Macworld doesn't have any details on the spec, although it theorizes that the M4 Ultra could run with a 32-core CPU and an 80-core GPU.

As ever with this kind of leak, it could be genuine and yet never come to fruition. It might just show us that Apple has been testing a Mac Pro configuration along these lines – but it's possible that this machine may never see the light of day, ending up canned at some point in prototyping.

(Image credit: Brittany Hosea-Small/ AFP/ Getty Images)Analysis: M4 or wait for M5?

This leak tells us a couple of things. Firstly, that Apple staff can't spell 'Hydra' (well, okay, alternatively let's say Apple engineers can't think up decent codenames). And, being serious, that it does appear increasingly likely that a new Mac Pro design is going to pitch up later this year.

Indeed, the Mac Pro coming out later in 2025, complete with M4 Ultra, was suggested over a year ago now, so this latest nugget of speculation backs up the previous buzz on the grapevine.

On top of the weight of rumors starting to add up, there's also the fact that for Apple, the Mac Pro is in something of an odd predicament right now. This is due to the M4 Pro flexing some considerable performance muscles, and outgunning the Mac Pro's M2 Ultra. The upshot is you can buy a Mac mini (with M4 Pro) and get better performance – at least in terms of raw CPU power – than the Mac Pro, which isn't a good look for the seriously pricey computer.

Not that the Mac Pro is competing with Apple's compact Mac mini, of course – it's a heavyweight pro-targeted PC that offers a lot of advantages in terms of hefty memory loadouts and PCIe expansion options. It is a very different beast indeed, but still, Apple needs to keep the Mac Pro on a reasonable footing in relative performance terms - again meaning that the rumored refresh with an M4 Ultra seems more likely.

A two-year gap also seems a fair enough timeframe for a refresh, and it feels somewhat unlikely to me that Apple would want to wait until the M5 series before pushing out a new Mac Pro given the above reasons.

That said, there are those who've argued that the M4 Ultra isn't going to happen – due to issues around jamming two M4 Max chips together, which is what the Ultra chips do – and that Apple will indeed wait it out for the M5 series to make another Ultra model.

So, everything's rather up in the air for now – but if an M4 Ultra is going to happen, it will surely be in a new Mac Pro, and we're likely to see more leaks soon enough. If the whispers go quiet over the next couple of months, that'll tell its own story.

You might also like...
Categories: Technology

Premier League Soccer: Stream Liverpool vs. Bournemouth Live From Anywhere

CNET News - Fri, 08/15/2025 - 10:00
The defending champions kick off the new season at Anfield as the Reds host the Cherries.
Categories: Technology

The EU’s first ESPR Working Plan is out: Tech companies need to consider DPP compliance now

TechRadar News - Fri, 08/15/2025 - 09:38

It is not surprising that climate change is becoming a growing weight on society, with sustainability needing to take priority if we want to protect the future of our planet. To put this into context, over the last few years, the UK alone has been responsible for 1.6 million tons of electronic waste, and it is known to be one of the largest e-waste producers worldwide.

Although these figures are slowly decreasing, sustainability must become a growing business imperative if we want to seriously change the tide. For businesses to truly thrive, more sustainable practices are essential to success in the modern consumer climate.

Beyond both consumers and businesses, governments are also being seen to take note of the importance of increased sustainability and implementing a range of measures to help foster a circular economy. In particular, as part of the EU’s Ecodesign for Sustainable Products Regulation (ESPR) and its recent Energy Labelling Working Plan announcement, the EU aims to ensure tech companies that place products in the EU marketplace start implementing processes to tackle sustainability first hand.

The regulatory reasoning: The EU’s ESPR and Working Plan

Under its Circular Economy Action Plan (CEAP), the EU has led a series of efforts aimed at pushing businesses toward greater sustainability and circularity. A clear example of this commitment is the ESPR, which came into effect last summer and underscores the European Commission’s drive to build a more circular, resource-efficient economy.

For context, the ESPR aims to boost circularity and the practices that contribute to sustainability by creating a framework that “aims to make sustainable products the norm on the EU market.” In layman's terms, it focuses on the production of items that last longer, use energy and resources more efficiently, are easier to repair and recycle, contain fewer substances of concern and include more recycled content.

The circularity regulation is set to apply to select product groups, including those in the electronics and textiles space, and will apply to all businesses that place products within these groups on the EU marketplace, regardless of where they were produced.

As part of this, businesses will need to work towards the implementation of Digital Product Passports (DPPs) - a mandatory requirement for products that fit within the identified product categories.

As the ESPR’s first Working Plan was published at the end of April, a document officially listing the sectors due to be prioritized by the regulation, it is more pressing than ever for technology companies to begin their ESPR compliance journey now.

As the Working Plan provides a timeline for the delegated acts - a set of requirements concerning each product group - to be announced , compliance urgency is increasing at speed. Moreover, with the Working Plan outlining a range of upcoming horizontal requirements, such as repairability for consumer electronics and increased use of recycled content, the technology industry has been listed as a key priority.

