Dummy units of the rumored iPhone 17 range have given us a good idea of what colors to expect from Apple's next-generation phones, and if they come to fruition, could see the iPhone Pro lineup get a dose of punchy color.
This comes from Apple-centric tipster Sony Dickson, who posted a selection of iPhone 17 dummy units in a mix of colors, which we're led to believe come from insider information.
While the iPhone 17 features a fetching pink pastel-like hue, and the rumored iPhone 17 Air comes in a pleasant sand-ish color, the standout is an iPhone 17 Pro dummy unit in a bright orange hue.
First look at iPhone 17 color dummies, The new orange really stands out this year — definitely a bold addition. Thoughts? pic.twitter.com/M0gB6NSglIJuly 29, 2025
If this information turns out to be accurate it could mark a mild direction change for Apple, in that previously the Pro iPhones have tended to use somewhat muted colors: the Desert Titanium model of the iPhone 16 Pro Max was probably about as bold as the flagship phones go, with the rest of the iPhone 16 Pro lineup leaning on more basic shades such as white, black, and grey.
So the addition of orange could give the iPhone Pro a shot in the arm when it comes to punchy colors. From the dummy units, the orange has a candy-like hue with a form of pastel flatness to it; the latter would be in keeping with the style of recent Pro iPhones.
Complementary colorsWith the caveat that these images are far from official and there's no clear indication of where these dummy units have come from, I feel the colors on offer across the proposed iPhone 17 range work nicely.
They have the usual black and white options to appease people who like muted phones, with a dark blue shade potentially making a comeback for the iPhone 17 Pro models.
The light blue and pink options for the iPhone 17 offer a pop of freshness without being too oversaturated. While the light blue and light yellow/sand colors for the iPhone 17 Air look like they could work nicely on a slimmed-down iPhone.
For the iPhone 17 Pro and 17 Pro Max, I reckon the tipped colors work well for the new rectangular rear camera array; sort of emphasising it, yet also helping it blend into the rear of the phone at the same time... if that makes a jot of sense.
Of course, I'm still not entirely convinced this much-rumored camera design change will happen, as I can't see how it would benefit the iPhone 17 Pro's camera performance; Apple tends not to just change its phone designs for pure aesthetics alone.
Unless adopting this rectangular camera array is a means to better package components, and thus leading to a slimmer iPhone Pro. But this is just educated speculation on my side.
With Apple very likely to launch new iPhones in September, when it usually holds a phone-centric Apple event, we really don't have much longer to wait before we hear about new iPhones.
You might also likeCryptocurrency users are being targeted by a highly sophisticated, widespread cybercriminal campaign with the goal of deploying malware capable of grabbing exchange and wallet information, essentially robbing the people of their tokens, experts from Check Point have warned.
Apparently active since March 2024, what makes this campaign, dubbed JSCEAL by the researchers, unique is the use of compiled JavaScript files (JSC), which allows the malware to remain hidden from most traditional antivirus solutions.
The criminals created fake cryptocurrency exchange and wallet apps, which come with an infostealer. They also created websites to host these apps, and managed to purchase thousands of advertisements on the internet to promote the scam. Check Point says that just in the European Union (EU), 35,000 malicious ads were served between January and June 2025.
JSCEAL malware“The use of Facebook’s Ad Library enabled us to estimate the campaign’s reach, while in a very conservative approach we can estimate the total reach of the malvertising campaign at 3.5 million users within the EU alone, and likely above 10 million users worldwide,” the researchers explained.
People who fall for the scam download an MSI installer which triggers “a sequence of profiling scripts” that gather critical system information. These scripts also use PowerShell commands to collect and exfiltrate data, in preparation of the final payload deployment.
This final payload is the JSCEAL malware, which steals crypto-related data such as credentials and private keys. The payload is executed through Node.js, it was said.
What makes this malware particularly dangerous is the use of compiled JavaScript files.
“The JSCEAL campaign uses compiled V8 JavaScript (JSC) files, a lesser-known feature of Google’s V8 engine that enables code obfuscation and evasion of static analysis,” the researchers added.
“This innovative technique allows attackers to bypass detection systems, making it extremely challenging to detect the malicious code until it executes. JSCEAL is notable for its scale, technical complexity, and persistence, having evolved significantly since its discovery.”
Even today, many versions of the malware remain undetected by common security tools.
Anyone concerned their data may be under threat should ensure their antivirus protections are up to date - we've rounded up the best free antivirus software around - and for those who prefer using Apple technology, also the best Mac antivirus software.
You might also likeIf you miss the old days of Pebble watches, you’re in luck, as the smartwatch brand that began it all is making an unexpected comeback. That means it might not be long before you can slap a Pebble watch on your wrist like it’s 2015 all over again.
Pebble was originally founded by Eric Migicovsky, who now runs Core Devices, which succeeded Pebble when it shut down in 2016. Although Migicovsky previously revealed that he was working on two new watches that were based on the open-source PebbleOS operating system, they were to be made under the Core Devices brand name. Now, that’s all changed.
Writing on his blog, Migicovsky explained that he had been able to reacquire the Pebble trademark, which will now be incorporated into upcoming products. And it seems that the company is not wasting time, as its Core 2 Duo and Core Time 2 smartwatches have both been renamed to Pebble 2 Duo and Pebble Time 2, respectively.
Neither are ready for launch yet, though, with the former shipping out to beta users and the latter undergoing engineering verification testing (EVT). But for anyone excited by the Pebble brand, the name change alone will be enough to get the heart racing.
Shipping in August(Image credit: Core Devices)Want to get your hands on one of these rebranded watches? You can pre-order both from Core Devices’ rePebble website. The devices are still using the old “Core” names, and presumably this will be updated shortly. The Pebble 2 Duo is available for $149, while the Core Time 2 can be ordered for $225.
In his blog post, Migicovsky wrote that his company hopes to start shipping the Pebble 2 Duo by the end of August (a delay from its original July estimate). The hold-up is due to testing of an improved waterproofing rating, while a speaker has also been added that needs to be waterproofed as well.
