Hacker-City
Hacker-City
Get the brief

Technology

Latest stories, analysis, and insights from the world of technology.

Apple eyes iPhone growth in first earnings report since Tim Cook's announced exit

Apple reports fiscal second-quarter earnings, marking its first earnings call since announcing Tim Cook will step down as CEO after 15 years. Analysts expect 20% iPhone sales growth and are watching for commentary from incoming CEO John Ternus on the company's AI strategy.

April 30, 20263 min
AppleiPhoneearnings

Brazilian DDoS Protection Firm Unwittingly Enabled Massive Botnet Attacks

A Brazilian cybersecurity company specializing in DDoS protection was compromised and used to launch large-scale attacks against other Brazilian ISPs through a botnet exploiting TP-Link router vulnerabilities.

April 30, 20265 min
DDoSbotnetMirai

New Bluekit phishing service includes an AI assistant, 40 templates

A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts.

April 30, 20262 min
AIartificial intelligencephishing

How AstraZeneca's 17,000 AI-certified employees are helping it reach a 'stretch goal' of $80 billion in revenue

The biopharmaceutical giant has certified over 17,000 employees in AI competencies as part of its strategy to nearly double in size by 2030, with CFO Aradhana Sarin highlighting how finance helps prioritize among 1,000 active AI pilots.

April 30, 20264 min
AstraZenecaAI certificationpharmaceutical

How to win — and lose — Decoder

Nilay Patel joins as a guest to discuss The Verge's AI coverage, controversial episodes, and what it takes to succeed or fail on the Decoder podcast, including reactions to the contentious Superhuman CEO interview.

April 30, 20266 min
podcastdecoderAI

New Linux 'Copy Fail' flaw gives hackers root on major distros

A new local privilege escalation vulnerability dubbed 'Copy Fail' (CVE-2026-31431) allows unprivileged attackers to gain root permissions on Linux distributions using kernels released since 2017.

April 30, 20263 min
Linuxvulnerabilityprivilege escalation

Oracle Red Bull Racing Team Revs Up Automation to Boost Security

While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security through automation and identity management tools.

April 30, 20264 min
Formula 1Red Bull Racingidentity management

Spotify introduces verified artist badges to help distinguish humans from AI

As AI-generated artists and tracks flood music streaming platforms, Spotify is rolling out a new "Verified by Spotify" badge to help listeners more easily identify authentic human artists.

April 30, 20262 min
SpotifyAImusic streaming

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Cybersecurity researchers have discovered a new malware campaign where EtherRAT is being distributed through fake GitHub repositories that mimic legitimate administrative tools.

April 30, 20261 min
EtherRATmalwareGitHub

Instagram says it doesn't want your tweet round ups

The platform is cracking down on content that is reuploaded by someone other than the original creator. A whole lot of accounts could be on the chopping block.

April 30, 20262 min
InstagramMetasocial media

Meta says its business AI now facilitates 10 million conversations a week

Meta's business AI tools have grown from 1 million conversations per week at the beginning of 2026 to 10 million by late March, as the company expands its beta program globally and hints at future monetization.

April 30, 20262 min
Metaartificial intelligencebusiness AI

Sony Confirms One-Time Online License Check for Digital PlayStation Games

Sony has clarified that digital PS4 and PS5 games purchased after March 2026 require a one-time online license verification to confirm ownership, addressing concerns about new DRM measures and refund fraud prevention.

April 30, 20262 min
SonyPlayStationPS4

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

Security researchers have discovered a new Python-based backdoor that leverages tunneling services to steal sensitive browser and cloud credentials from compromised systems.

April 30, 20261 min
pythonbackdoormalware

Musk v. Altman: Elon Musk says he was a "fool" for backing OpenAI, accusing Altman and Brockman of manipulation

Billionaire Elon Musk testified in court that he was manipulated by OpenAI co-founders Sam Altman and Greg Brockman into donating tens of millions of dollars, claiming Altman wasn't honest about the nonprofit mission.

April 30, 20262 min
Elon MuskOpenAISam Altman

Goal Zero Yeti 1500 Power Station Review: Rugged Portable Power for Off-Grid Adventures

The latest Goal Zero Yeti 1500 power station features a durable aluminum construction, LiFePO4 battery rated for 4,000 cycles, and 2,000W inverter - making it ideal for overlanding and off-grid setups despite its premium pricing.

April 30, 20265 min
power stationportable batteryoff-grid

Musk v. Altman: Elon Musk says he was a 'fool' for backing OpenAI, accusing Altman and Brockman of manipulation

Billionaire Elon Musk testified he was manipulated into donating tens of millions to OpenAI, claiming co-founder Sam Altman wasn't honest about the nonprofit mission during the second day of their high-profile trial.

April 30, 20262 min
Elon MuskSam AltmanOpenAI

Meta in row after workers who say they saw smart glasses users having sex lose jobs

Meta faces pressure to explain why it cancelled a major contract with Sama shortly after Kenya-based workers alleged they had to view graphic content captured by Meta smart glasses, including footage of users going to the toilet and having sex.

April 30, 20265 min
MetaAIsmart glasses

EufyMake E1 UV Printer Review: High-Quality Surface Printing at a Premium Price

The EufyMake E1 from Anker uses UV light to print 3D textures onto various surfaces like ceramic, metal, and wood, delivering store-quality results but requiring significant space, ventilation, and ongoing costs.

April 30, 20264 min
3D printingUV printingAnker

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation, including vulnerabilities in Samsung MagicINFO, SimpleHelp, and D-Link products.

April 30, 20261 min
CISAvulnerabilitiescybersecurity

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A newly discovered Linux vulnerability dubbed 'Copy Fail' allows attackers to gain root access on major distributions, posing significant security risks to enterprise and personal systems.

April 30, 20261 min
linuxvulnerabilitycybersecurity
PreviousPage 2 of 41Next