Ivanti has released a patch for two vulnerabilities in its Endpoint Manager Mobile (EPMM) software, that’s allegedly being chained in remote code execution (RCE) attacks in the wild.
The vulnerabilities are tracked as CVE-2025-4427, and CVE-2025-4428. The former is an authentication bypass in EPMM’s API, allowing threat actors to access protected resources. It was assigned a medium-severity score of 5.3.
The latter is an RCE vulnerability exploited through maliciously crafted API requests. This one was given a high severity score (7.2/10).
Save up to 68% on identity theft protection for Techradar readers
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.
Preferred partner (What does this mean?)View Deal
Updating the toolsIvanti says it’s seen it abused in attacks: "When chained together, successful exploitation could lead to unauthenticated remote code execution,” the company said in a security advisory. “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure."
To address the issue, users should install Ivanti Endpoint Manager Mobile 11.12.0.5, 12.3.0.2, 12.4.0.2, or 12.5.0.1.
"The issue only affects the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti's cloud-based unified endpoint management solution, Ivanti Sentry, or any other Ivanti products," the company further explained. "We urge all customers using the on-prem EPMM product to promptly install the patch."
Ivanti’s EPMM software is a popular solution across different industries, including healthcare, education, logistics, manufacturing, and government. According to The Shadowserver, there are hundreds of exposed instances at the moment, mostly in Germany (992), but with a significant number in the United States (418), as well.
Those that cannot apply the patch at this time can implement different workarounds. Ivanti said these users should follow best practice guidance or filtering access to the API using either the built-in Portal ACL’s functionality, or an external WAF. More details on using the portal’s ACL functionality can be found here.
Via BleepingComputer
You might also likeSAP has patched a critical-severity zero-day vulnerability in NetWeaver server that was being chained in attacks targeting some of the world’s biggest enterprises.
The vulnerability is tracked as CVE-2025-42999, and carries a severity score of 9.1/10 (critical). On NVD, it was said that SAP NetWeaver Visual Composer Metadata Uploader is “vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.”
In a statement given to BleepingComputer, SAP said it discovered this flaw when it was investigating a different one, also a zero-day. This one was reported earlier in April this year, and is now tracked as CVE-2025-31324 (10/10 - critical). The two flaws were allegedly being abused in attacks since January 2025.
With Aura's parental control software, you can filter, block, and monitor websites and apps, set screen time limits. Parents will also receive breach alerts, Dark Web monitoring, VPN protection, and antivirus.
Preferred partner (What does this mean?)View Deal
SAP issues patchWhen security researchers first discovered CVE-2025-31324 being abused, it was said that more than 1,200 SAP instances were at risk of being hijacked. Some researchers claimed the number of vulnerable endpoints was somewhat smaller - around 500 instances.
Visual Composer is a development tool that allows users to build web-based business applications without writing code. It’s mostly used to create dashboards, forms, and interactive reports. The Metadata Uploader, on the other hand, is a tool for importing external data models (metadata) into the Visual Composer design environment. This allows developers to connect to remote data sources (web services, databases, or SAP systems).
ReliaQuest, watchTowr, and Onapsis, are just some of the firms that observed the bug being exploited in attacks in which threat actors were dropping web shells on vulnerable servers. SAP, however, told the media that it was not aware of any attacks that impacted customer data or systems.
"Something like 20 Fortune 500/Global 500 companies are vulnerable, and many of them are compromised," Onyphe CTO Patrice Auffret told BleepingComputer.
Via BleepingComputer
You might also likeGoogle announced that it's integrating its AI assistant, Google Gemini, with Google TV devices – starting with TCL TVs later this year.
The expansion was announced at its Android Show yesterday along with a host of other new features. In addition to teasing a new look of Android 16, Google revealed that Gemini’s smarts will be coming to devices with Google TV, cars with built-in Google and Android Auto, and its line of WearOS smartwatches.
At the moment Google is keeping the exact roll-out date under-wraps, but the company has stated that Gemini support for Google TV will be rolled out to TCL TVs first, with other devices to follow.
Gemini support for WearOS smartwatches and cars with Android Auto is set to roll out 'in the coming months'. (Image credit: Google )When Gemini makes its Google TV debut, it will replace the previous Google Assistant tool but will continue to offer content recommendations based on your voice commands. According to Google’s blog post you can use prompts such as ‘show me action movies that are age-appropriate for kids’.
Gemini’s capabilities will reach beyond entertainment. You’ll also have the freedom to ask Gemini on your Google TV non-recommendation based questions. For example, Google says that Gemini will be able to ‘help your kids explore their endless questions about the solar system by answering questions and pulling up the perfect YouTube video to learn more’.
However, there have been some questions about when the Google TV Streamer will receive the same treatment.
No sign of Gemini for Google’s flagship streaming deviceTo the surprise of many, it turns out that the Google TV Streamer won’t be the launch device for Gemini, nor has Google given word on its plans to bring the AI tool to its own devices. So as it stands, it’s a bit of a waiting game, but what do know is that Google TV devices will get their long-awaited support for Gemini before the end of the year.
Owners of some of the best smart TVs with Google TV have been waiting for further announcements since the company announced the next generation of Google TV with Gemini at CES 2025. At the same time, the company also unveiled its new ‘Ambient Mode’, which has been enhanced by the introduction of its new proximity sensors to adjust the display automatically.
But the future of Gemini for Google TV Streamer is still on our minds, and while we wait for further announcements from Google we’ll have our eyes peeled for any updates that might crop up elsewhere.
You might also likeThe launch of the Samsung Galaxy S25 Edge, the ultra-slim, AI-powered version of the Galaxy S25, was one of the biggest stories in the tech world yesterday. However, hidden in this announcement was the detail of a new Samsung Galaxy Ring variant.
Unfortunately, those hoping for news of the Samsung Galaxy Ring 2 will be disappointed: the ring is the original, but sporting a new limited-edition color referred to as 'Two-Tone Titanium Black'.
Samsung's Korean newsroom website states in a translated blog post: "Samsung Electronics will release the new 'Galaxy Ring Two-Tone Titanium Black' along with the Galaxy S25 Edge and sell a limited quantity at Samsung Gangnam from the 14th.
"When you purchase the newly released Galaxy Ring and Galaxy S25 Edge together, you will receive a 20% discount on the Galaxy Ring and 100,000 won in Samsung Electronics membership points."
No pictures of the ring were included in the post, so we don't yet have any idea what the Two-Tone Titanium Black version will look like.