There’s one additional hitch with ordering: tariffs. Migicovsky says you’ll be charged about $10 per Pebble 2 Duo if you’re ordering from the US. Non-US orders won’t be affected by tariffs, as the devices are shipped out from Hong Kong.
Migicovsky has also been testing the Pebble 2 Duo’s Bluetooth range (in a “super unscientific” manner, he concedes), and says it hits roughly 140 meters in open-air surroundings. On a street with buildings, the range is slightly longer.
The blog post also mentioned a handful of updates to the Pebble Time 2. Among them, Migicovsky said the design had been made “a bit sleeker,” although he didn’t share any specifics. Since the watch is in the EVT stage of manufacturing, it’s a little too early to start thinking about shipping dates.
Still, with the Pebble name making a comeback almost a decade after it stopped being sold, fans of the smartwatch will undoubtedly be excited for further news. We’ll be keeping an eye out for more in the meantime.
You might also likeThe handheld gaming space is continuously growing each year with new devices from the likes of Nintendo plus contenders in the PC department, such as Asus, Lenovo, and MSI. However, there's an outlier in the Android and PC market that appears to be taking strong inspiration from the Nintendo DS with one of its upcoming devices.
Announced on Ayaneo's website is the brand-new Ayaneo Pocket DS, which claims to be the 'world's first' dual-screen Android handheld gaming device and is powered by Qualcomm's Snapdragon G3x Gen 2 processor. Pricing details are set to be announced in August.
The Snapdragon G3x Gen 2 processor is built to provide high-power performance on handheld devices as an 8-core CPU packed with an Adreno A32 GPU – and it's worth noting that Qualcomm's processors often excel at power efficiency.
This comes shortly after Ayaneo announced another dual-screen handheld, the Ayaneo Flip 1S DS, which also takes after the Nintendo DS dual-screen design, but for PC gamers using Windows. Both of these devices will utilize a 7-inch OLED main screen, but the newly-announced Pocket DS will have a 165Hz refresh rate over the Flip 1S DS's 144Hz.
While the Pocket DS isn't a handheld gaming PC, it utilizes a "PC-Class Turbo Cooling System", designed to keep the dual-screen handheld cool while under heavy load. Ayaneo also built its own handheld management software, which will allow users to quickly change power settings on the fly thanks to the 5-inch LCD secondary screen – and also serves as a great tool for multitaskers.
It's doubtful that Nintendo will revisit its dual-screen design any time soon, especially after the launch of the Nintendo Switch 2, so it looks like Ayaneo is the one to rely on in this space.
Analysis: I'll take a dual-screen device over an 8-inch handheld any day(Image credit: Ayaneo)Just to be clear, I'm fully locked in on Ayaneo and its potential success with these dual-screen handhelds – specifically the Ayaneo Flip 1S DS, using one of AMD's most powerful APUs.
I've been in the market for a handheld that has an 8-inch screen with a powerful processor at a reasonable price; I thought the Lenovo Legion Go S (Ryzen Z1 Extreme) would be the answer, but it's hardly available, and it's too expensive at $729.99 (around £549 / AU$1,130).
With the Ayaneo Flip 1S DS, pricing is reasonable for what it offers (above $900 for most configurations) as this is a popular portable design, and it's using an AMD Ryzen AI 9 HX 370 processor, which easily outperforms the likes of the Ryzen Z1 Extreme. Fortunately, since the Ayaneo Pocket DS is built for Android gaming, I don't expect it to be as expensive.
Again, I doubt I'll go all-out to spend that much on a handheld device that I only use when I'm away from my desk. However, if I had to choose and I was already contemplating buying an MSI Claw 8 AI+, MSI Claw A8, or ROG Xbox Ally X, I would have to include the Flip 1S DS in the conversation too.
You might also like...The latest iPhone 17 Pro rumors point to Apple’s premium flagship handset getting a new telephoto camera with 8x optical zoom, up from 5x zoom on the iPhone 16 Pro.
What’s more, this new camera is tipped to make use of moving components that could allow for continuous optical zoom between an as-yet unknown range of focal lengths. That’s rarely-seen technology, usually reserved for phones that are specifically designed for photography like the Sony Xperia 1 VI, and the idea of such niche tech coming to one of the world's most popular phones is properly exciting.
So why aren't I jumping for joy?
On paper, I should be. Most flagship phones – and some particularly well-specced mid-range handsets like the Oppo Reno 13 Pro – come with a telephoto camera, offering optical zoom through the addition of a specialized lens and sensor.
However, in order to create a continuous zoom between different lenses, phones typically use digital zoom to close the distance between their various lenses. For example, a phone with a main camera at 1x zoom and a telephoto camera at 3x optical zoom will digitally zoom the main camera to achieve 2x zoom.
If those aforementioned iPhone 17 Pro rumors hold true, the new telephoto camera will add even more reach and flexibility to what is already one of the best camera phones.
It could also explain the new camera housing that many rumors and leaks predict the iPhone 17 Pro and iPhone 17 Pro Max to launch with. We previously thought that this design change was a purely aesthetic choice, but this Pixel-style camera bar could, in fact, house a periscope lens or other tech to support the new zoom camera.
With that all said, I can’t help but wonder whether I’d actually use this (admittedly very cool) new feature. Once the excitement around the iPhone 17 Pro’s possible 8x zoom camera settles, will it still be worth using?
Three times is the charmThe iPhone 15 Pro is seemingly the last iPhone to ship with a 3x telephoto camera (Image credit: Future / Lance Ulanoff)I'm a maximalist when it comes to tech – I like to have the best specs possible, and for a long time, I found myself pining after the 5x or even 10x telephoto lenses fitted to some of the best camera phones. I specifically remember feeling amazed when the Samsung Galaxy S21 Ultra launched with a 10x optical zoom camera.
But to be honest, it’s rare that I find myself zooming in that much – apparently I’m not the only one, either, as Samsung scaled down its long-range zoom camera from 10x to 5x with the release of the Galaxy S24 Ultra. As I mentioned before, unless you’re zooming into or beyond the 10x mark, a 10x zoom camera will be of no use.
If you ask me, the sweet spot is actually a 3x telephoto camera, like the one the iPhone 15 Pro had before it was upped to 5x on the iPhone 16 Pro.
