Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Technology

New forum topics

Who needs Sonos? McIntosh’s new Bluetooth pre-amp does multi-room music the old-fashioned way, but with a modern app upgrade

TechRadar News - Wed, 07/30/2025 - 11:12
  • The McIntosh CR106 can create and control six independent audio zones
  • Link five units to create up to 30 audio zones
  • $5,500 / £6,999
Money no object

We love to give practical buying advice on the latest gadgets here at TechRadar. But sometimes what we love even more is to indulge in the most high-end, cutting-edge, luxurious tech on the planet. That's what we bring you in these Money no Object columns – you can read the whole series here.

If you're looking for a high-end pre-amp and multi-room audio matrix for potentially massive home-install systems, McIntosh has just the thing. The new CR106 delivers up to six independent audio zones from a single unit, and it can be networked with others to provide as many as 30 different, customizable and controllable zones.

The CR106 combines a pre-amp and audio matrix – essentially a traffic controller for audio, providing you the ability to set custom audio tweaks for different zones – and it works with a wide range of amps and speakers. It can be rack mounted in a standard AV rack, where it'll take up a modest 2U of rack space.

(Image credit: McIntosh)McIntosh CR106: key features and pricing

The CR106 is controlled via the McIntosh connect app for Apple and Android, via a web interface, or via its front panel. The app offers lots of zone customization tools, enabling you to name each zone, group multiple zones together, selecting the audio sources for different zones and configuring their subwoofer settings too.

There are four unbalanced analog and four digital inputs, and if you have a large home or budget you can chain up to five CR106 units together via the Dante network interface to create up to 30 two-channel zones.

In addition to the hardware inputs, there's also Bluetooth with AAC, aptX HD and aptX Adaptive, so you can stream into one of these units, and send it out to any of the connected wired setups.

Each zone that it supports has two sets of unbalanced outputs, and dedicated subwoofer outputs.

The CR106 will be available globally from McIntosh dealers from August 2025. The MSRP is $5,500 / £6,999.

You might also like
Categories: Technology

Another top vibe coding platform has some worrying security flaws - here's what we know

TechRadar News - Wed, 07/30/2025 - 11:03
  • Researchers find Base44's "vibe coding" platform contained security flaw
  • This allowed threat actors to access data that should be private
  • The bug was squashed within 24 hours with no signs of abuse

Vibe coding platform Base44 contained a major security vulnerability which could have allowed unauthorized users to access other people’s private applications, experts have warned.

The issue was discovered in early July 2025 by security pros from Wiz Research, who explained how exposed API endpoints on Base44’s platform allowed threat actors to create a verified account on private apps using nothing more than app_id, a piece of code that is publicly visible.

Normally, authentication systems ask for strong credentials, and means of identity verification, but Base44’s setup apparently lets anyone bypass those checks using just that one code. One could think of it like showing up to a locked office building, shouting “I’m here for app_id 12345”, and the doors would open - no questions asked.

Vibe coding

Attackers could easily grab an app_Id from public files, and use it to “register” through unsecured API routes, accessing apps that handle sensitive employee data and company communications.

The vulnerability could have affected enterprise apps handling HR and personally identifiable information (PII), internal chatbots and knowledge bases, as well as automation tools used in day-to-day operations.

Once Wiz discovered the flaw, it reached out to Wix, the company which owns Base44, who fixed it within a day.

Wix added it found no signs of abuse by threat actors. The researchers also identified vulnerable apps and reached out to some of the affected companies directly.

Vibe coding is a relatively new slang term for coding with the help of generative AI and through natural language rather than writing actual code. A developer will discuss their ideas and needs with the AI, which would come back with code. It has gained a lot of popularity lately, but news such as this one highlight that the method is not without its risks.

Since the background infrastructure is shared, there is always a risk of information leaking somewhere.

Via Infosecurity Magazine

You might also like
Categories: Technology

When will Foundation season 3 episode 4 come out on Apple TV+?

TechRadar News - Wed, 07/30/2025 - 11:00

Foundation season 3 is already a third of the way through its run on Apple TV+. And, with a new episode set to drop on the tech giant's streaming platform later this week, it won't be long until it reaches its midpoint.

For now, though, you'll want to know when this season's fourth installment will arrive on one of the world's best streaming services.

Below, I'll outline the dates on which we expect Foundation's next entry to drop, and predict what time it'll be released. There's also a full rundown of this season's episodic release schedule at the end of this article, so you can block out some time in your own busy schedule to watch it.

What is the release date for Foundation season 3 episode 4?

Dawn will continue to meet with Gaal in secret in Foundation season 3 (Image credit: Apple TV+)

This season's fourth episode, titled 'The Stress of Her Regard', will land on Apple's streaming service on Friday, August 1.

Well, that's in some world territories at least. Apple tends to release new episodes of its TV Originals a day earlier in some regions of North and South America. Long story short: Foundation season 3 episode 4 could launch in some parts of these continents, such as the US west coast, on Thursday, July 31.

As for what time it'll debut, that's hard to determine. Apple doesn't publicly state when new episodes will arrive. However, some of the best Apple TV+ shows' latest entries have shown up at 9pm PT on Thursdays and 12am ET on Fridays. It's possible, then, that 'The Stress of Her Regard' will do likewise.

For a breakdown on when I expect season 3 episode 4 to be released, read on (NB: use 12am ET to work out when it'll launch in your country if it isn't listed below):

  • US – Thursday, July 31 at 9pm PT / Friday, August 1 at 12am ET
  • Canada – Thursday, July 31 at 9pm PT / Friday, August 1 at 12am ET
  • UK – Friday, August 1 at 5am BST
  • India – Friday, August 1 at 9:30am IST
  • Singapore – Friday, August 1 at 12pm SGT
  • Australia – Friday, August 1 at 2pm AEST
  • New Zealand – Friday, August 1 at 4pm NZST
When will new episodes of Foundation season 3 launch on Apple TV+?

You don't need an all-knowing robot to tell you when new episodes of Foundation will be released (Image credit: Apple TV+)

Want to know when you can stream new episodes of Foundation season 3 in the weeks ahead? Check out the list below:

  • Foundation season 3 episode 1 – out now
  • Foundation season 3 episode 2 – out now
  • Foundation season 3 episode 3 – out now
  • Foundation season 3 episode 4 – Friday, August 1
  • Foundation season 3 episode 5 – Friday, August 8
  • Foundation season 3 episode 6 – Friday, August 15
  • Foundation season 3 episode 7 – Friday, August 22
  • Foundation season 3 episode 8 – Friday, August 29
  • Foundation season 3 episode 9 – Friday, September 5
  • Foundation season 3 episode 10 – Friday, September 12
You might also like
Categories: Technology

Google confirms the UK has not asked it to weaken encryption with a backdoor – unlike Apple

TechRadar News - Wed, 07/30/2025 - 10:26
  • Google has just confirmed that it hasn't received any official request from the UK government to weaken encryption or provide backdoor access to user data
  • Earlier this year, Apple was asked to provide an encryption backdoor in its iCloud’s Advanced Data Protection feature
  • This marks a growing divide in how tech giants are affected by the UK’s controversial Investigatory Powers Act and its global implications for privacy

Google has just admitted that the UK government hasn't requested access to end-to-end encrypted user data.

Meanwhile, Apple has been hit by a Technical Capability Notice (TCN) under the 2016 Investigatory Powers Act (IPA), forcing it to shutter its iCloud Advanced Data Protection feature in the UK as a result.

The backlash that followed the UK's request for access to end-to-end encrypted data from Apple echoed throughout the rest of the world. It now turns out that the request may have been more targeted than it first seemed, with Google seemingly immune to it for now.

"We haven't received a technical capabilities notice"

(Image credit: Shutterstock / nikkimeel)

In February this year, the UK authorities requested that Apple break its end-to-end encryption policies in the Advanced Data Protection (ADP) feature. ADP isn't on by default, but when enabled, it adds an extra layer of security. Not even Apple itself can access the data that's been encrypted in this way; it's completely private.

Unsurprisingly, the order was not met with a warm reception. Mounting scrutiny of the UK's Investigatory Powers Act (IPA) led US senators to investigate whether other companies have also received similar requests.

According to TechCrunch, Google refused to answer questions about any involvement from the UK government when prompted by US Senator Roy Wyden. Companies that are subject to government surveillance orders are unable to disclose them under UK law.

However, Wyden disclosed that at least one technology giant confirmed that it hasn't received such a notice. That turned out to be Meta, which told Wyden's office back in March that it hadn't been served an order to backdoor its encryption services.

Although Google remained silent, it appears to have broken that vow of silence in a statement to TechCrunch. Karl Ryan, Google spokesperson, said: "We haven't received a technical capabilities notice."

That's as good a confirmation as we're going to get in this situation. If Google had received such a notice, it would imply that the UK government was surveying whether a backdoor could be added to its end-to-end encryption or not.

Ryan also told TechCrunch: "We have never built any mechanism or 'backdoor' to circumvent end-to-end encryption in our products. If we say a product is end-to-end encrypted, it is."

The UK government might still back down

When asked to build a backdoor in its ADP service, Apple instead chose to turn off the feature for users in the UK, leaving them without access to additional data protection.

Although using one of the best VPN services can help boost Brits’ online privacy, it's certainly not going to replace iCloud’s end-to-end encryption protection that users in other countries are able to benefit from.

The order was widely criticized worldwide, with US lawmakers warning against "systemic vulnerabilities." Meanwhile, Apple decided to challenge the request in Court.

More recently, two senior British officials disclosed that the UK government might have to give up on pursuing encryption backdoors due to pushback from the US government. "They don't want us messing with their tech companies," they said.

No matter where this case ultimately leads, the fact that Apple was involved, but Google walked away unscathed, is an interesting development. Google’s hands-off status may offer reassurance that the UK’s encryption demands aren’t as sweeping as they first appeared — at least not yet.

You might also like
Categories: Technology

Ninja Gaiden: Ragebound Is a Forgettable Chapter in the Series' Legacy

CNET News - Wed, 07/30/2025 - 10:08
All style, but no heart makes Ragebound an easy game to skip.
Categories: Technology

Hackers hit SAP security bug to send out nasty Linux malware

TechRadar News - Wed, 07/30/2025 - 10:04
  • A critical flaw in SAP NetWeaver is still being abused, months after patching
  • Researchers saw it used to deploy Auto-Color
  • This backdoor remains dormant when not in use

A vulnerability in SAP NetWeaver is being exploited to deploy Linux malware capable of running arbitrary system commands and deploying additional payloads, experts have warned.

Security researchers from Palo Alto Networks’ Unit 42 discovered a piece of malware called Auto-Color, a Linux backdoor, dubbed for its ability to rename itself after installation.

The researchers found it was capable of opening reverse shells, executing arbitrary system commands, acting as a proxy, uploading and modifying files, as well as adjusting settings dynamically. It was also discovered that the backdoor remains mostly dormant if its C2 server is unreachable, effectively evading detection by staying inactive until the operator instructions arrive.

Salt Typhoon

However, the researchers weren’t able to determine the initial infection vector - how the malware made it onto target endpoints remained a mystery - until now.

Responding to an incident in April 2025, cybersecurity experts from Darktrace investigated an Auto-Color infection on a US-based chemicals company. They were able to determine that the initial infection vector was a critical vulnerability in SAP NetWeaver, a technology platform developed that serves as the technical foundation for many SAP applications.

The vulnerability was found in the platform’s Visual Composer Metadata Uploader element, which was not protected with a proper authorization. As a result, unauthenticated agents were allowed to upload potentially malicious executable binaries that could do severe damage. It is tracked as CVE-2025-31324, and was given a severity score of 9.8/10 - critical.

SAP fixed the issue in late April 2025, but at the time, multiple security firms were already seeing attacks in the wild. ReliaQuest, Onapsis, watchTowr, Mandiant, all reported observing threat actors leveraging this flaw, and among them - Chinese state-sponsored groups, as well.

Given the destructive potential of the flaw, and the fact that a patch is available for months now, Linux admins are advised to apply it without hesitation and mitigate potential threats.

Via BleepingComputer

You might also like
Categories: Technology

How to Watch Panathinaikos vs. Rangers From Anywhere for Free: Stream Champions League Qualifier Soccer

CNET News - Wed, 07/30/2025 - 10:00
The Scottish giant takes a 2-0 aggregate advantage to Athens.
Categories: Technology

Starlink Is Set to Receive Billions in Federal Subsidies but Analysis Says It Can’t Handle the Traffic

CNET News - Wed, 07/30/2025 - 10:00
As Starlink is poised to cash in on BEAD contracts, a new analysis casts doubt on its ability to connect rural America.
Categories: Technology

YouTube's Age-Estimation Tech Will Spot Kids Pretending to Be Adults. Here's How It Works

CNET News - Wed, 07/30/2025 - 09:43
The streaming service will use various methods to make sure kids aren't watching age-restricted content.
Categories: Technology

Dropbox Passwords will soon be no more - here's how to save your passwords, and our pick of alternatives

TechRadar News - Wed, 07/30/2025 - 09:28
  • Dropbox is dropping Passwords from its product portfolio
  • The app and browser extension will be discontinued soon
  • Users will still be able to access their data until October 28, 2025

For users of Dropbox Passwords, it's time to take a look at the best password managers and find a new service to use, after the cloud storage company revealed it will soon discontinue the service.

The end of service for Dropbox Passwords will be October 28, 2025, giving users ample time to find a new credential manager to suit their needs.

In the announcement, Dropbox said it was discontinuing the tool, “as part of our efforts to focus on enhancing other features in our core product.”

So long, Dropbox Passwords

Dropbox Passwords users will still have ample time to access their saved usernames, passwords, and stored credit card information for export until October 28, but there will be some key changes before then.

On August 28, 2025 the password manager will become view-only on both mobile devices and on through the browser extension. You won’t be able to add any more credentials nor use the autofill feature from this date.

On September 11, the mobile app will be depreciated and will no longer be available for use. Your data will remain available through the browser extension.

The fateful date of October 28 will see all Dropbox Password data securely deleted and the dark web monitoring feature will cease to function.

In its blog post, Dropbox has provided some key information on how to export your data from both the app and browser extension. Mobile app users can follow these instructions to export their data:

  1. Open the Dropbox Passwords mobile app.
  2. Tap (settings).
  3. Tap Export.
  4. Tap Export to confirm.

To export data from the browser extension, do the following:

  1. Open the Dropbox Passwords browser extension.
  2. Click your avatar (profile picture or initials) in the bottom-left corner.
  3. Click Preferences.
  4. Click the Account tab.
  5. Click Export.
  6. Click Export to confirm.
You might also like
Categories: Technology

Levoit's new air purifier-sleep aid combo is designed for children, but it looks so soothing I'd quite like one myself

TechRadar News - Wed, 07/30/2025 - 09:26
  • Levoit Sprout is an air purifier designed for children
  • It includes white noise and gentle night light functions
  • It also monitors humidity and temperature

Levoit's Sprout is an air purifier geared specifically towards children, and it has some nifty tricks up its sleeve. Not only does it purify air, but it also offers various extra features intended to help create the perfect safe, soothing sleep environment. Levoit calls it a 'three in one peacemaker'.

Today's best air purifiers are excellent at removing impurities from the air, and some even double up as fans, but I've never seen one that's designed to act as a sleep aid. I'm actually a little miffed that this one's really for children, because I'd quite like one in my bedroom.

There's a true HEPA filter, which can capture all kinds of nasties – including dust, pollen, smoke and viruses – from the air. On top of that, it's able to track the levels various pollutant types (PM1.0, PM2.5, PM10, TVOC and CO2) as well as monitoring the temperature and humidity in the room.

Soothing sleep

The Sprout doubles up as a night light, emitting soft, blue-light-free ambient illumination, and offers five different white noise settings to help create a soothing environment to drop off in. The curvy shape with rounded edges was created with nursery décor in mind.

The Sprout purifier connects to the VeSync app, where you can view air quality reports in real time, create personalized schedules, control the appliance remotely, and check how soon the filter needs replacing. It's also compatible with Amazon Alexa if you want to go hands-free.

The Levoit Sprout is available to purchase direct from Levoit or via Amazon US or Amazon UK, and costs $279.99 / £279.99 at list price. The good news for UK shoppers is that there's a deal available to take the price down:

There's £50 off the Levoit Sprout right now, taking the price of this child-friendly air purifier and sleep aid down to under £230. This multitasking appliance purifies the air and also has nightlight and white noise functions, plus the curvy design will fit seamlessly into a nursery or child's room.

The same deal is available direct from Levoit, via a coupon code.View Deal

You might also like...
Categories: Technology

Agentic AI: the rising threat that demands a human-centric cybersecurity response

TechRadar News - Wed, 07/30/2025 - 09:23

AI agents were once theoretical, but now they are a tangible force reshaping the modern threat landscape. Also known as Computer-Using Agents (CUAs), these advanced AI bots can use applications and browse the internet to complete complex, often time-consuming tasks with minimal or no human oversight. Their rapid evolution is unlocking new efficiencies across a variety of sectors with automation and analysis, enabling more informed decision-making.

But this leap forward comes with a caveat. As they grow more capable, AI agents introduce a new class of cybersecurity threats. Malicious actors can hijack these tools to orchestrate sophisticated cyberattacks, exploiting predictable patterns of human behavior to infiltrate systems and exfiltrate sensitive data.

From theory to reality

To move beyond theory and speculation, our team undertook a series of controlled experiments to assess how agentic AI could be weaponized. We found that these agents can automate a wide range of malicious tasks on behalf of threat actors when instructed correctly.

This includes, but is not limited to, credential stuffing and reconnaissance, which previously required significant human effort. To make matters worse, they can even perform outright cyberattacks by guessing passwords and sending out phishing emails en masse.

This marks a watershed moment in cybersecurity’s fight against AI-powered threats. The automation of attacks significantly lowers the barrier to entry for threat actors, enabling even low-skilled individuals to launch high-impact campaigns. This has the potential to rapidly escalate the scale at which phishing attacks can be carried out.

The growing capabilities of AI agents

The largest AI players are redefining what agents can do. Platforms like OpenAI’s Operator, alongside various tools developed by Google, Anthropic and Meta, all have their own strengths and limitations, but share one critical feature. The ability to carry out real-world actions based on very simple text prompts.

This functionality is a double-edged sword. In the hands of responsible users, it can drive innovation and productivity. But in the wrong hands, it becomes a powerful weapon, one that can turn a novice attacker into a formidable threat.

The good news is that widespread abuse of these tools is not yet common. However, that window is closing fast. The simplicity and accessibility of agentic AI make it an ideal tool for amplifying social engineering attacks.

Automating reconnaissance at scale

To illustrate the real-world implications, we investigated whether agentic AI could be utilized to automate the collection of information for targeted attacks. Using OpenAI’s Operator, which features a sandboxed browser and possesses uniquely autonomous behavior, we issued a simple prompt: identify new employees at a specific company.

Within minutes, the agent accessed LinkedIn, analyzed recent company posts and profile updates, and compiled a list of new joiners from the past 90 days. It extracted names, roles, and start dates, all the information needed to craft highly targeted phishing campaigns. And, it did this in the blink of an eye.

Some might be tempted to dismiss this as a simple information-gathering exercise. But this experiment displays that seemingly harmless human behaviors like posting job updates on social media can inadvertently expose organizations to significant cyber risk. What once took hours or days can now be accomplished in minutes, at scale.

Exploiting identity through credential stuffing

Another alarming capability of agentic AI is its potential to facilitate identity-based attacks. Credential stuffing, a method where attackers use previously compromised username and password combinations to gain unauthorized access, is a prime example.

To test this attack vector, we instructed Operator to attempt access to login flows on several popular SaaS platforms, equipping it with a target email address and a publicly available list of breached passwords. Based on this limited information, it was able to get into one of the accounts. This underscores how agentic AI can be used to automate credential abuse, bypass traditional defenses and exploit a weak link in the security chain. Human error.

Injecting heightened urgency into human risk management

Our research confirms that agentic AI is already capable of executing a broad spectrum of malicious activities, from phishing and malware delivery to exposing vulnerabilities. While current capabilities are still in their early stages, the potential is there for automated attacks at scale in the not-so-distant future.

This calls for a fundamental shift in how organizations approach cybersecurity. Historically, the focus has been on protecting systems, not people. However, traditional methods like annual training and awareness campaigns only serve to place the burden on employees. This is an outdated approach, and it papers over the real root causes of human error.

Human-centric cyber risk needs to be proactive. And, it needs to be in real-time. This includes two main steps:

  • User-focused controls: Implementing strong authentication, behavioral monitoring, and phishing-resistant technologies shifts the focus to identifying common risky behaviors
  • Threat mapping: Visualizing and prioritizing human-centric risks in the same way software risks are tracked by the MITRE database, for example, can inform more targeted interventions tailored to specific risky user behaviors

By understanding the human behaviors that create openings for threat actors, businesses can deploy smarter, more effective defenses. This shift from reactive to proactive security is well established for software defense, so there is no good reason human risk should be treated any differently.

Adapt before it’s too late

Agentic AI is not just a technological advancement, it is a vehicle for cyberattacks at scale. As these tools become more powerful and accessible, the cybersecurity community must shift its mindset. The future of cyber defense lies not just in securing systems, but in understanding and protecting the people who use them.

The clock is ticking, and the attackers are already adapting. So should you.

We've featured the best encryption software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Harnessing the chaos: the strategic imperative of the Generative AI era

TechRadar News - Wed, 07/30/2025 - 09:06

The world has been captivated by the sheer magic of generative AI. In what felt like an instant, we were handed a technology capable of creating endless streams of enterprise knowledge — from customer support scripts and detailed technical manuals to entire marketing campaigns and even lines of code. The first phase of this revolution was one of chaotic, yet thrilling, experimentation. But the novelty is giving way to a stark reality: Creating an avalanche of information isn’t a strategy. It's a liability.

At the Responsible AI Summit in June 2025, the urgency was palpable. Across every conversation I had, one truth kept resurfacing: The very tools designed to drive innovation and accelerate growth could just as easily expose us to risks. What was once seen as a ‘golden ticket’ of sorts is now being viewed through a sharper lens — one that reveals reputational risks, regulatory landmines, and the potential for operational chaos if left unchecked.

The second act of generative AI: compliance

We’re now entering the second, more critical act of this technological shift. The primary challenge is no longer about generation, but about governance and scale across the entire organization. The siloed, human-centric workflows that have managed our information pipelines for decades are breaking under the strain of this new volume. It's not lost on me that the generative AI boom has made content production quicker and easier than ever. But speed without oversight is a liability.

The strategic imperative has shifted from creating more content to creating the right content, reliably and with purpose, regardless of its function. The companies that thrive will be those that move from frantic experimentation to building a unified, strategic creation engine.

Every piece of content either builds your brand — or breaks it. Whether it’s content that strays from brand guidelines, defies industry standards, or is misaligned with regulatory compliance, these missteps in content expose your organization to legal, financial, and reputational risks. We’re seeing the consequences of poor quality content unfold in real-time.

The infrastructure behind AI intelligence

This requires building a new kind of digital factory for enterprise intelligence. This isn't just a metaphor; it's an operational necessity built on three pillars.

At the heart of it’s a robust MLOps (Machine Learning Operations) pipeline specifically designed for the nuances of generative models, serving as the factory's core assembly line. With generative AI models demanding continuous tuning, evaluation, and oversight, MLOps is what’s behind running the engine, adapting to evolving enterprise needs, and preventing misuse before it occurs.

Second, a mastery of prompt engineering, which acts as the skilled artisan, ensures the AI’s output is refined and aligned with specific departmental intent. Generative AI will only ever be as good as its inputs and the instructions it’s given. Prompt engineering acts as a quality control in translating business context into meaningful, actionable outputs — each purpose-built for the teams that need it.

Finally, a network of powerful APIs serves as the distribution network, seamlessly integrating this new creation engine into every facet of the business, from technical authoring platforms to conversational AI interfaces. Embedding AI into the platforms that employees are already using, APIs bring new capabilities into everyday, scalable workflows.

Together, these three pillars move you beyond fragmented AI experiments and into operational reality. They create a foundation where AI becomes a native part of how your business runs: Consistently, safely, and at scale.

Defining quality by determinism

Yet, even with a perfect factory, a fundamental question remains: What’s "good" content when it could be anything from a line in a legal contract to a spoken response from a chatbot? Quality is no longer subjective; it must be defined by accuracy, consistency, and safety. This is where we must install creative guardrails.

The answer lies in a concept that seems at odds with generative AI’s nature: Determinism. While AI’s probabilistic power is the source of its creativity, an enterprise requires certainty. We need a technical document to cite the correct API endpoint every time. We need a support chatbot to follow a specific, compliant troubleshooting protocol. We need our legal boilerplate to be exact.

By embedding deterministic rules into our AI systems, we don’t stifle innovation; we create a safe space for it to flourish. These guardrails are the mechanism that safeguards that whether the output is for marketing, engineering, or customer support, it’s verifiably accurate and trustworthy.

Building the intelligent enterprises of the future

Looking ahead, this controlled, strategic approach will unlock a future of knowledge that’s truly dynamic and multi-modal. We’re on the cusp of creating interactive, voice-navigated repair manuals for technicians in the field, real-time multilingual voice support for global customers, and hyper-personalized onboarding documents for new employees. As data from McKinsey suggests, this level of personalization and efficiency lifts revenues by 5-15% and dramatically improves operational effectiveness, turning a universal business function into a powerful engine for growth.

The era of siloed experimentation with generative AI is over. The competitive advantage now belongs to those who can master it as a unified, enterprise-wide capability. The leaders of the next decade will be the ones building their intelligent information factories today, harnessing the chaos to create value that is not only innovative but also intentional, consistent, and mission-critical. The revolution is here; it’s time to give it direction.

We've featured the best AI website builder.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Minnesota mobilizes National Guard after major St. Paul cyberattack

TechRadar News - Wed, 07/30/2025 - 09:03
  • The National Guard has been called to help recovery from cyberattack
  • An intrusion was detected in Minnesota systems in St Paul
  • Networks have been shut down to isolate and protect systems

Following suspicious activity being detected in the computer networks of the capital St Paul, Minnesota Governor Tim Walz has activated the state's National Guard to help defend against attackers.

The attack led to local officials shutting down the information systems in St Paul as a defensive measure, including network access for a range of internal applications, in order to contain the threat. Mayor Melvin Carter assured residents 911 services were operating as normal, but shared that the city has experienced some ‘back-end’ challenges;

“We recognize that these outages have created inconveniences for residents and city staff alike. While these disruptions are difficult, they are necessary steps to limit exposure, preserve system integrity, and protect sensitive information as our investigation and recovery efforts continue,” Carter continued.

A deliberate effort

The city has been working with Minnesota Information Technology Services as well as an external cybersecurity vendor, but even still the ‘scale and complexity’ of the attack has exceeded ‘both internal and commercial response capabilities’, former Democratic VP candidate Walz explained.

It’s not yet clear if this was a ransomware attack, but a range of networks and services have been intentionally and proactively shut down in order to ‘isolate and secure’ Minnesota systems.

These are ‘necessary steps to limit exposure, preserve system integrity and protect sensitive information’ argues Carter, who reveals that the breach was intentionally caused by a ‘criminal, external threat actor’.

"This was not a system glitch or technical error. This was a deliberate, coordinated digital attack carried out by a sophisticated external actor intentionally and criminally targeting our city’s information infrastructure," Carter explained.

Critical infrastructure is a top target for cybercriminals, who leverage the importance of the services they provide and the sensitive data they hold to request higher ransoms.

The US government recently warned Medusa ransomware has hit hundreds of critical infrastructure targets in similar incidents - although no threat actor has yet taken responsibility for this attack.

Via; The Record

You might also like
Categories: Technology

How to watch Deadliest Catch season 21 online from anywhere – stream much-loved fishing doc

TechRadar News - Wed, 07/30/2025 - 09:00
Watch Deadliest Catch season 21 online

20 years after it originally aired, Deadliest Catch is back once again with more death-defying exploits from a fleet of fearless fishermen. A Discovery Channel original, Deadliest Catch goes out on the network around the world, while US viewers can also tune in via Sling TV and HBO Max. Read on for how to watch Deadliest Catch season 21 online from anywhere with a VPN.

Premiere date: Friday, August 1 at 8pm ET / PT

US broadcast: Discovery Channel via Sling TV

Global streams: HBO Max (US) | Discovery Plus (US, UK & CA)

Use NordVPN to watch any stream

Season 21 sees the intrepid Dutch Harbor voyagers head back to the Bering Sea, looking to bring in a haul of red monster king crabs. Making their way to the abandoned military island of Adak off the unforgiving tip of Alaska, there's a 21st century-style gold rush on to find the finest specimens first – hence the name of the first episode: The Wild West.

Familiar face Captain Sig Hansen and John Hillstrand are back to navigate their ship Time Bandit through the perilous seas and, although the full list of vessels and crew are being kept close to Discovery's chest ahead of the series, Jake Anderson has confirmed separately that he will also be returning.

Below we have all the information you need on where to watch Deadliest Catch season 21 online and stream every episode from wherever you are.

Can I watch Deadliest Catch season 21 for free?

Not subscribed to Discovery Plus before? New users of the streaming platform get to try it without paying thanks to its 7-day free trial. The trial period is available in the US and Canada.

How to watch Deadliest Catch season 21 online in the US

Deadliest Catch season 21 premieres in the US on Discovery at 8pm ET / PT on Friday, August 1. Episodes will go out in the same slot weekly.

Cord cutters can access Discovery via an OTT service such as our favorite, Sling TV. Sling Blue carries Discovery and starts at just $45.99 a month with 50% off your first month.

Episodes will also be available stream online the day after they air Discovery Plus (from $5.99 per month) and HBO Max (from $9.99 per month).

Have one of these subscriptions but away when Deadliest Catch is on? You can still access your usual streaming services from anywhere by using a VPN.

Get 50% off your first month of Sling TV
Sling TV gives you live TV at an affordable price. The Sling Blue package includes more than 50 channels including ABC, Fox and NBC (in select cities), AMC, Bravo, Food Network, HGTV, Lifetime and USA.

How to watch Deadliest Catch online from outside your country

If you’re traveling abroad when Deadliest Catch season 21 episodes air, you’ll be unable to watch the show like you normally would due to annoying regional restrictions. Luckily, there’s an easy solution.

Downloading a VPN will allow you to stream online, no matter where you are. It's a simple bit of software that changes your IP address, meaning that you can access on-demand content or live TV just as if you were at home.

Use a VPN to watch Deadliest Catch season 21 from anywhere.

Editors Choice

NordVPN – get the world's best VPN
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it's very straightforward to use. Speed, security and 24/7 support available if you need – it's got it all.

The best value plan is the two-year deal which sets the price at $3.39 per month, and includes an extra 4 months absolutely FREE. There's also an all-important 30-day no-quibble refund if you decide it's not for you.

- Try NordVPN 100% risk-free for 30 days and get an Amazon Gift Card included right now!VIEW DEAL ON

How to watch Deadliest Catch season 21 online in Canada

New episodes of Deadliest Catch go out on Discovery in Canada, with the season 21 airing at the same time as south of the border at 8pm ET/PT on Friday, August 1.

You'll be able to stream episodes on Discovery Plus, too, with subscriptions costing CA$5.99 per month for Canadian subscribers.

US viewer in Canada? If you’re away from home, you can access your usual services easily with NordVPN.

How to watch Deadliest Catch season 21 online in the UK

Discovery is the home to Deadliest Catch in the UK and season 21 is slated to get started on Tuesday, August 5 at 9pm BST.

Discovery is available through TV providers such as Sky and Virgin Media. You can also stream its shows on demand through the Discovery Plus streaming service (where you'll also find all 20 other series) for as little as £3.99 per month.

Brit abroad? You can still watch the show as you usually would by using a VPN.

Can I watch Deadliest Catch season 21 online in Australia?

Deadliest Catch has previously gone out on Foxtel and the Binge streaming service in Australia. However, season 21 is not yet in their listings.

If you’re visiting Australia from abroad and want to watch on your home service, simply download a VPN to stream Deadliest Catch season 21 just as you would back home.

Deadliest Catch season 21 Need to KnowDeadliest Catch season 21 episode guide

Deadliest Catch seasons tend to have around 20 episodes, but season 21 episode names for only the first two have been released at the time of writing:

(US TV premiere dates)

  • Episode 1 - "The Wild West": Friday, August 1
  • Episode 2 - "Abandon All but Hope": Friday, August 8
Can I watch Deadliest Catch on Netflix?

No, Deadliest Catch season 21 and all the other seasons aren't available on Netflix anywhere around the world.

You can catch all the action on Discovery+ in the UK, US and Canada.

VPN services are evaluated and tested by us in view of legal recreational use. For example:a) Access to services from other countries, (subject to the terms and conditions of that service).b) Safeguarding your online security and making your online privacy more robust when abroad.Future plc does not support nor condone the illegal or malicious use of VPN services. We do not endorse nor approve of consuming pirated content that is paid-for.

Categories: Technology

The next Nintendo Direct has been announced – here's when and where you can watch it

TechRadar News - Wed, 07/30/2025 - 08:16
  • A Nintendo Direct Partner Showcase has just been announced
  • You can tune in on July 31
  • The showcase will be 25 minutes long and feature third-party Switch 2 releases

Nintendo has officially announced the next Nintendo Direct showcase. And in typical fashion, there's not long to wait until we can watch it live. The company usually announces Nintendo Directs just a day or two before they go live, and that's no different here.

Announced via Nintendo's social channels, the next Nintendo Direct is taking place on July 31, 2025 at 6am PT / 9am ET / 2pm BST / 3pm CEST. You'll be able to watch the presentation live as it happens over at Nintendo's regional YouTube channels.

The presentation is due to last around 25 minutes, which is to be expected for a more focused partner showcase. There are still plenty of Nintendo Switch 2 games we're waiting for more details on throughout the rest of this year and next, though these will likely be reserved for a larger first-party Direct.

Join us for a #NintendoDirect Partner Showcase tomorrow, July 31, at 6am PT! Tune in for roughly 25 minutes of information on upcoming #NintendoSwitch2 and #NintendoSwitch games from our publishing partners. Watch here: https://t.co/PvBBmmxGTI pic.twitter.com/8hJBngwXHwJuly 30, 2025

Games we're looking forward to hearing more about include Metroid Prime 4: Beyond, Drag x Drive, Kirby Air Riders, and FromSoftware's The Duskbloods. All except The Duskbloods are slated to release this year, with the multiplayer Bloodborne-like arriving in 2026. Also keep in mind that this is a Partner Direct, meaning Nintendo's first-party titles are less likely to be featured here.

You might also like...
Categories: Technology

FBI, CISA warn of more Scattered Spider attacks to come

TechRadar News - Wed, 07/30/2025 - 08:06
  • Scattered Spider is evolving, CISA, FBI and others have warned
  • Hackers are employing additional malware, including DragonForce
  • Companies should use phishing-resistant MFA to defend

Scattered Spider is only getting warmed up with its cyberattacks, and businesses should be on their guard for possible attacks, law enforcement forces have said.

A warning given by the US Cybersecurity and Infrastructure Security Agency (CISA), and a handful of other security agencies in Canada, the UK, and Australia, says the group has evolved to use more advanced social engineering - mostly impersonating employees to trick IT help desks into resetting passwords and transferring MFA tokens to attacker-controlled devices.

The hackers have also added new malware such as RattyRAT for stealthy access and DragonForce ransomware to encrypt systems and demand payment - especially targeting VMware ESXi servers.

More to come

Also known as Okto Tempest (and a handful of other names), Scattered Spider is described as a highly aggressive and sophisticated cybercriminal group known for targeting major companies through social engineering, phishing, and identity-focused attacks.

The group is infamous for its use of SIM swapping, MFA fatigue attacks, and help desk impersonation to gain initial access, and it’s the latter that CISA is now further stressing.

Scattered Spider is generally engaged in double-extortion attacks, exfiltrating sensitive files to third-party servers before encrypting the target infrastructure. To store the stolen files, they’re using MEGA.nz and Amazon S3, and in some cases, they’ve run thousands of queries against Snowflake environments to steal large volumes of data quickly.

To stay hidden, they create fake identities backed by social media profiles, monitor internal communications like Slack and Microsoft Teams, and even join incident response calls to learn how defenders are reacting.

CISA says more Scattered Spider attacks are to be expected in the coming weeks and months, and urges organizations to use phishing-resistant MFA (like FIDO/WebAuthn), audit and restrict remote access tools, monitor risky logins and unusual account behavior, maintain offline, encrypted backups, segment networks, and patch known vulnerabilities.

Via Cybernews

You might also like
Categories: Technology

Blink's new video doorbell can run for up to two years on the same set of AA batteries

TechRadar News - Wed, 07/30/2025 - 08:00
  • Blink has launched a new version of its budget-priced video doorbell
  • It runs for up to two years without replacing or recharging its batteries
  • It's available to pre-order from Amazon now for delivery in August

Blink makes some of the best video doorbells and home security cameras we've tested here at TechRadar, and now it's launched a new version of its budget-friendly doorbell that can run for up to two years without you needing to recharge or replace the batteries.

The new Blink Video Doorbell runs from three AA lithium batteries, plus the Blink Sync Module Core, which also acts as a central hub that connects your Blink devices to one another, and to your home Wi-Fi network.

The new doorbell also has an improved 150-degree field of vision (upgraded from 135 degrees horizontal and 80 degrees vertical), 1:1 video aspect ratio, and HD infrared night vision.

Like the previous model (which we reviewed back in March), the new doorbell also offers person detection if you have a Blink subscription, and can be configured to only send notifications to your phone if a person is identified (and not an animal or object).

The new Blink Video Doorbell is available to pre-order now from Amazon for £59.99 (about $80 / AU$120) for delivery in August. International prices and release dates are yet to be confirmed.

Blink cameras

The new Blink Video Doorbell sits alongside the Blink Outdoor 4 and Blink Mini 2, both of which have earned a place in our roundup of the best home security cameras thanks to their impressive battery lives and affordable price tags.

Image 1 of 3

(Image credit: Blink)Image 2 of 3

(Image credit: Blink)Image 3 of 3

(Image credit: Blink)

If you want advanced features like person detection, cloud storage, and photo capture, Blink subscription plans start at $3 / £2.50 / AU$4.95 per month for one device, or $10 / £8 / AU$15 per month for unlimited devices.

For more details, take a look at our full Blink Mini 2 review and Blink Outdoor 4 review.

You might also like
Categories: Technology

We Tried Splendid Spoon. Here's What We Thought of the Vegan, Gluten-Free Meal Service

CNET News - Wed, 07/30/2025 - 07:17
Splendid Spoon sends colorful, premade vegan and gluten-free smoothies, soups and bowls so you can whip up healthy meals in under a minute. This popular subscription service may give you back time you'd otherwise spend cooking.
Categories: Technology

Google's massive Veo 3 update could now lets users generate videos faster than ever

TechRadar News - Wed, 07/30/2025 - 07:17
  • Veo 3 Fast will allow users to create short clips like ads even more quickly
  • Image-to-video is coming in public preview from August 2025
  • Google wants you to use it for ads and product demos

Google has given its Veo 3 video generation model a major upgrade which should improve its speed considerably.

The new Veo 3 Fast, which has been optimised for speed and rapid iteration, now enables users to create short clips like ads, demos and short films much more quickly.

The model will also support image-to-video in public preview from August 2025 for creating eight-second clips, further reducing the time it takes to generate a video by speeding up the prompt process.

Veo 3 Fast is... faster

With Veo 3 Fast, users can generate 1080p HD video with native audio generation, including lip-synced speed and fitting sound effects.

In a blog post, Vertex AI Director of Product Management Jason Gelman explained Veo-generated videos are great for creating localized video where companies may need to create the same clip in multiple languages quickly.

With Vertex AI, businesses also benefit from SynthID watermarks and indemnity coverage for full enterprise readiness.

Although the technology is new, Google is already paying close attention to how businesses are using Veo 3 to generate videos in order to further tailor its tools to real-world use cases. The latest upgrade, Veo 3 Fast, is perfect for quickly iterating ad concept variations, turning still product images into demo videos and developing animated explainers or training content efficiently.

With more than 70 million videos created with Google's Veo 3 since May 2025 and more than six million videos created by enterprise customers since its launch on Vertex AI in June, the new model is sure to attract users fast.

Canva has already integrated the Veo 3 model into its app, too. CPO Cameron Adams explained that Canva AI has democratized access to powerful models, and users can access Veo 3's capabilities from within the app's familiar and easy-to-use interface.

You might also like
Categories: Technology

Pages

Subscribe to The Vortex aggregator - Technology