An early sign of a Ring 2? We don't yet have any pictures of the new colorway, but this is the Titanium gold version (Image credit: Future / Matt Evans)It sounds like the new colorway is simply an exercise to promote the new S25 Edge, and will be only available at Samsung Gangnam for a limited time. However, if it proves popular, we could see the color make its way to other stores and other regions.
The Samsung Galaxy Ring has been out for nearly a year at this point. It's unknown whether a Ring 2 will be on the cards so early into the product's lifestyle: smart ring market leader Oura goes years between generations, as smart rings don't really have interactive elements like watches and phones so it's hard to introduce new features.
However, rumors persist we'll see a Ring 2 proper with a solid-state battery at this year's Samsung Galaxy Unpacked. If so, perhaps the Two-Tone colorway will make its way to a wider release.
You might also like...A globally operating organised crime group has been dismantled by Eurojust and Europol in a joint operation with German, British, Cypriot, Albanian, and Israeli investigators - leading to the arrest of a suspect. Eurojust confirms the group defrauded over a hundred victims, taking over €3 million through a fake online investment platform.
The group used cyber trading and was able to make "considerable profits” and to defraud the victims. The group, as criminals often do, promised substantial profits in a short period of time. Once victims transferred money to the platform, they were then shown false charts indicating they could earn much more if more is transferred to the platform.
The online networks used criminals posing as brokers, using ‘psychological tactics’ to convince the victims to transfer even more finds, which of course, were never actually invested into anything, but rather were directly stolen by the group.
Save up to 68% on identity theft protection for TechRadar readers!
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal.
Preferred partner (What does this mean?)View Deal
Disrupted operationsThe scam was uncovered after a married couple reported the fraud to German authorities - and an inquiry uncovered an extensive network of criminals. Law enforcement seized evidence connected to the investigation like documents, electronic devices, and cash.
Digital scams, particularly investment fraud, is a serious danger, and is costing internet users millions every year. New tools for cybercriminals, especially AI tools, are helping fraudsters pump out scamming campaigns in minutes, allowing criminals to access cybercrime with far fewer skills than used to be necessary.
This goes beyond extensive phishing campaigns, with deepfake celebrity endorsements, deepfake calls or videos, and even AI-generated fake websites mimicking legitimate businesses
“The good news is there are ways to avoid falling victim to such attacks,” said Aaron Walton, Threat Intel Analyst at Expel.
“Many organisations build in technological solutions to help prevent malicious emails from landing in user’s inboxes by automatically detecting suspicious indicators. Users can also protect themselves and their organisations by flagging any emails that appear suspicious to their security teams.”
You might also likeBest Buy has revealed that it will have some Nintendo Switch 2 units, in addition to various games and accessories, available for customers to buy at midnight on launch day, June 5, 2025.
Most stores will be open from 12:01AM ET on the day, and you can check whether your local one is participating via the Best Buy website.
The shops will have limited stock of both the Nintendo Switch 2 and Nintendo Switch 2 Mario Kart World bundle, which retail for $449.99 and $499.99, respectively.
This is on top of copies of some of the most anticipated Nintendo Switch 2 launch titles, such as Cyberpunk 2077: Ultimate Edition, Street Fighter 6 Year 1-2 Fighters Edition, and The Legend of Zelda: Tears of the Kingdom – Nintendo Switch 2 Edition.
Available accessories include the Nintendo Switch 2 Pro Controller and Nintendo Switch 2 camera. Customers who attend also have a chance to receive a special collectible Nintendo item, but there's no word on what this could be quite yet.
In addition to being a nostalgic throwback to the midnight game and console launches of old, this could be a great opportunity to get your hands on a Nintendo Switch 2 on launch day if you were not able to secure a pre-order.
You might also like...If you’ve found that the sound from your Dolby Atmos speakers is not syncing properly with your Apple TV, help is on the way in the form of the latest tvOS 18.5 update, which Apple says fixes a persistent bug that has been frustrating users for quite some time.
According to user complaints on Reddit and the official Apple Support forums, Dolby Atmos playback from speakers connected to an Apple TV over AirPlay or Bluetooth is often out of sync with the visual content on-screen. That can be irritating, as dialogue might not line up correctly with characters’ facial movements. Some users have noted that switching from Dolby Atmos to 5.1 surround sound fixes the issue.
Interestingly, the bug doesn’t seem to be limited to Dolby Atmos speakers, and can apparently manifest when Dolby Atmos is enabled, even if it’s not being used. For instance, Redditor LastUserStanding posted that “I disabled Dolby Atmos on the Apple TV and it resolved this problem,” despite having an entirely wired sound setup that does not include a Dolby Atmos speaker.
Time to update (Image credit: Future)The issue seems to have affected a wide range of speakers, including those made by third parties and even ones manufactured by Apple, such as the HomePod. Fortunately, Apple believes it has found a fix, which has been included in the tvOS 18.5 update.
Apple’s tvOS 18.5 release notes say that the update “adds support for synchronizing Dolby Atmos playback to speakers over AirPlay or Bluetooth,” seemingly addressing the reported problem. To manage this synchronization, you’ll need to go to Settings > Video and Audio > Wireless Audio Sync on your Apple TV.
So, if you’ve found strange syncing issues when using your Apple TV, make sure you update to tvOS 18.5. Even if you don’t have a Dolby Atmos speaker, it could be that disabling this feature puts things right for you.
You might also likeYesterday Google announced a major revamp of the design language used in Android and its apps, but it seems there are also some changes coming to the lock screen that Google didn't specifically mention in its presentation.
The team at Android Authority spotted a few tweaks to the always-on display in one of the images shared by Google, and they could finally bring Pixel handsets up to speed with Samsung Galaxy phones and iPhones in this particular department.
You'll see that the always-on display shows a dimmed version of the home screen wallpaper, which isn't currently an option on Pixel phones, while the at-a-glance widget has been shifted to the right of the clock as well.
That shuffling of the lock-screen widgets actually leaked last month, but this is more evidence that it's on the way. It seems likely that these changes could be applied to the lock screen with the launch of Android 16 in June.
Playing catch-up This Pixel 9a wallpaper will disappear when the screen dims (Image credit: Zachariah Kelly / TechRadar)I use a Pixel as my main phone, and the lack of customization options on the lock screen has been frustrating. This is a screen users see a lot of every day of course, so a bit more visual flair with wallpaper support will be very welcome.
As Android Authority points out, the option to see the wallpaper on the lock screen has been available in the past on Pixel phones, but hasn't been offered from the Google Pixel 4 onwards – perhaps to maximize battery life.
Head into the lock screen settings on a Pixel phone today, and you get some useful options for limiting the sensitive content that shows up in notifications, and changing the shortcut buttons shown while the phone is locked.
However, you don't get the same level of control as Samsung and Apple give you, with options for showing the wallpaper, setting a different backdrop to the home screens, and choosing which widgets get shown when the phone is locked.
You might also likeTikTok has launched a new AI feature that can turn your photos into videos, and it's available for free within TikTok Stories.
The new feature, called TikTok AI Alive, allows you to transform static photos into "dynamic, immersive videos directly within TikTok Stories."
TikTok says AI Alive "uses intelligent editing tools that give anyone, regardless of editing experience, the ability to transform static images into captivating, short-form videos enhanced with movement, atmospheric and creative effects."
The press release for the launch emphasizes TikTok's aim to spark creativity within users, although we've yet to see how the platform's biggest creators take to this new AI tool.
Some examples of how users can use AI Alive include "capturing a serene sunset photo and effortlessly turning it into a cinematic clip," or taking '"a group selfie and bringing it to life as a lively, animated memory that highlights the subtle gestures and expressions of friends or family."
You can try AI Alive today for free, and it's surprisingly easy to use directly from within TikTok Stories:
How to use TikTok AI Alive (Image credit: TikTok)AI Alive is very easy to use – you just need a device with the TikTok app installed. Once you've logged in and have everything ready to go, follow these steps below to bring your image to life:
Spectre, a series of chip vulnerabilities affecting pretty much all processors today, doesn’t seem to go away, despite multiple vendor efforts to contain and remedy the flaws.
Recently, security researchers at ETH Zurich published a new paper, claiming to have found a way around the protections released by Intel.
Sandro Rüegge, Johannes Wikner, and Kaveh Razavi, the researchers behind the paper, named the vulnerabilities Branch Prediction Race Conditions (BPRC), and claim it only works on Intel’s products (all Intel CPUs since the 9th generation - Coffee Lake Refresh - as well as other chips dating back to the 7th generation Kaby Lake ones). AMD and ARM seem to have dodged this bullet, at least for now.
TechRadar Pro readers can get 60% off Premium Plans at RoboForm now!
New users can take advantage of RoboForm’s exclusive deal and get 60% off the Premium Plan. With this deal, you can get unlimited password storage, one-click login & autofill, password sharing, two-factor authentication for added protection, cloud backup, and emergency access for trusted contacts. To claim this deal, visit this link and sign up for the Premium Plan to lock in this huge discount.
Preferred partner (What does this mean?)View Deal
Slow updatesSpectre and Meltdown were two enormous vulnerabilities that were first spotted in 2018, and which were so severe that they had most OEMs scrambling for a fix. Some fixes were so poorly implemented that they bricked entire devices, while others were “just” slowing the computers down.
At one point, Intel introduced Indirect Brach Restricted Speculation (IBRS/eIBRS), Indirect Branch Predictor Barrier (IBPB), as two techniques to control speculation and mitigate the risk.
This is apparently where the new flaw lies. Branch predictions update slowly and asynchronously (in the background, not instantly). This delay creates a race condition, which means that the CPU is still updating its internal branch prediction data from earlier code while switching to a different privilege level (from user mode to kernel mode, for example).
This timing means that predictions from user code can be mislabeled as coming from kernel mode, allowing the attacker to inject their own predictions. As a result, threat actors could pull sensitive data such as passwords, from the vulnerable device.
Intel has released a microcode update to address the flaw, The Register reports. The chipmaker's advisory, issued Tuesday, labeled the vulnerability as CVE-2024-45332.
Via The Register
You might also likeNvidia's RTX 5060 is set for launch on May 19, just before one of the biggest tech events in the world, Computex 2025, begins on May 20. However, it looks like we might have an early insight into the pricing of the 8GB GPU.
As reported by Wccftech, Asus TUF and Prime RTX 5060 GPUs were spotted on Best Buy (by popular leaker @momomo_us on X) ahead of launch. Most interestingly, the Asus TUF RTX 5060 OC Edition was listed for $409, which is close to the RTX 5070's $549 launch price.
This comes after one of rival AMD's Radeon RX 9060 XT partner cards was leaked in a listing on a Swiss retailer, with a high price tag for a low-end GPU. However, it's important to note that this price is more than likely just a placeholder for now - at least that's what we hope.
On the other hand, that might not be the case for the Nvidia GPUs. The other Asus RTX 5060 listings (which were as low as $339.99) are representative of pricing that is expected for a budget GPU, and are also consistent with the $409 price for the overclocked model (since most OC GPUs are sold at higher prices).
It's also worth noting that PNY's overclocked RTX 5060 was also spotted on Best Buy, at $299.99, which might be a more reasonable proposition for gamers on a budget.
These listings (which have now been removed) may very well be inaccurate with placeholder prices, but it would be hard to see retail pricing be much lower. Having said that, we’d also not like to see a price higher than $299.99 for a graphics card using 8GB of VRAM in 2025.
(Image credit: Future / John Loeffler) Just like the Acer Nitro Radeon RX 9060 XT listings, this will be dead on arrival if trueI hate to sound like a broken record, but 8GB of VRAM isn't sufficient for gaming in 2025, and there's enough evidence out there to prove this; from poorly optimized ports, VRAM-hungry titles, and more games like Assassin's Creed Shadows forcing RTGI (Ray-Traced Global Illumination), frame rates and smoothness just aren't up to par on 8GB graphics cards.
Computex 2025 and the RTX 5060's launch are now only days away, so it's still early days. However, I'm willing to believe that Team Green's partner cards on this occasion will be priced at absurd levels - especially when you consider the terrible state of the GPU market.
I can almost guarantee that if any RTX 5060 GPU (including AMD's RX 9060 XT 8GB) launches at $409 or above, it's not going to sell well regardless of consumer desperation. That's not me being harsh or targeting either Team Red or Team Green; that's just the reality.
Gamers need more powerful hardware to run newly-released, graphically-demanding games, and if they still have to spend that much for a weaker GPU that’s going to make too many compromises to play modern games compared to the likes of an RTX 5070 Ti or RTX 5080, then I can imagine there are going to be a lot of angry PC gamers...
You may also like...Nothing has so far found smartphone success with eye-catching but affordable handsets that target the low-end and mid-range markets, but with the Nothing Phone 3, the company is taking a gamble on something more premium.
In a video shown during the latest Android Show, Nothing’s CEO Carl Pei revealed that the Nothing Phone 3 is coming this summer (likely meaning sometime between June and August), and that it will have “premium materials, major performance upgrades, and software that really levels things up.”
These will apparently combine to make this Nothing’s “first true flagship smartphone”. That all sounds promising, but unsurprisingly it'll come at a cost, with Pei adding that the Nothing Phone 3 will cost around £800.
A flagship phone with flagship competitionConverted, that’s roughly $1,060 / AU$1,640, but price conversions are rarely accurate. Given that the Nothing Phone 2 launched for $599 / £579 / AU$1,049, we’d think the US price of the Nothing Phone 3 would be similar to the UK price – so probably $800 or just over. In Australia, it’s harder to predict, but maybe around AU$1,350.
That would put the Nothing Phone 3 in a similar price bracket to the Samsung Galaxy S25, the iPhone 16, and the Google Pixel 9, so it would have far more high-profile competition than previous Nothing handsets.
It'll be interesting, then, to see whether the Nothing Phone 3 will offer enough to justify that price, and whether buyers will give it a chance over bigger names. We should find out soon, but in the meantime – or if you’re not in the market for a premium phone – there’s always the more mid-range Nothing Phone 3a and Nothing Phone 3a Pro.
You might also likeUniversities are already under immense pressure from financial constraints, regulatory requirements, and accountability demands—the last thing they need is a cyberattack. Unfortunately, the standard approach to document management has left many of them more vulnerable than ever. With AI making cyberattacks more prolific and effective, a single misplaced document could have devastating consequences. And that’s just the tip of the iceberg.
Why? Cybercriminals know that universities often lack robust cybersecurity measures. In fact, in 2024, a staggering 97% of universities experienced a cyber-attack, leading to financial losses, reputational damage, and disruptions to academic activities. In other words, attackers know where universities are most vulnerable—and they’re exploiting those weaknesses like never before.
This article will explore how poor document management practices exacerbate these risks, how modern solutions can reduce cyber threats, and the critical steps universities must take to protect themselves.
When you don’t get with the timesMany universities operate with woefully out-of-date IT systems. It’s not uncommon for staff to bypass the whole system and work with reams of paper on their desks. In fact, a new report from the Higher Education Policy Institute says that universities need “an army” of IT staff to keep systems from crumbling under their own weight. Not only is this a burden on staff, but it increases cyber risk.
That same report says that document management is one of the most significant failure points.
Consider this: internal servers are unreliable, so staff turn to alternative solutions. Personal email accounts become makeshift storage because institutional servers can’t be trusted. Physical documents, though tangible, are easily misplaced or lost in transit—exposing confidential data and creating GDPR compliance risks. Whether it’s application forms, research papers, or emails, without proper security measures, every document is a potential vulnerability.
Unsurprisingly, humans are often the weakest link. A hastily scribbled password on a sticky note, a list of student names and addresses that falls out of a plastic binder, or a shared drive that is open to anyone with a link — all represent a way into university servers for enterprising cybercriminals. Think about it: when thousands of students and faculty members are sending documents to and from, it’s essential that this is underpinned by good security systems.
Another growing headache for universities is shadow AI. When employees struggle with outdated systems while managing increasing workloads, they turn to any tool that boosts efficiency—even if it’s unsanctioned or unsafe. Take the professor using ChatGPT to assess one of hundreds of essays. Hidden within a student essay might be personally identifiable information (PII). Meanwhile, freely available open source large language models (LLMs), such as China’s DeepSeek, have been altered to contain malicious code implanted before download.
And once cyber criminals have access to a university server, they can observe, explore and map the network and its users. Undetected and free to roam, they can seek out and obtain login credentials that gives them access to other parts of the network. They may also set up backdoors so that they can regain access once they’ve enacted their plan.
Document management can’t be overlookedWith risks like these—and with AI and machine learning becoming more advanced and widespread—cybercriminals have more tools than ever to target universities. AI tools not only lower the technological barrier for attackers, enabling even less-skilled individuals to craft convincing phishing emails or automate malicious code generation, but it also facilitates deepfake audio and video, as well as adaptive malware designed to evade detection.
More importantly, it accelerates the attack cycle. And cybercriminals know that universities are often poorly equipped to handle a barrage of attacks. According to the UK Government’s 2024 Cyber Security Breaches Survey, around 60% of UK universities had suffered a cyber breach in the past year—more than the typical large business—and this was due to inadequate cyber strategies.
Proper document management systems can mitigate many of these risks. These tools store and manage documents through a central, cloud-based server, providing a secure environment for sensitive information. They also facilitate the digitization of physical documents, making them easier to manage. By automatically generating metadata for stored content, they enhance searchability and prepare information for responsible AI and automation. Most importantly, they enforce access rights, maintain audit trails, and support regulatory compliance, reducing the risk of data breaches.
In other words, they ensure the right person has the right access to the right documents and the right time. Some modern document management tools have AI built in, making it easier to analyze and extract insights from university data. Additionally, having AI tools within a secure environment helps reduce the risk of Shadow AI.
Universities of the futureDocument management systems help universities prepare for the future. Data indexing and classification are essential for AI and automation. However, these processes are only as effective as the data they are built upon—making it crucial to establish a strong foundation for growth.
Employees also appreciate having technology that works. Cumbersome document management systems can be a drain on efficiency, impacting productivity and distracting students and staff from meaningful work. With a well-implemented document management system, staff can begin automating processes—such as student onboarding—allowing them to focus on what truly matters, engaging with students and ensuring they settle in.
Imagine a world where admissions teams no longer struggle with managing electronic signatures or distributing onboarding documentation. Lecturers, too, can automate aspects of grading and reduce time spent on document management, allowing them to prioritize teaching.
As AI and machine learning become more developed, universities will more clearly recognize the ROI of implementing a document management system, because they have the foundations on which to build. Content management systems are also good because staff can drive their own automation workflows through APIs and low-code applications — by leveraging ready-made templates and automation solutions from community- and vendor-driven marketplaces. This goes a long way in helping universities navigate the pressures they face today.
Of course, implementing a document management system requires an initial investment. However, these systems improve over time, and the reputational and financial risks associated with a serious cyberattack can be significantly reduced. Ultimately, universities can fund these improvements by reallocating savings from reduced manual processes and avoiding the costly consequences of a data breach.
The time to update was yesterdayUniversities can no longer afford to ignore document management, especially as competitors modernize and make better use of artificial intelligence and machine learning. These threats will only grow over time. By addressing these issues now, universities can save on costs, boost employee and student morale, and refocus on what truly matters: education.
We've compiled a list of the best OCR software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The long wait for id Software's Doom: The Dark Ages is finally over, as the Premium Edition, providing two days of early access, is now available - but if you're using any AMD-powered handheld gaming PC, it's probably best to steer clear for now.