The Oppo Find X8 Pro comes with a 3x telephoto camera and a 6x telephoto camera, making it a flexible and powerful camera phone (Image credit: Future / Jamie Richards)It’s not that I don’t see the point in longer zoom lenses. In fact, last year, I wrote that the Oppo Find X8 Pro’s 6x zoom camera had opened up new possibilities when it comes to mobile photography. It's just that 3x strikes a better balance between reach and everyday usefulness; a 3x zoom lens brings details forward without feeling cramped, and the smaller lens distortion is ideal for more natural portraits.
I’m not the only 3x zoom fan in the TechRadar office, either – last year, Phones Editor Axel Metz wrote that the iPhone 15 Pro’s 3x telephoto camera was his go-to for natural and more professional-looking social media pics, like those below.
Image 1 of 53x zoom on the iPhone 15 Pro (Image credit: Future / Axel Metz)Image 2 of 53x zoom on the iPhone 15 Pro (Image credit: Future / Axel Metz)Image 3 of 53x zoom on the iPhone 15 Pro (Image credit: Future / Axel Metz)Image 4 of 53x zoom on the iPhone 15 Pro (Image credit: Future / Axel Metz)Image 5 of 53x zoom on the iPhone 15 Pro (Image credit: Future / Axel Metz)An 8x zoom camera – or even better, a lens that continuously zooms from, say, 5x to 8x – would be a win for certain users: concertgoers, nature photographers, maybe even portrait photographers who don’t mind standing pretty far away.
But without an intermediate telephoto lens to bridge the long gap between 1x and 8x, for me, this won’t be a selling point.
Even the Galaxy S21 Ultra switched to a 3x camera before you got to the full 10x zoom, and while the iPhone’s digital zoom is excellent, there’d surely be a noticeable loss of quality at zoom levels that don't activate the new camera. I'd be reluctant to give up my 3x lens without some kind of software magic to get around that.
We're expecting the iPhone 17 series to be revealed in September 2025, so we hopefully won't have to wait long to see what Apple's cooking up.
What do you think about this rumor? Would an 8x telephoto camera be a boost to the iPhone, or has tech gone too far? Let us know in the comments below.
You might also likeIn a letter that resembles one of Sam Altman’s long rambling blog posts, Meta CEO Mark Zuckerberg describes his vision of the future where there is personal superintelligence for everyone, and there’s not a single reference to the Metaverse in it.
Zuckerberg also delivered the letter in a monologue form via his Instagram account .
Titled “Personal Superintelligence”, the 600+ word article sees Zuckerberg attempt to stamp his ownership onto superintelligence. “Developing superintelligence”, he confidently says, “is now in sight.”
In words that eerily echo exactly what the CEO of OpenAI has recently said, Zuckerberg proclaims, “I am extremely optimistic that superintelligence will help humanity accelerate our pace of progress. But perhaps even more important is that superintelligence has the potential to begin a new era of personal empowerment where people will have greater agency to improve the world in the directions they choose.”
A post shared by Mark Zuckerberg (@zuck)
A photo posted by on
Personal superintelligenceAccording to Zuckerberg, everyone having their own accessible superintelligence will “help you achieve your goals, create what you want to see in the world, experience any adventure, be a better friend to those you care about, and grow to become the person you aspire to be.”
In a nod to the Ray-Ban and Oakley Meta AI Glasses that the company is so proud of, Zuckerberg says: “Personal devices like glasses that understand our context because they can see what we see, hear what we hear, and interact with us throughout the day will become our primary computing devices.”
Personally, I find this a bit hard to accept based on the current evidence. While I haven't had the pleasure of using Meta's AI glasses yet, I have used AI devices like the Rabbit R1, which require voice commands to do everything, and it's a slow and awkward way to use AI compared to quickly typing a prompt or opening apps on a screen.
On exactly when we can expect this new era of personal superintelligence to kick in, Zuckerberg still seems to be hedging his bets a little: “The rest of this decade seems likely to be the decisive period for determining the path this technology will take, and whether superintelligence will be a tool for personal empowerment or a force focused on replacing large swaths of society.”
Could devices like these Ray-Ban Meta AI Glasses become the dominant personal computer device? (Image credit: Meta / Ray-Ban)A force for good or evilThis battle between AI being used for good or evil seems to be a theme that is playing on CEO’s minds lately. For example, Sam Altman recently couldn’t seem to decide if he was scared of the power of ChatGPT 5 or in awe of it.
While predicting the imminent dawn of superintelligence seems to be the favorite pastime of tech CEOs at the moment, it seems that the technology is building towards a tipping point where superintelligence becomes a reality. Let's just hope that the movies got it wrong about what happens next.
You might also likeWe love to give practical buying advice on the latest gadgets here at TechRadar. But sometimes what we love even more is to indulge in the most high-end, cutting-edge, luxurious tech on the planet. That's what we bring you in these Money no Object columns – you can read the whole series here.
If you're looking for a high-end pre-amp and multi-room audio matrix for potentially massive home-install systems, McIntosh has just the thing. The new CR106 delivers up to six independent audio zones from a single unit, and it can be networked with others to provide as many as 30 different, customizable and controllable zones.
The CR106 combines a pre-amp and audio matrix – essentially a traffic controller for audio, providing you the ability to set custom audio tweaks for different zones – and it works with a wide range of amps and speakers. It can be rack mounted in a standard AV rack, where it'll take up a modest 2U of rack space.
(Image credit: McIntosh)McIntosh CR106: key features and pricingThe CR106 is controlled via the McIntosh connect app for Apple and Android, via a web interface, or via its front panel. The app offers lots of zone customization tools, enabling you to name each zone, group multiple zones together, selecting the audio sources for different zones and configuring their subwoofer settings too.
There are four unbalanced analog and four digital inputs, and if you have a large home or budget you can chain up to five CR106 units together via the Dante network interface to create up to 30 two-channel zones.
In addition to the hardware inputs, there's also Bluetooth with AAC, aptX HD and aptX Adaptive, so you can stream into one of these units, and send it out to any of the connected wired setups.
Each zone that it supports has two sets of unbalanced outputs, and dedicated subwoofer outputs.