In simple terms, the Working Plan aims to focus on the ESPR’s ability to have positive environmental impacts, its capacity to deliver, and the need to simplify regulations.

This update in legislation, and its focus on the timeline for the delegated acts to be announced, is only another reminder that the compliance clock is ticking for technology companies across the world that sell in the EU marketplace.

With the timelines for the delegated acts now established—some taking effect as early as 2026 for sectors like steel - businesses face significant changes in the near future. Companies that delay action risk not only non-compliance but also losing their competitive edge.

Where do DPPs fit in? The mandate and fostering eco-products

To unpack DPPs - a key component of the compliance exercise - they largely act as a digital record of a physical product, securely keeping track of information across its lifecycle. This can include anything from the material used in its production, the environmental impact of its manufacturing, a record of its authenticity, and guidance for end-of-life handling. In most circumstances, this data will be accessible via a data carrier like a QR code or barcode affixed to a product and accessible by scanning with a device such as a smartphone.

DPPs are set to play a key role in advancing the ESPR’s circularity ambitions by offering greater visibility into a product’s entire lifecycle. By embedding DPPs into products, the regulation encourages everyone who interacts with them, from manufacturers to end-users, to adopt more sustainable practices and embrace circular thinking.

For consumers, DPPs provide the information needed to make environmentally conscious purchasing decisions and dispose of products responsibly at end of life. For businesses, this level of transparency opens up opportunities to enhance sustainability across supply chains, from sourcing materials to refining internal processes.

DPPs also prove beneficial to tech industry businesses when considering notions of brand engagement and customer loyalty. For example, they could help businesses to prove the sustainability credentials of their products to the end consumer and can help to avoid accusations of greenwashing.

By potentially even verifying authenticity and keeping a history of any repairs made to a product, technology firms could even utilize the information in DPPs to facilitate take back or resale schemes, encouraging users to recycle their products, turning them back into usable products to be resold - another effort towards the circular economy.

Action point one: Data and DPP solution strategies

As the ESPR’s Working Plan has just been released, it is very easy for businesses to feel overwhelmed by the upcoming regulation and its DPP mandate. In particular, with the Working Plan establishing the horizontal requirements and its focus on product repairability and recyclability, the technology sector must begin considering its DPP compliance journey now to ensure the products they create meet sustainability standards.

As a first step, businesses should assign an employee or team to be at the forefront of upcoming compliance efforts. By ensuring that an employee or group of employees is staying updated on legislation, businesses can ensure they remain aware of specific industry requirements coming down the pipeline.

As part of this, it would be advisable to reach out to a DPP advisor and gain a deeper understanding of the mandate’s industry-specific impact. By doing so, companies can carve out a coherent and bespoke strategy accordingly.

To stay ahead of the ESPR, businesses should start by mapping where critical product data resides - both within their own operations and throughout their supply chains. It's also essential to evaluate which partners are best equipped to support the rollout of DPPs. Once a solution is in place, piloting becomes the logical next step.

Running a pilot allows companies to test implementation in real-world conditions, identify process gaps, and gather valuable data to better estimate the scale and timing of a full rollout. With this groundwork laid, businesses will be well-positioned to accelerate their efforts as soon as the delegated acts come into effect.

For all tech companies selling into the EU marketplace, the ESPR’s forthcoming DPP mandate represents a range of challenges and opportunities for the industry. As the Working Plan’s recent publication only heightens the need for DPP compliance, this moment represents a critical chance to advance a circular economy.

As companies are faced with an opportunity to advance their sustainability credentials (and subsequent business success), the way they choose to tackle this legislation will determine whether they merely meet compliance standards or accelerate as sustainable brands of the future.

We've featured the best green web hosting.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Why emerging tech needs a new breed of distributor

TechRadar News - Fri, 08/15/2025 - 09:32

The current distribution model is broken.

The channel is flooded with innovation: AI, automation, infrastructure, security. Everywhere you turn, another vendor is promising the future. But most of them won’t make it. Not because their tech isn’t good, but because the legacy route-to-market isn’t built to support them.

The traditional distribution model was designed for scale, but the kind that follows success, not the kind that builds it. It’s focused on process over potential. It rewards predictability, not boldness. And for emerging vendors trying to break into the market, that’s a problem.

Growth-stage vendors don’t need a distributor. They need a distribution partner. They need experts in their corner who can recognize early potential, do the heavy lifting to bring it to life, and move quickly when opportunities arise. That’s not the job most distributors were built to do. But it’s the job that needs doing now.

Distribution isn’t dead

When Pax8 took out a full-page ad in the New York Times to challenge the legacy distribution model, it raised eyebrows across the channel. It was bold, unapologetic, unexpected, and whether you agreed with the tactic or not, it was a conversation starter.

And that’s the point. Distribution is being disrupted; it’s changing. But it’s not dying.

And no, we’re not talking about changes like a move from hardware to SaaS, or from perpetual to subscription. This new age of distribution is about a new set of expectations. Think real-time analytics, partner orchestration, recurring revenue models, and AI-infused everything.