As reported by our friends over at PC Gamer, Doom: The Dark Ages is unplayable on handheld gaming PCs, notably those using AMD's Ryzen Z1 chips, due to constant crashes. This is evident in the video provided by PC Gamer, which sees the game crash in a matter of seconds due to an AMD driver failure.
I can corroborate the same crashing issues; while booting into the game's campaign was all fine (on my Asus ROG Ally Z1 Extreme), it didn't take any longer than 10 seconds for the game to come to a crashing halt. This would result in either a black screen, with the game still audible in the background, or worse, artificating - however, the blame seemingly isn't on id Software and its new title.
(Image credit: ID Software)Since the game requires the latest AMD Adrenalin 25.5.1 graphics driver - which is the first prompt shown upon startup - the crashes are to be expected on these handhelds. And that points directly towards the issue; the Asus ROG Ally and the Lenovo Legion Go that use AMD's Ryzen Z1 Extreme processors are more often than not running on outdated graphics drivers.
This lack of driver support from Asus and Lenovo has been an ongoing issue since the launch of these handhelds, resulting in games that either can't be played at all, or suffer from frequent crashes, as they require newer drivers to function well.
I've seen this occur with games like Call of Duty: Black Ops 6 and The Last of Us Part 2 – the former tends to have driver crashes in the game's 'Zombies' mode, and the results can't be replicated on a desktop gaming PC that has access to the latest drivers. It's leaving some handheld gamers without a solution, as sideloading (manually installing newer drivers) doesn't always work - and can easily result in 'Code 43' errors, which I encountered numerous times.
This is one of the main reasons why my Asus ROG Ally is collecting dustIt's bad enough that Microsoft's Windows 11 and other applications like Armoury Crate have numerous bugs and slow responsiveness; throwing in the lack of driver support from handheld PC vendors literally stops users from playing certain games.
You could also argue that Doom: The Dark Ages is technically not even released yet (since it's early access), but these issues don't appear to stem from the PC port. This is a support issue, and one quick look at the latest graphics driver available on Asus' ROG Ally support page will show you that the latest driver at the time of writing was in February earlier this year.
I'm lucky enough to have a powerhouse gaming PC to dive into games with ease, but for those who bought a Ryzen Z1-powered handheld to be their primary gaming device this just isn't good enough. Sure, nothing is perfect, but devices that cost a lot should at the very least be supported in the long run.
You may also like...Diego Luna and Adria Arjona have revealed how long they've known about Andor season 2's incredibly bittersweet final scene.
Speaking to TechRadar ahead of season 2's launch in late April, the pair admitted that it's been a long time since they were first told about the Star Wars series' last scene.
In fact, it sounds like Luna and Arjona have been aware of its ending since development began on Andor's first season, so it's a secret they've had to keep for many years. And, as Arjona told me, holding onto that information for so long hasn't been easy.
Full spoilers immediately follow for Andor season 2 episode 12 and Rogue One: A Star Wars Story.
Hang on... is that Cassian's child?! (Image credit: Lucasfilm/Disney+)The final scene of Andor season 2 – and, with the Disney+ show ending after two seasons, the last one we'll ever see – reveals that Cassian and Bix, the characters that Luna and Arjona portray, have become parents.
After we watch Cassian and his android bestie K-2SO fly off to meet Galactic Empire informant Tivik on the Ring of Kafrene – a scene that directly leads into the events of 2016's Rogue One film – we're reunited with Bix on Mina-Rau. Viewers will remember this Outer Rim world as the place that Bix, Brasso, Wilmon, and B-2EMO fled to after Andor season 1's finale.
Meanwhile, in season 2 episode 9 we learn that Bix made the heart-breaking decision to leave Cassian so he could focus on helping the burgeoning Rebel Alliance topple the Empire. It's pleasing, then, that we're reunited with Arjona's fan-favorite character one final time before one of the best Disney+ shows ends.
Bix's difficult decision to leave Cassian in season 2 episode 9 makes complete sense now (Image credit: Lucasfilm/Disney+)What many fans might not have anticipated, though, is that Bix was pregnant when she left Cassian. Season 2's final scene not only confirms this because, well, Bix is cradling their child when we're reunited with her, but it also appears old enough for months to have passed since she gave birth. Each three-episode arc in season 2 takes place a year after their forebear, which is why Bix is a mom when we meet her again.
It's a big reveal, the bittersweetness of which is three-fold. For one, it's clear that Bix made the incredibly tough decision to leave Cassian to keep their baby safe. Then there's the fact that, if Cassian had learned that Bix was pregnant, he would have given up his role in the embryonic rebellion to enjoy a peaceful family life with Bix and his newborn.
The most tear-jerking part of all of this, though, is that Cassian never learns he's become a father. After helping the Rebel Alliance to acquire the Death Star plans on Scarif in Rogue One, Cassian dies when the Empire's now-operational, planet-killing superweapon destroys Scarif, i.e. the planet he and numerous other rebel fighters are unable to flee after the successfully steal the Death Star's blueprints.
#andor #AndorSeason2 #andorspoilers cassian died for a sunrise he never got to see. pic.twitter.com/QxTpUZX5CRMay 14, 2025
Armed with the knowledge that Cassian is survived by Bix and a child he didn't know he had, fans won't view Rogue One in the same light ever again. That's something Luna teased at length in the lead-up to season 2's arrival and, following episode 12's release, now we know why he was so insistent on Rogue One being a completely different viewing experience once everyone had finished watching Andor on one of the world's best streaming services.
"I knew [how season 2 would end]," Luna, who also serves as an executive producer on Andor, told me.
"From the beginning, we knew what the ending was going to be and we were always aiming for it. We all knew where we were going from the outset and, with this being a prequel to Rogue One, we understood the assignment. I think that's what makes this show different – we had an ending in mind, we stuck to it, and I hope it makes people re-watch Rogue One in with an entirely new perspective."
We knew what the ending was going to be and we were always aiming for it
Andor actor Diego Luna
As for Arjona's worries about slipping up and revealing Andor's official ending ahead of time, she said: "He [showrunner Tony Gilroy] told me pretty early on during season one's development. It was a big secret to keep and I'm not very good at keeping them – I get a little overexcited! But, I kept this one because it's so important to the story we wanted to tell.
"Tony gave me a very good idea of what season two's story was going to be when I initially signed onto the project," Arjona added. "Then, when he was writing season two, he told me it was going to end with that shot.
"Most showrunners or just people in the industry, they'll tell you something to get you sign up to something and then not follow through on that promise. But, everything Tony told me is exactly what happened and I'm very grateful for his honesty."
Andor seasons 1 and 2 are out now in their entirety on Disney+.
You might also likeAs a family tech expert, I’ve seen social media and tech companies do some pretty incredible things. But Google’s plan to roll out Gemini, its AI chatbot, to users under 13, is wild. They gave notice to parents in an email, but it felt much more like a warning than a warm invitation.
So, why are they doing this? No one’s really sure, although Google is simply just joining Instagram, Snapchat, and a whole host of other platforms in the race to bring AI to nearly every facet of our lives.
Children, though, are much more vulnerable than adults — especially when it comes to online interactions. Here are my top 5 concerns about Google’s recent and reckless decision in opening up Gemini to kids 13 and under.
1. It’s teaching kids to outsource thinking and creativity from a very early ageYoung kids need to be practicing writing, drawing, and critically thinking with their own minds — not using scraped words and images dredged up from the depths of the internet.
Chat GPT is already proving to be a breeding ground for cheating and shortcuts in schools. Giving younger kids instant access to Gemini will only accelerate this introduction to cutting corners when it comes to learning and being creative.
2. Misinformation is rife on the platformWhen an AI platform like Gemini provides completely wrong information, it’s called a “hallucination.” That’s a quaint way of saying “making things up that are total nonsense.”
Google even says in its FAQs about Gemini in the Family Link app that “[Hallucinations are] a strange term, but it basically just means that Gemini sometimes gets things wrong or says things that aren’t true. [They] can sound real, and Gemini might even say them confidently.”
For adults, these types of errors may be easy to recognize and ignore, like saying that the capital of France is Cairo. But for kids, they may not know when to double-check a simple answer — let alone something complicated or nuanced. This sort of defeats the purpose of having Gemini help with homework for children.
3. Inappropriate content can present dangers to kidsGemini can also act as a chatbot “friend” for kids, which presents multiple dangers. Other similar chatbots have been blamed for exposure to sexual content and even one child’s suicide.
Of course, Google has stated that the Gemini for kids will have safeguards, but there’s never a guarantee that inappropriate things won’t slip through the cracks — especially when these AI platforms regularly hallucinate.
Fortunately, apps like Bark can monitor your child’s saved photos, videos, and even text messages for inappropriate content they may save or share from Gemini.
4. Personal info that’s shared can be hackedSharing personal information — from sensitive emotional states to home addresses to personal photos — with an AI platform is vulnerable because everything can be hacked. If someone were to gain access to your child’s Gemini chats, it could be stressful and even dangerous.
Hate speech and bias can be conveyed in Gemini responsesThe way AI platforms like Gemini work is by scraping the totality of the internet for similar information — information that was written by other humans.
That means that human biases and viewpoints can be presented by Gemini as truth, which we now know isn’t even always true.
Because AI platforms provide answers based on information that humans created, it can mirror prejudices that exist in the data it’s fed with. This can include harmful positions about marginalized groups.
Final wordAt the end of the day, technology is just another tool that can make our lives easier, but it’s just that — a tool, not a necessity.
Even though calculators are used every day in advanced math, kids still learn how to count, add, subtract, multiply, and divide the old-school way in elementary school.
The same should go with AI platforms like Gemini when it comes to writing, thinking, and being creative.
Checkout our comprehensive list of the best AI tools.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
The modern IT landscape is growing more complex every day. It’s predicted that more than $5.61 trillion will be spent on IT this year as companies continually expand their estates.
This perpetual growth means that keeping track of everything within the IT infrastructure is becoming increasingly challenging and many organizations operate with significant blind spots in their networks.
This gives rise to the ‘unknown unknowns’ – devices that are unmonitored and unmanaged but can still access critical corporate assets. These are the most dangerous kinds of security gaps, creating vulnerabilities that cannot be closed because they are not even on the radar.
It’s time to get past any assumption that “what you can’t see won’t hurt you” – cyber attackers are specifically hunting for the hidden vulnerabilities that organizations overlook.
The problem with traditional IT asset managementThese security gaps aren’t typically the result of a lack of effort or investment, but a natural byproduct of IT and security teams either not having the right tools or not using their tools effectively. Some teams discover 15-30% more devices that were totally off their radar even though they have been conducting manual audits regularly.
Much of this false sense of security is the result of traditional tools that aren’t capable of seeing the big picture. Many agent-based scanners and on-premises security tools only give a narrow view and fail to detect all assets on the network. A device might appear to be secure through the metrics of one tool but actually lack critical controls when linked with other data across the system.
This is exacerbated by highly fragmented IT landscapes. Siloed teams and disconnected tools make it impossible to achieve a unified approach to security. Each team might believe they have control of what they can see, but their data doesn’t align. Without an easy way to correlate and compare data and processes, the dots won’t be connected.
Inefficient, manual-heavy processes also limit teams to conducting periodic audits. With IT environments evolving on a daily basis, these audits are outdated the moment they’re completed.
Why these gaps are the biggest security risksThe cracks in security visibility can appear in multiple forms. One of the most common issues is employees accessing corporate systems via unmanaged devices. This is particularly prevalent when Bring Your Own Device (BYOD) policies are combined with flexible working but without the controls to back it up. Many people are still accessing corporate data using home laptops that are completely outside of the IT department’s control. This situation means ignoring a threat sitting right on your network.
We also often find networks containing dormant or misconfigured assets that appear to be safe and compliant on the surface. Our data finds around 10% of devices lack essential cybersecurity controls, and 20% aren’t properly configured. In the worst case scenario, controls aren’t functioning at all.
Audit reports may also indicate that a system is offline, but it is actually still communicating with corporate networks and, therefore, still an active security risk.
These unseen and unsecured devices are highly vulnerable to cyberattacks, providing an opportunity for threat actors to gain a foothold in the network without triggering any security alerts. Compromising an unmonitored personal machine offers a cybercriminal an easy path in, enabling them to access sensitive information on the network and exploit channels like email for Account Takeover (ATO) attacks.
How organizations can close the visibility gapIf an organization doesn’t know an asset exists, it has no chance of securing it. So how do teams start finding and accounting for these dangerous unknown unknowns?
The first step is to equip IT and security teams with the right tools, along with the expertise and processes to use them. We often find companies have invested heavily in a full suite of solutions, but many of them aren’t being used effectively or may be unnecessary for the company’s needs.
This means that, even with these investments, they may not have a clear picture of the security health of their estate. It’s not about frequency, it’s about approach. To reliably find and close these gaps, security teams need both a complete view of their entire network and everything accessing it, and the assurance that this picture is completely accurate and up to date.
A Cyber Asset Attack Surface Management (CAASM) strategy is central to achieving this visibility and control. This takes a highly automated approach to asset discovery, building a list based on what is actually connected to the network and accessing systems, rather than an outdated inventory.
Once a clear and accurate picture of all assets has been established, it’s possible to start delving into how secure each device is. This means establishing if the right security controls are installed, whether they are actually functional, and if they have been properly configured. Proper validation is essential – it’s never enough to just assume controls are working.
From here, it’s crucial to keep up continuous, real-time monitoring for all assets. Again, automation is key as manually correlating IT asset data is impossible at scale. Automated tools can compare access logs with IT inventories in real-time and flag inconsistencies.
It’s also important to move away from device discovery alone and account for application access patterns. Security teams should have a clear view of what devices are accessing key applications and data so that they can spot anomalies such as access attempts from devices outside the managed asset list.
Eliminating the blind spots for goodSecurity frameworks like Cyber Essentials, ISO 27001 and NIST CSF can provide a good starting point for prioritizing security needs and improving visibility. However, organizations need to foster a culture where unidentified assets are proactively identified and secured. Even a single unmanaged device can open the door to a major breach, so detecting them must be embedded into daily operations, not treated as an annual or quarterly audit task.
The reality is that many organizations are unaware of the extent of their IT blind spots and have a chance of closing the gaps with their current capabilities. If you don’t have full visibility, you’re making security decisions based on incomplete data. It’s like locking your front door while leaving the windows wide open – and then pulling the blinds down so you can’t see the issue.
Check out the best IT asset management software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Sustainability isn’t a word most people associate with SaaS. Unlike sectors that rely heavily on physical infrastructure or global logistics, the software industry often escapes scrutiny when it comes to environmental impact.
With the carbon cost of digital activity rising, especially in the era of AI, that’s starting to change.
Since launching just over two years ago, EcoSend, an email marketing platform, has run entirely on renewable energy and serverless infrastructure. I spoke with the James Gill, the company’s founder and CEO, to understand what’s holding SaaS back from being truly sustainable, and what it will take for the industry to lead, not lag, in building a greener digital future.
What does being sustainable mean to an online business like yours? How do you gauge/monitor your sustainability?At EcoSend, sustainability isn’t just a buzzword or an afterthought. It is baked into our very DNA as a company.
Since we launched EcoSend just over two years ago, we have run our platform on fully renewable energy and the latest ‘serverless’ technology. Being ‘sustainable’ means that our planet has to be at the heart of every decision we make, and every corner of our product. Historically, SaaS businesses have avoided the level of scrutiny around sustainability which other industries have been exposed to.
Companies operating in hardware, transportation, supply chains etc have started adapting to more sustainable practices as a result of this scrutiny. We strongly believe that SaaS companies should adapt in the same manner, to actively lead us all towards a better future, rather than continuing to lag behind.
To help us monitor our commitment to sustainability, we don’t just rely on internal processes, but external accreditation and reporting. We are certified by ‘Green Small Business’, as well as members of the Good Business Charter, Pledge 1%, and Terra Carta. In addition to this, we are currently in the process of certifying as a B Corp.
As a SaaS provider, what are the biggest obstacles you've encountered in your journey towards being more eco-friendly?One of the greatest challenges we face is common to many businesses working in the sustainability space, and that is a lack of awareness. Few people are aware of the carbon cost of our digital activities, and yet if ‘The Internet’ were a country, it would be the fourth most polluting nation in the world.
Taking email specifically, over 360 billion emails are sent per day according to research by Statista. Each email can have a carbon cost of up to 26g. Yet few marketers are aware of the environmental impact of their campaigns. While many of us can understand the impact of boiling a kettle, the impact of digital activities like sending an email seems harder to wrap one’s head around.
So the first challenge is raising awareness. Secondary to that challenge is motivating change.
It is one thing for a company to be aware of the environmental impact of their online activity, but to motivate them to migrate their email service provider, data and campaigns is another.
We dedicate a lot of effort to making migration as easy as possible for companies, to help remove the inertia associated with changing software. This includes custom import tools and dedicated onboarding sessions with our support team to facilitate the process for companies who are keen to make the switch.
In an ideal world, what would it take to get publishers like us to report more on ecological credentials of SaaS providers?I believe a starting place would be better awareness of the scale of the challenge. Digital emissions often sit behind reporting on other high-emission activities, such as air travel. But the ‘invisibility’ of digital emissions should not mask its scale nor its impact.
With the recent, meteoric rise in AI, the impact of digital emissions will only continue to grow and be more keenly felt.
The ‘carrot’ motivation to SaaS companies to improve their sustainability credentials will only get us so far. But increased coverage by publishers in the digital sustainability sector will lead to increased regulation across the ecological credentials of SaaS companies. This will play an additional ‘stick’ factor in motivating companies to change to better practices and reporting. Both are required in order to facilitate change.
EcoSend has sustainability built at its core as its USP. How different is the make-up of your audience compared to your peers?We are fortunate to work with hundreds of dedicated B Corps, charities, and purpose-driven organizations, for whom the concepts of sustainability and holistic capitalism are ingrained in their core ethos.
Our clients are ambitious and determined to grow profitably, but the key difference is that this growth never comes at the expense of people or the planet.
Whether they are entrepreneurs, SMEs, or large corporations; we learn so much from our client’s efforts to drive forward digital sustainability, and we’re delighted to support them in their mission.
AI has been hailed as the solution to the sustainability conundrum and the destroyer of forests. What's your take on this?The rise of AI presents both threat and opportunity. The deciding factor will be in how AI is deployed. ChatGPT is currently estimated to use around 39.98 Million kWh per day. That’s more than the annual energy consumption of over 100 nations.
Frivolous usage of AI will only hurtle us further down a path we shouldn’t be on. That said, if we can consciously harness AI, we can use it to create a better future. Whether it’s automating complex ESG reports, evaluating the sustainability credentials of a large supply chain, or increasing the efficiency of corporations’ admin tasks; there is scope for AI to serve us, rather than contribute to our demise.
If the use of AI is both limited and conscious, then I believe it can be a solution to the sustainability challenge. Unfortunately, current trends seem to show the opposite is the case.
Where do you go from here? How do you get even more sustainable?We are currently in the process of certifying as a B Corp. The process to apply and maintain B Corp certification will ensure our company is held to B Corp’s high standards for ethical and sustainable business practices. Through this application, we will hold ourselves publicly accountable to ensure we ‘walk the walk’ of sustainability, ethics, and community across our company, software platform, and supply chain.
Beyond our B Corp application, we regularly review how to improve our sustainability credentials. These reviews have prompted us to take a more active role in our local community, through volunteering at food banks and conservation sites across London.
One example of ways we have evolved - we have always sent a gift to our Enterprise clients every Christmas. We switching from sending hampers to instead sending donations to Beam - an organization that supports people experiencing homelessness in the UK to find stable work and accommodation. We have so far sponsored over 50 clients via our partnership.
In addition, we recently added a new tree-planting partner to our ecosystem to improve the monitoring and reporting of where our clients’ trees are planted.
While we are proud of what we’re doing, we know the world needs more - more from us, and more from all businesses. We are excited to push ourselves to do ever more to protect our home planet and inspire others to follow.
You might also likeTalking about Daredevil: Born Again season two alongside Charlie Cox at the Disney Upfront presentation, Krysten Ritter has officially announced her return as Jessica Jones.
According to Variety, Ritter said, “It’s so great to be back… I’m so excited to bring back this iconic character, and without giving too much away, there is much more in store for Jessica Jones. This is going to be an incredible season!”
When Netflix canceled its Marvel TV series, and Disney Plus resurrecting some of the characters, it was probably just a matter of time before the Defenders found a new home.
Charlie Cox's Daredevil was the first – returning as "a really good lawyer" in 2021's Spider-Man: No Way Home, Vincent D’Onofrio's Kingpin appeared in Hawkeye and everyone was delighted to see the reintroduction of Jon Bernthal's The Punisher in season one of Daredevil: Born Again.
And now, it’s exciting to know that Ritter’s Jessica Jones will continue the fight alongside Daredevil after The Defenders ended on Netflix.
That said, we don’t know exactly what her role is going to be in season two. It could well be a small one, but Ritter hinting that there’s “much more in store” for her character lends gravity to this announcement. And, as we saw in The Defenders, the two characters align well, so it makes sense for the two to pair up again.
The nine-episode first season wrapped up in April on Disney Plus and we’re yet to find out when the second season will release – but here's everything we know about Daredevil: Born Again season two.
Why Jessica Jones' return is a smart move for Disney (Image credit: Netflix)While I'm excited to see the return of Jessica Jones, it also makes sense from a financial standpoint for Disney because it might well be cheaper. A series centered on a grounded investigator with super strength – but not Hulk-level strength – should be much cheaper to make than the stunt-heavy Daredevil.
Sure, Disney doesn't necessarily need to pinch pennies; however, Andor – which will complete its second and final season this week – was originally slated for four or five seasons and I find it hard to believe its reported $645 million cost had nothing to do with it.
I am, of course, speculating and we really don't know what the future holds for Jessica Jones, but Ritter is a great actor, and I personally rank Jessica Jones just behind The Punisher. Even my parents, who wouldn’t touch a Marvel movie with a 10-foot pole, enjoyed the latter when it was on Netflix.
If Disney can take lesser-known characters like Jessica Jones, get good actors to play them and create grittier, realistic stories with some superpowers sprinkled in, it could be a successful show that might cost closer to $100 million. Unlike The Acolyte, which despite a promising premise, suffered from weak writing and performances that held it back.
We don’t yet know if Mike Colter (Luke Cage) or Finn Jones (Iron Fist) will join the MCU in the future. I'd be interested to see how they'd play in these new-look series – but, for now, I’m excited to see my favorite alcohol-loving, super-strong detective back in action. Teaming up with Daredevil is just a bonus.
You might also like...I've spent a lot of time experimenting with ChatGPT’s Deep Research feature, and I've produced all kinds of strange (though comprehensive) reports. There's always been a notable gap in its functionality, though, until now. OpenAI has augmented the Deep Research feature with the ability to export your reports as fully formatted PDFs. No more ChatGPT links or screenshots necessary to share what I've learned about the Lake George monster.
It's a small interface upgrade, but one that feels like it should have been built into Deep Research from the beginning. Here’s how it works. You make your Deep Research report or pull up one from a while ago, then click on the share icon at the top of the page. You'll see that the usual 'share link' button now has a companion 'download as PDF' button. One click and your report will be a fully formed, citation-rich PDF in your downloads folder.
This export option isn't universally available at the moment. You'll need a subscription to ChatGPT Plus, Team, or Pro. Enterprise and Education users don’t have it yet, but OpenAI said it’s coming soon. That's good, as students and professionals are among those I would bet would use Deep Research the most.
Deep PDFYou can now export your deep research reports as well-formatted PDFs—complete with tables, images, linked citations, and sources.Just click the share icon and select 'Download as PDF.' It works for both new and past reports. pic.twitter.com/kecIR4tEneMay 12, 2025
With downloadable PDFs, you can finally do all the things you’d expect to do with your research. That might mean putting it with other research projects, sharing it with teammates, or just attaching it to an email as part of a bet you're going to win.
So yes, this is just a PDF button. But it’s a PDF button that fixes what used to be one of ChatGPT’s more frustrating aspects. Now, with downloadable PDFs, you can finally do all the things you’d expect to do with your research: archive it, share it with teammates, attach it to an email, or even – this is my new favorite – upload it to another AI.
Yes, really. With the PDF in hand, I popped it into Gemini’s NotebookLM, Google’s own experimental research assistant. Suddenly, the AI was summarizing my Deep Research report, making flashcards, and suggesting related reading. Then I tried uploading the same PDF into a podcast tool and got an AI-generated episode script out of it. Which means, in a roundabout way, ChatGPT just became a content pipeline. One that exports research and lets other tools remix it into whatever format you need.
And that’s a huge deal.
Because the more AI tools we use, the more we’re going to need bridges between them. OpenAI doesn’t need to be the everything app, but it does need to be interoperable. Giving users a PDF option is low-hanging fruit, sure, but it’s also the kind of fruit that lets you bake an entirely new pie. It makes Deep Research portable. It gives it legs. It means I don’t have to keep 14 tabs open just to reference a well-organized write-up on the history of Japanese vending machines.
Of course, OpenAI’s implementation still has quirks. It’s a little confusing that the “Download as PDF” option isn’t in the main chat share menu. Most people will assume it’s not there unless they know where to click. And for a company whose whole pitch is about reducing friction and increasing clarity, burying this behind a second share icon feels oddly off-brand. Still, I’ll take “slightly hidden but fully functional” over “completely missing” any day.
More importantly, this change signals something else: OpenAI is listening. Maybe not always quickly. Maybe not always intuitively. But enough people have clearly asked for this (or screamed about it on Reddit) that it finally happened. And in a product landscape where most updates feel like AI models arguing over who’s better at summarizing Aristotle, it’s refreshing to get a feature that solves a real-world problem.
You might also like