The CR106 will be available globally from McIntosh dealers from August 2025. The MSRP is $5,500 / £6,999.
You might also likeVibe coding platform Base44 contained a major security vulnerability which could have allowed unauthorized users to access other people’s private applications, experts have warned.
The issue was discovered in early July 2025 by security pros from Wiz Research, who explained how exposed API endpoints on Base44’s platform allowed threat actors to create a verified account on private apps using nothing more than app_id, a piece of code that is publicly visible.
Normally, authentication systems ask for strong credentials, and means of identity verification, but Base44’s setup apparently lets anyone bypass those checks using just that one code. One could think of it like showing up to a locked office building, shouting “I’m here for app_id 12345”, and the doors would open - no questions asked.
Vibe codingAttackers could easily grab an app_Id from public files, and use it to “register” through unsecured API routes, accessing apps that handle sensitive employee data and company communications.
The vulnerability could have affected enterprise apps handling HR and personally identifiable information (PII), internal chatbots and knowledge bases, as well as automation tools used in day-to-day operations.
Once Wiz discovered the flaw, it reached out to Wix, the company which owns Base44, who fixed it within a day.
Wix added it found no signs of abuse by threat actors. The researchers also identified vulnerable apps and reached out to some of the affected companies directly.
Vibe coding is a relatively new slang term for coding with the help of generative AI and through natural language rather than writing actual code. A developer will discuss their ideas and needs with the AI, which would come back with code. It has gained a lot of popularity lately, but news such as this one highlight that the method is not without its risks.
Since the background infrastructure is shared, there is always a risk of information leaking somewhere.
You might also likeFoundation season 3 is already a third of the way through its run on Apple TV+. And, with a new episode set to drop on the tech giant's streaming platform later this week, it won't be long until it reaches its midpoint.
For now, though, you'll want to know when this season's fourth installment will arrive on one of the world's best streaming services.
Below, I'll outline the dates on which we expect Foundation's next entry to drop, and predict what time it'll be released. There's also a full rundown of this season's episodic release schedule at the end of this article, so you can block out some time in your own busy schedule to watch it.
What is the release date for Foundation season 3 episode 4?Dawn will continue to meet with Gaal in secret in Foundation season 3 (Image credit: Apple TV+)This season's fourth episode, titled 'The Stress of Her Regard', will land on Apple's streaming service on Friday, August 1.
Well, that's in some world territories at least. Apple tends to release new episodes of its TV Originals a day earlier in some regions of North and South America. Long story short: Foundation season 3 episode 4 could launch in some parts of these continents, such as the US west coast, on Thursday, July 31.
As for what time it'll debut, that's hard to determine. Apple doesn't publicly state when new episodes will arrive. However, some of the best Apple TV+ shows' latest entries have shown up at 9pm PT on Thursdays and 12am ET on Fridays. It's possible, then, that 'The Stress of Her Regard' will do likewise.
For a breakdown on when I expect season 3 episode 4 to be released, read on (NB: use 12am ET to work out when it'll launch in your country if it isn't listed below):
Want to know when you can stream new episodes of Foundation season 3 in the weeks ahead? Check out the list below:
Google has just admitted that the UK government hasn't requested access to end-to-end encrypted user data.
Meanwhile, Apple has been hit by a Technical Capability Notice (TCN) under the 2016 Investigatory Powers Act (IPA), forcing it to shutter its iCloud Advanced Data Protection feature in the UK as a result.
The backlash that followed the UK's request for access to end-to-end encrypted data from Apple echoed throughout the rest of the world. It now turns out that the request may have been more targeted than it first seemed, with Google seemingly immune to it for now.
"We haven't received a technical capabilities notice"(Image credit: Shutterstock / nikkimeel)In February this year, the UK authorities requested that Apple break its end-to-end encryption policies in the Advanced Data Protection (ADP) feature. ADP isn't on by default, but when enabled, it adds an extra layer of security. Not even Apple itself can access the data that's been encrypted in this way; it's completely private.
Unsurprisingly, the order was not met with a warm reception. Mounting scrutiny of the UK's Investigatory Powers Act (IPA) led US senators to investigate whether other companies have also received similar requests.
According to TechCrunch, Google refused to answer questions about any involvement from the UK government when prompted by US Senator Roy Wyden. Companies that are subject to government surveillance orders are unable to disclose them under UK law.
However, Wyden disclosed that at least one technology giant confirmed that it hasn't received such a notice. That turned out to be Meta, which told Wyden's office back in March that it hadn't been served an order to backdoor its encryption services.
Although Google remained silent, it appears to have broken that vow of silence in a statement to TechCrunch. Karl Ryan, Google spokesperson, said: "We haven't received a technical capabilities notice."
That's as good a confirmation as we're going to get in this situation. If Google had received such a notice, it would imply that the UK government was surveying whether a backdoor could be added to its end-to-end encryption or not.
Ryan also told TechCrunch: "We have never built any mechanism or 'backdoor' to circumvent end-to-end encryption in our products. If we say a product is end-to-end encrypted, it is."
The UK government might still back downWhen asked to build a backdoor in its ADP service, Apple instead chose to turn off the feature for users in the UK, leaving them without access to additional data protection.
Although using one of the best VPN services can help boost Brits’ online privacy, it's certainly not going to replace iCloud’s end-to-end encryption protection that users in other countries are able to benefit from.
The order was widely criticized worldwide, with US lawmakers warning against "systemic vulnerabilities." Meanwhile, Apple decided to challenge the request in Court.
More recently, two senior British officials disclosed that the UK government might have to give up on pursuing encryption backdoors due to pushback from the US government. "They don't want us messing with their tech companies," they said.
No matter where this case ultimately leads, the fact that Apple was involved, but Google walked away unscathed, is an interesting development. Google’s hands-off status may offer reassurance that the UK’s encryption demands aren’t as sweeping as they first appeared — at least not yet.
You might also likeA vulnerability in SAP NetWeaver is being exploited to deploy Linux malware capable of running arbitrary system commands and deploying additional payloads, experts have warned.
Security researchers from Palo Alto Networks’ Unit 42 discovered a piece of malware called Auto-Color, a Linux backdoor, dubbed for its ability to rename itself after installation.
The researchers found it was capable of opening reverse shells, executing arbitrary system commands, acting as a proxy, uploading and modifying files, as well as adjusting settings dynamically. It was also discovered that the backdoor remains mostly dormant if its C2 server is unreachable, effectively evading detection by staying inactive until the operator instructions arrive.
Salt TyphoonHowever, the researchers weren’t able to determine the initial infection vector - how the malware made it onto target endpoints remained a mystery - until now.
Responding to an incident in April 2025, cybersecurity experts from Darktrace investigated an Auto-Color infection on a US-based chemicals company. They were able to determine that the initial infection vector was a critical vulnerability in SAP NetWeaver, a technology platform developed that serves as the technical foundation for many SAP applications.
The vulnerability was found in the platform’s Visual Composer Metadata Uploader element, which was not protected with a proper authorization. As a result, unauthenticated agents were allowed to upload potentially malicious executable binaries that could do severe damage. It is tracked as CVE-2025-31324, and was given a severity score of 9.8/10 - critical.
SAP fixed the issue in late April 2025, but at the time, multiple security firms were already seeing attacks in the wild. ReliaQuest, Onapsis, watchTowr, Mandiant, all reported observing threat actors leveraging this flaw, and among them - Chinese state-sponsored groups, as well.
Given the destructive potential of the flaw, and the fact that a patch is available for months now, Linux admins are advised to apply it without hesitation and mitigate potential threats.
Via BleepingComputer
You might also likeFor users of Dropbox Passwords, it's time to take a look at the best password managers and find a new service to use, after the cloud storage company revealed it will soon discontinue the service.
The end of service for Dropbox Passwords will be October 28, 2025, giving users ample time to find a new credential manager to suit their needs.
In the announcement, Dropbox said it was discontinuing the tool, “as part of our efforts to focus on enhancing other features in our core product.”
So long, Dropbox PasswordsDropbox Passwords users will still have ample time to access their saved usernames, passwords, and stored credit card information for export until October 28, but there will be some key changes before then.
On August 28, 2025 the password manager will become view-only on both mobile devices and on through the browser extension. You won’t be able to add any more credentials nor use the autofill feature from this date.
On September 11, the mobile app will be depreciated and will no longer be available for use. Your data will remain available through the browser extension.
The fateful date of October 28 will see all Dropbox Password data securely deleted and the dark web monitoring feature will cease to function.
In its blog post, Dropbox has provided some key information on how to export your data from both the app and browser extension. Mobile app users can follow these instructions to export their data:
To export data from the browser extension, do the following:
Levoit's Sprout is an air purifier geared specifically towards children, and it has some nifty tricks up its sleeve. Not only does it purify air, but it also offers various extra features intended to help create the perfect safe, soothing sleep environment. Levoit calls it a 'three in one peacemaker'.
Today's best air purifiers are excellent at removing impurities from the air, and some even double up as fans, but I've never seen one that's designed to act as a sleep aid. I'm actually a little miffed that this one's really for children, because I'd quite like one in my bedroom.
There's a true HEPA filter, which can capture all kinds of nasties – including dust, pollen, smoke and viruses – from the air. On top of that, it's able to track the levels various pollutant types (PM1.0, PM2.5, PM10, TVOC and CO2) as well as monitoring the temperature and humidity in the room.
Soothing sleepThe Sprout doubles up as a night light, emitting soft, blue-light-free ambient illumination, and offers five different white noise settings to help create a soothing environment to drop off in. The curvy shape with rounded edges was created with nursery décor in mind.
The Sprout purifier connects to the VeSync app, where you can view air quality reports in real time, create personalized schedules, control the appliance remotely, and check how soon the filter needs replacing. It's also compatible with Amazon Alexa if you want to go hands-free.
The Levoit Sprout is available to purchase direct from Levoit or via Amazon US or Amazon UK, and costs $279.99 / £279.99 at list price. The good news for UK shoppers is that there's a deal available to take the price down:
There's £50 off the Levoit Sprout right now, taking the price of this child-friendly air purifier and sleep aid down to under £230. This multitasking appliance purifies the air and also has nightlight and white noise functions, plus the curvy design will fit seamlessly into a nursery or child's room.
The same deal is available direct from Levoit, via a coupon code.View Deal
You might also like...AI agents were once theoretical, but now they are a tangible force reshaping the modern threat landscape. Also known as Computer-Using Agents (CUAs), these advanced AI bots can use applications and browse the internet to complete complex, often time-consuming tasks with minimal or no human oversight. Their rapid evolution is unlocking new efficiencies across a variety of sectors with automation and analysis, enabling more informed decision-making.
But this leap forward comes with a caveat. As they grow more capable, AI agents introduce a new class of cybersecurity threats. Malicious actors can hijack these tools to orchestrate sophisticated cyberattacks, exploiting predictable patterns of human behavior to infiltrate systems and exfiltrate sensitive data.
From theory to realityTo move beyond theory and speculation, our team undertook a series of controlled experiments to assess how agentic AI could be weaponized. We found that these agents can automate a wide range of malicious tasks on behalf of threat actors when instructed correctly.
This includes, but is not limited to, credential stuffing and reconnaissance, which previously required significant human effort. To make matters worse, they can even perform outright cyberattacks by guessing passwords and sending out phishing emails en masse.
This marks a watershed moment in cybersecurity’s fight against AI-powered threats. The automation of attacks significantly lowers the barrier to entry for threat actors, enabling even low-skilled individuals to launch high-impact campaigns. This has the potential to rapidly escalate the scale at which phishing attacks can be carried out.
The growing capabilities of AI agentsThe largest AI players are redefining what agents can do. Platforms like OpenAI’s Operator, alongside various tools developed by Google, Anthropic and Meta, all have their own strengths and limitations, but share one critical feature. The ability to carry out real-world actions based on very simple text prompts.
This functionality is a double-edged sword. In the hands of responsible users, it can drive innovation and productivity. But in the wrong hands, it becomes a powerful weapon, one that can turn a novice attacker into a formidable threat.
The good news is that widespread abuse of these tools is not yet common. However, that window is closing fast. The simplicity and accessibility of agentic AI make it an ideal tool for amplifying social engineering attacks.
Automating reconnaissance at scaleTo illustrate the real-world implications, we investigated whether agentic AI could be utilized to automate the collection of information for targeted attacks. Using OpenAI’s Operator, which features a sandboxed browser and possesses uniquely autonomous behavior, we issued a simple prompt: identify new employees at a specific company.
Within minutes, the agent accessed LinkedIn, analyzed recent company posts and profile updates, and compiled a list of new joiners from the past 90 days. It extracted names, roles, and start dates, all the information needed to craft highly targeted phishing campaigns. And, it did this in the blink of an eye.
Some might be tempted to dismiss this as a simple information-gathering exercise. But this experiment displays that seemingly harmless human behaviors like posting job updates on social media can inadvertently expose organizations to significant cyber risk. What once took hours or days can now be accomplished in minutes, at scale.
Exploiting identity through credential stuffingAnother alarming capability of agentic AI is its potential to facilitate identity-based attacks. Credential stuffing, a method where attackers use previously compromised username and password combinations to gain unauthorized access, is a prime example.
To test this attack vector, we instructed Operator to attempt access to login flows on several popular SaaS platforms, equipping it with a target email address and a publicly available list of breached passwords. Based on this limited information, it was able to get into one of the accounts. This underscores how agentic AI can be used to automate credential abuse, bypass traditional defenses and exploit a weak link in the security chain. Human error.
Injecting heightened urgency into human risk managementOur research confirms that agentic AI is already capable of executing a broad spectrum of malicious activities, from phishing and malware delivery to exposing vulnerabilities. While current capabilities are still in their early stages, the potential is there for automated attacks at scale in the not-so-distant future.
This calls for a fundamental shift in how organizations approach cybersecurity. Historically, the focus has been on protecting systems, not people. However, traditional methods like annual training and awareness campaigns only serve to place the burden on employees. This is an outdated approach, and it papers over the real root causes of human error.
Human-centric cyber risk needs to be proactive. And, it needs to be in real-time. This includes two main steps:
By understanding the human behaviors that create openings for threat actors, businesses can deploy smarter, more effective defenses. This shift from reactive to proactive security is well established for software defense, so there is no good reason human risk should be treated any differently.
Adapt before it’s too lateAgentic AI is not just a technological advancement, it is a vehicle for cyberattacks at scale. As these tools become more powerful and accessible, the cybersecurity community must shift its mindset. The future of cyber defense lies not just in securing systems, but in understanding and protecting the people who use them.
The clock is ticking, and the attackers are already adapting. So should you.
We've featured the best encryption software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The world has been captivated by the sheer magic of generative AI. In what felt like an instant, we were handed a technology capable of creating endless streams of enterprise knowledge — from customer support scripts and detailed technical manuals to entire marketing campaigns and even lines of code. The first phase of this revolution was one of chaotic, yet thrilling, experimentation. But the novelty is giving way to a stark reality: Creating an avalanche of information isn’t a strategy. It's a liability.
At the Responsible AI Summit in June 2025, the urgency was palpable. Across every conversation I had, one truth kept resurfacing: The very tools designed to drive innovation and accelerate growth could just as easily expose us to risks. What was once seen as a ‘golden ticket’ of sorts is now being viewed through a sharper lens — one that reveals reputational risks, regulatory landmines, and the potential for operational chaos if left unchecked.
The second act of generative AI: complianceWe’re now entering the second, more critical act of this technological shift. The primary challenge is no longer about generation, but about governance and scale across the entire organization. The siloed, human-centric workflows that have managed our information pipelines for decades are breaking under the strain of this new volume. It's not lost on me that the generative AI boom has made content production quicker and easier than ever. But speed without oversight is a liability.
The strategic imperative has shifted from creating more content to creating the right content, reliably and with purpose, regardless of its function. The companies that thrive will be those that move from frantic experimentation to building a unified, strategic creation engine.
Every piece of content either builds your brand — or breaks it. Whether it’s content that strays from brand guidelines, defies industry standards, or is misaligned with regulatory compliance, these missteps in content expose your organization to legal, financial, and reputational risks. We’re seeing the consequences of poor quality content unfold in real-time.
The infrastructure behind AI intelligenceThis requires building a new kind of digital factory for enterprise intelligence. This isn't just a metaphor; it's an operational necessity built on three pillars.
At the heart of it’s a robust MLOps (Machine Learning Operations) pipeline specifically designed for the nuances of generative models, serving as the factory's core assembly line. With generative AI models demanding continuous tuning, evaluation, and oversight, MLOps is what’s behind running the engine, adapting to evolving enterprise needs, and preventing misuse before it occurs.
Second, a mastery of prompt engineering, which acts as the skilled artisan, ensures the AI’s output is refined and aligned with specific departmental intent. Generative AI will only ever be as good as its inputs and the instructions it’s given. Prompt engineering acts as a quality control in translating business context into meaningful, actionable outputs — each purpose-built for the teams that need it.
Finally, a network of powerful APIs serves as the distribution network, seamlessly integrating this new creation engine into every facet of the business, from technical authoring platforms to conversational AI interfaces. Embedding AI into the platforms that employees are already using, APIs bring new capabilities into everyday, scalable workflows.
Together, these three pillars move you beyond fragmented AI experiments and into operational reality. They create a foundation where AI becomes a native part of how your business runs: Consistently, safely, and at scale.
Defining quality by determinismYet, even with a perfect factory, a fundamental question remains: What’s "good" content when it could be anything from a line in a legal contract to a spoken response from a chatbot? Quality is no longer subjective; it must be defined by accuracy, consistency, and safety. This is where we must install creative guardrails.
The answer lies in a concept that seems at odds with generative AI’s nature: Determinism. While AI’s probabilistic power is the source of its creativity, an enterprise requires certainty. We need a technical document to cite the correct API endpoint every time. We need a support chatbot to follow a specific, compliant troubleshooting protocol. We need our legal boilerplate to be exact.
By embedding deterministic rules into our AI systems, we don’t stifle innovation; we create a safe space for it to flourish. These guardrails are the mechanism that safeguards that whether the output is for marketing, engineering, or customer support, it’s verifiably accurate and trustworthy.
Building the intelligent enterprises of the futureLooking ahead, this controlled, strategic approach will unlock a future of knowledge that’s truly dynamic and multi-modal. We’re on the cusp of creating interactive, voice-navigated repair manuals for technicians in the field, real-time multilingual voice support for global customers, and hyper-personalized onboarding documents for new employees. As data from McKinsey suggests, this level of personalization and efficiency lifts revenues by 5-15% and dramatically improves operational effectiveness, turning a universal business function into a powerful engine for growth.
The era of siloed experimentation with generative AI is over. The competitive advantage now belongs to those who can master it as a unified, enterprise-wide capability. The leaders of the next decade will be the ones building their intelligent information factories today, harnessing the chaos to create value that is not only innovative but also intentional, consistent, and mission-critical. The revolution is here; it’s time to give it direction.
We've featured the best AI website builder.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Following suspicious activity being detected in the computer networks of the capital St Paul, Minnesota Governor Tim Walz has activated the state's National Guard to help defend against attackers.
The attack led to local officials shutting down the information systems in St Paul as a defensive measure, including network access for a range of internal applications, in order to contain the threat. Mayor Melvin Carter assured residents 911 services were operating as normal, but shared that the city has experienced some ‘back-end’ challenges;
“We recognize that these outages have created inconveniences for residents and city staff alike. While these disruptions are difficult, they are necessary steps to limit exposure, preserve system integrity, and protect sensitive information as our investigation and recovery efforts continue,” Carter continued.
A deliberate effortThe city has been working with Minnesota Information Technology Services as well as an external cybersecurity vendor, but even still the ‘scale and complexity’ of the attack has exceeded ‘both internal and commercial response capabilities’, former Democratic VP candidate Walz explained.
It’s not yet clear if this was a ransomware attack, but a range of networks and services have been intentionally and proactively shut down in order to ‘isolate and secure’ Minnesota systems.
These are ‘necessary steps to limit exposure, preserve system integrity and protect sensitive information’ argues Carter, who reveals that the breach was intentionally caused by a ‘criminal, external threat actor’.
"This was not a system glitch or technical error. This was a deliberate, coordinated digital attack carried out by a sophisticated external actor intentionally and criminally targeting our city’s information infrastructure," Carter explained.
Critical infrastructure is a top target for cybercriminals, who leverage the importance of the services they provide and the sensitive data they hold to request higher ransoms.
The US government recently warned Medusa ransomware has hit hundreds of critical infrastructure targets in similar incidents - although no threat actor has yet taken responsibility for this attack.
You might also like20 years after it originally aired, Deadliest Catch is back once again with more death-defying exploits from a fleet of fearless fishermen. A Discovery Channel original, Deadliest Catch goes out on the network around the world, while US viewers can also tune in via Sling TV and HBO Max. Read on for how to watch Deadliest Catch season 21 online from anywhere with a VPN.
Premiere date: Friday, August 1 at 8pm ET / PT
US broadcast: Discovery Channel via Sling TV
Global streams: HBO Max (US) | Discovery Plus (US, UK & CA)
Use NordVPN to watch any stream
Season 21 sees the intrepid Dutch Harbor voyagers head back to the Bering Sea, looking to bring in a haul of red monster king crabs. Making their way to the abandoned military island of Adak off the unforgiving tip of Alaska, there's a 21st century-style gold rush on to find the finest specimens first – hence the name of the first episode: The Wild West.
Familiar face Captain Sig Hansen and John Hillstrand are back to navigate their ship Time Bandit through the perilous seas and, although the full list of vessels and crew are being kept close to Discovery's chest ahead of the series, Jake Anderson has confirmed separately that he will also be returning.
Below we have all the information you need on where to watch Deadliest Catch season 21 online and stream every episode from wherever you are.
Can I watch Deadliest Catch season 21 for free?Not subscribed to Discovery Plus before? New users of the streaming platform get to try it without paying thanks to its 7-day free trial. The trial period is available in the US and Canada.
How to watch Deadliest Catch season 21 online in the USDeadliest Catch season 21 premieres in the US on Discovery at 8pm ET / PT on Friday, August 1. Episodes will go out in the same slot weekly.
Cord cutters can access Discovery via an OTT service such as our favorite, Sling TV. Sling Blue carries Discovery and starts at just $45.99 a month with 50% off your first month.
Episodes will also be available stream online the day after they air Discovery Plus (from $5.99 per month) and HBO Max (from $9.99 per month).
Have one of these subscriptions but away when Deadliest Catch is on? You can still access your usual streaming services from anywhere by using a VPN.
Get 50% off your first month of Sling TV
Sling TV gives you live TV at an affordable price. The Sling Blue package includes more than 50 channels including ABC, Fox and NBC (in select cities), AMC, Bravo, Food Network, HGTV, Lifetime and USA.
If you’re traveling abroad when Deadliest Catch season 21 episodes air, you’ll be unable to watch the show like you normally would due to annoying regional restrictions. Luckily, there’s an easy solution.
Downloading a VPN will allow you to stream online, no matter where you are. It's a simple bit of software that changes your IP address, meaning that you can access on-demand content or live TV just as if you were at home.
Use a VPN to watch Deadliest Catch season 21 from anywhere.
Editors ChoiceNordVPN – get the world's best VPN
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it's very straightforward to use. Speed, security and 24/7 support available if you need – it's got it all.
The best value plan is the two-year deal which sets the price at $3.39 per month, and includes an extra 4 months absolutely FREE. There's also an all-important 30-day no-quibble refund if you decide it's not for you.
- Try NordVPN 100% risk-free for 30 days and get an Amazon Gift Card included right now!VIEW DEAL ON
How to watch Deadliest Catch season 21 online in CanadaNew episodes of Deadliest Catch go out on Discovery in Canada, with the season 21 airing at the same time as south of the border at 8pm ET/PT on Friday, August 1.
You'll be able to stream episodes on Discovery Plus, too, with subscriptions costing CA$5.99 per month for Canadian subscribers.
US viewer in Canada? If you’re away from home, you can access your usual services easily with NordVPN.
How to watch Deadliest Catch season 21 online in the UKDiscovery is the home to Deadliest Catch in the UK and season 21 is slated to get started on Tuesday, August 5 at 9pm BST.
Discovery is available through TV providers such as Sky and Virgin Media. You can also stream its shows on demand through the Discovery Plus streaming service (where you'll also find all 20 other series) for as little as £3.99 per month.
Brit abroad? You can still watch the show as you usually would by using a VPN.
Can I watch Deadliest Catch season 21 online in Australia?Deadliest Catch has previously gone out on Foxtel and the Binge streaming service in Australia. However, season 21 is not yet in their listings.
If you’re visiting Australia from abroad and want to watch on your home service, simply download a VPN to stream Deadliest Catch season 21 just as you would back home.
Deadliest Catch season 21 Need to KnowDeadliest Catch season 21 episode guideDeadliest Catch seasons tend to have around 20 episodes, but season 21 episode names for only the first two have been released at the time of writing:
(US TV premiere dates)
No, Deadliest Catch season 21 and all the other seasons aren't available on Netflix anywhere around the world.
You can catch all the action on Discovery+ in the UK, US and Canada.
VPN services are evaluated and tested by us in view of legal recreational use. For example:a) Access to services from other countries, (subject to the terms and conditions of that service).b) Safeguarding your online security and making your online privacy more robust when abroad.Future plc does not support nor condone the illegal or malicious use of VPN services. We do not endorse nor approve of consuming pirated content that is paid-for.
Nintendo has officially announced the next Nintendo Direct showcase. And in typical fashion, there's not long to wait until we can watch it live. The company usually announces Nintendo Directs just a day or two before they go live, and that's no different here.
Announced via Nintendo's social channels, the next Nintendo Direct is taking place on July 31, 2025 at 6am PT / 9am ET / 2pm BST / 3pm CEST. You'll be able to watch the presentation live as it happens over at Nintendo's regional YouTube channels.
The presentation is due to last around 25 minutes, which is to be expected for a more focused partner showcase. There are still plenty of Nintendo Switch 2 games we're waiting for more details on throughout the rest of this year and next, though these will likely be reserved for a larger first-party Direct.
Join us for a #NintendoDirect Partner Showcase tomorrow, July 31, at 6am PT! Tune in for roughly 25 minutes of information on upcoming #NintendoSwitch2 and #NintendoSwitch games from our publishing partners. Watch here: https://t.co/PvBBmmxGTI pic.twitter.com/8hJBngwXHwJuly 30, 2025
Games we're looking forward to hearing more about include Metroid Prime 4: Beyond, Drag x Drive, Kirby Air Riders, and FromSoftware's The Duskbloods. All except The Duskbloods are slated to release this year, with the multiplayer Bloodborne-like arriving in 2026. Also keep in mind that this is a Partner Direct, meaning Nintendo's first-party titles are less likely to be featured here.
You might also like...Scattered Spider is only getting warmed up with its cyberattacks, and businesses should be on their guard for possible attacks, law enforcement forces have said.
A warning given by the US Cybersecurity and Infrastructure Security Agency (CISA), and a handful of other security agencies in Canada, the UK, and Australia, says the group has evolved to use more advanced social engineering - mostly impersonating employees to trick IT help desks into resetting passwords and transferring MFA tokens to attacker-controlled devices.
The hackers have also added new malware such as RattyRAT for stealthy access and DragonForce ransomware to encrypt systems and demand payment - especially targeting VMware ESXi servers.
More to comeAlso known as Okto Tempest (and a handful of other names), Scattered Spider is described as a highly aggressive and sophisticated cybercriminal group known for targeting major companies through social engineering, phishing, and identity-focused attacks.
The group is infamous for its use of SIM swapping, MFA fatigue attacks, and help desk impersonation to gain initial access, and it’s the latter that CISA is now further stressing.
Scattered Spider is generally engaged in double-extortion attacks, exfiltrating sensitive files to third-party servers before encrypting the target infrastructure. To store the stolen files, they’re using MEGA.nz and Amazon S3, and in some cases, they’ve run thousands of queries against Snowflake environments to steal large volumes of data quickly.
To stay hidden, they create fake identities backed by social media profiles, monitor internal communications like Slack and Microsoft Teams, and even join incident response calls to learn how defenders are reacting.
CISA says more Scattered Spider attacks are to be expected in the coming weeks and months, and urges organizations to use phishing-resistant MFA (like FIDO/WebAuthn), audit and restrict remote access tools, monitor risky logins and unusual account behavior, maintain offline, encrypted backups, segment networks, and patch known vulnerabilities.
Via Cybernews
You might also likeBlink makes some of the best video doorbells and home security cameras we've tested here at TechRadar, and now it's launched a new version of its budget-friendly doorbell that can run for up to two years without you needing to recharge or replace the batteries.
The new Blink Video Doorbell runs from three AA lithium batteries, plus the Blink Sync Module Core, which also acts as a central hub that connects your Blink devices to one another, and to your home Wi-Fi network.
The new doorbell also has an improved 150-degree field of vision (upgraded from 135 degrees horizontal and 80 degrees vertical), 1:1 video aspect ratio, and HD infrared night vision.
Like the previous model (which we reviewed back in March), the new doorbell also offers person detection if you have a Blink subscription, and can be configured to only send notifications to your phone if a person is identified (and not an animal or object).
The new Blink Video Doorbell is available to pre-order now from Amazon for £59.99 (about $80 / AU$120) for delivery in August. International prices and release dates are yet to be confirmed.
Blink camerasThe new Blink Video Doorbell sits alongside the Blink Outdoor 4 and Blink Mini 2, both of which have earned a place in our roundup of the best home security cameras thanks to their impressive battery lives and affordable price tags.
Image 1 of 3(Image credit: Blink)Image 2 of 3(Image credit: Blink)Image 3 of 3(Image credit: Blink)If you want advanced features like person detection, cloud storage, and photo capture, Blink subscription plans start at $3 / £2.50 / AU$4.95 per month for one device, or $10 / £8 / AU$15 per month for unlimited devices.
For more details, take a look at our full Blink Mini 2 review and Blink Outdoor 4 review.
You might also like