Apple updates AirTag with expanded range and improved findability

Apple has released a new version of its AirTag tracking accessory that extends its connectivity range and improves how items are located. The updated AirTag uses a second-generation Ultra Wideband chip, similar to the chip in the iPhone 17 lineup, to i… Continue reading Apple updates AirTag with expanded range and improved findability

Microsoft Entra ID will auto-enable passkey profiles, synced passkeys

Starting March 2026, Microsoft Entra ID will automatically enable passkey profiles and introduce support for synced passkeys. Passkey profiles move into general availability The update brings passkey profiles and synced passkeys into general availabili… Continue reading Microsoft Entra ID will auto-enable passkey profiles, synced passkeys

One-time SMS links that never expire can expose personal data for years

Online services often treat one-time links sent by text message as low-risk conveniences. A new study shows that these links can expose large amounts of personal data for years. Malicious URLs continue to shift from email to SMS According to to Proofpo… Continue reading One-time SMS links that never expire can expose personal data for years

Tesla, Sony, and Alpine systems compromised on day one of Pwn2Own Automotive 2026

Security researchers uncovered 37 previously unknown vulnerabilities on the opening day of Pwn2Own Automotive 2026, earning a combined $516,500 in prize money, according to results released by Trend Micro’s Zero Day Initiative. The Master of Pwn leader… Continue reading Tesla, Sony, and Alpine systems compromised on day one of Pwn2Own Automotive 2026

Exposed training apps are showing up in active cloud attacks

Security teams often spin up vulnerable applications for demos, training, or internal testing. A recent Pentera research report documents how those environments are being left exposed on the public internet and actively exploited. The research focuses … Continue reading Exposed training apps are showing up in active cloud attacks

A new framework helps banks sort urgent post-quantum crypto work from the rest

Financial institutions now have a concrete method for deciding where post-quantum cryptography belongs on their security roadmaps. New research coordinated by Europol sets out a scoring framework that helps banks rank systems and business use cases bas… Continue reading A new framework helps banks sort urgent post-quantum crypto work from the rest