It is also, most importantly, about the human touch. Vendors and partners need to be able to have live conversations with humans that care and can address any challenges they face. The ability to make a call to your main contact at a distributor can’t be underestimated – the contact that knows your business inside out.

To serve this market, distributors need to behave more like GTM strategists and growth consultants – and behave like they have equal skin in the game. They need to know when to push, where to invest, and how to build momentum from zero.

Challenger brands need challenger distribution

The channel loves a leaderboard. Gartner. Forrester. IDC. And more often than not, the attention goes straight to the top-right of Gartner’s Magic Quadrant; to the ‘Leaders’ that already have market share, not necessarily those driving the next wave of innovation.

The problem is that innovation rarely starts at the top.

The most exciting technologies today are being built by vendors you won’t find in glossy analyst reports. These companies are small, focused, and fast. They’re solving problems in new ways. They’re thinking beyond incremental change. And they’re ready to scale, if they can find the right partner.

But most distributors aren’t built to serve them. Their KPIs don’t account for emerging vendor complexity. Their teams aren’t structured for market creation. Their onboarding processes weren’t designed for agility, and most distributors require healthy marketing budgets to get attention. As a result, the most promising solutions often get overlooked.

What challenger vendors need is a distributor that moves differently. One that’s selective, strategic, and unafraid to bet early.

Data-led, outcome-obsessed

The best distributors don’t just move quickly to identify new opportunities. They move with purpose. And that purpose is driven by data.

Emerging vendors don’t have the luxury of guesswork. Every GTM decision and every partnership matters. That’s why the distributors that really add value aren’t the ones offering the broadest line card, they’re the ones doing the best homework.

Before a single contract is signed, the best distribution partners are already elbows-deep in analysis. They’re evaluating financials, scrutinizing product maturity, interrogating GTM plans, and mapping market readiness. This ensures that they’re not dazzled by demos or led by hype. They’re guided by evidence.

And it doesn’t stop at onboarding.

Smart distributors monitor vendor growth signals in real time. They know which channel programs are converting, which partner profiles are selling, and where the real momentum is coming from—not just at the regional or vertical level but at the micro-layer of product features, deal size, and partner behavior.

Data drives every decision here. From which vendors are onboarded, to how they’re launched, developing a marketing plan and to the way pipeline is tracked and optimized over time.

There’s a growing divide between the brands that are truly ready to scale and the ones who just look good on paper. Spotting the difference is hard. That’s why most distributors don’t try. They wait until success is proven, then show up with a cookie-cutter pitch deck.

But that’s not how category leaders are built. Category leaders are backed early, built methodically, and launched with focus, strategy, and a GTM strategy that knows how to win.

The channel is changing

If one thing is certain, it’s that the channel is changing. Subscription-first, AI-led, everything-as-a-service. The challenge is that you can’t brute-force legacy systems into this new way of doing things and expect a different outcome.

What this moment demands is a new kind of distributor. Not just another name on a long list, but one that actually understands how to build traction in a saturated market, create meaningful differentiation, and help emerging vendors move from underdog to industry standard.

Because if growth is the goal, you don’t have time for slow ramp-ups or vague strategies. You need someone who’s ready to run with you.

We've featured the best business plan software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Canada's House of Commons hit by cyberattack, data possibly leaked online - could Microsoft SharePoint be to blame?

TechRadar News - Fri, 08/15/2025 - 09:20
  • Canada’s House of Commons notified its employees of a cyberincident
  • It lost sensitive employee data to unnamed hackers
  • Threat actors apparently broke in through a Microsoft SharePoint flaw

Canada’s House of Commons has reportedly suffered a cyberattack which saw it lose sensitive employee data.

A CBC report, citing an internal email that the organization sent to its staff, says the attack saw an unidentified threat actor exploit a “recent Microsoft vulnerability” to access a database with information on employee computers and mobile devices.

Among the data stolen in the attack was employee names, email addresses, job titles, office locations, and information about the devices they use.

SharePoint under the magnifying glass

At the moment, both the House of Commons and Canada’s Communications Security Establishment (CSE) are investigating the issue.

"Attribution of a cyber incident is difficult. Investigating cyber threat activity takes resources and time, and there are many considerations involved in the process of attributing malicious cyber activity," CSE apparently said in a statement.

The organization told its employees to remain vigilant, and be wary of incoming communications.

The details are scarce, but the House of Commons saying the attackers used a “recent Microsoft vulnerability” fueled speculation that it was done through an infamous SharePoint flaw which has been exploited recently.

Canada’s Cyber Centre recently issued a warning about a SharePoint Server flaw called ToolShell, tracked as CVE-2025-53770.

ToolShell was first observed in late July 2025, and has been abused by multiple threat actors, including Chinese state-sponsored groups.

Multiple high-profile organizations have already been compromised this way, including the US National Nuclear Security Administration, Rhode Island General Assembly, and many others.

Via BleepingComputer

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology