Toggle light / dark theme

WhatsApp patches vulnerability exploited in zero-day attacks

WhatsApp has patched a security vulnerability in its iOS and macOS messaging clients that was exploited in targeted zero-day attacks.

The company says this zero-click flaw (tracked as CVE-2025–55177) affects WhatsApp for iOS prior to version 2.25.21.73, WhatsApp Business for iOS v2.25.21.78, and WhatsApp for Mac v2.25.21.78.

“Incomplete authorization of linked device synchronization messages in WhatsApp […] could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target’s device,” WhatsApp said in a Friday security advisory.

Microsoft says recent Windows update didn’t kill your SSD

Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and hard disk drives (HDDs).

Redmond first told BleepingComputer last week that it is aware of users reporting SSD failures after installing this month’s Windows 11 24H2 security update.

In a subsequent service alert seen by BleepingComputer, Redmond said that it was unable to reproduce the issue on up-to-date systems and began collecting user reports with additional details from those affected.

Google warns Salesloft breach impacted some Workspace accounts

Google now reports that the Salesloft Drift breach is larger than initially thought, warning that attackers also used stolen OAuth tokens to access a small number of Google Workspace email accounts in addition to stealing data from Salesforce instances.

Based on new information identified by GTIG, the scope of this compromise is not exclusive to the Salesforce integration with Salesloft Drift and impacts other integrations,’ warns Google.

We now advise all Salesloft Drift customers to treat any and all authentication tokens stored in or connected to the Drift platform as potentially compromised.

How to build larger, more reliable quantum computers, even with imperfect links between chips

While quantum computers are already being used for research in chemistry, material science, and data security, most are still too small to be useful for large-scale applications. A study led by researchers at the University of California, Riverside, now shows how “scalable” quantum architectures—systems made up of many small chips working together as one powerful unit—can be made.

Innsbruck develops new technique to improve multi-photon state generation

Quantum dots – semiconductor nanostructures that can emit single photons on demand – are considered among the most promising sources for photonic quantum computing.

However, every quantum dot is slightly different and may emit a slightly different color, according to a team at the University of Innsbruck, Austria, which has developed a technique to improve multi-photon state generation. The Innsbruck team states that, “the different forms of quantum dot means that, to produce multi-photon states we cannot use multiple quantum dots.”

Usually, researchers use a single quantum dot and multiplex the emission into different spatial and temporal modes, using a fast electro-optic modulator. But a contemporary technological challenge: faster electro-optic modulators are expensive and often require very customized engineering. To add to that, it may not be very efficient, which introduces unwanted losses in the system.

Nature Publishing: https://www.nature.com/articles/s41534-025-01083-0

Security wise: The team’s work combines years of research in quantum optics, semiconductor physics, and photonic engineering to open the door for next-generation quantum computers andunwanted losses in the system.

Communications. Here’s what you need to know. Securities IO: https://www.securities.io/passive-two-photon-quantum-dots-secure-communication


Researchers Demonstrate QuantumShield-BC Blockchain Framework

Researchers have developed QuantumShield-BC, a blockchain framework designed to resist attacks from quantum computers by integrating post-quantum cryptography (PQC) utilising algorithms such as Dilithium and SPHINCS+, quantum key distribution (QKD), and quantum Byzantine fault tolerance (Q-BFT) leveraging quantum random number generation (QRNG) for unbiased leader selection. The framework was tested on a controlled testbed with up to 100 nodes, demonstrating resistance to simulated quantum attacks and achieving fairness through QRNG-based consensus. An ablation study confirmed the contribution of each quantum component to overall security, although the QKD implementation was simulated and scalability to larger networks requires further investigation.

UK’s new defense system can hit tennis-ball-sized objects at Mach 2

UK’s new defense system can hit tennis-ball-sized objects traveling at Mach 2 speed.


The U.K. has made a significant effort to upgrade its missile defense power. The country is buying six new Land Ceptor air defense missile systems to bolster national security and defence.

Named Sky Sabre, the system delivers higher accuracy at the time of combat. It’a capable of hitting a tennis-ball sized object travelling twice the speed of sound.

The sophisticated system can also simultaneously control the flight of 24 missiles, guiding them each to intercept separate targets at once.

Microsoft: August Windows updates cause severe streaming issues

Microsoft has confirmed that the August 2025 security updates are causing severe lag and stuttering issues with NDI streaming software on some Windows 10 and Windows 11 systems.

This comes after widespread reports from users experiencing a wide range of performance problems when using various streaming apps, including OBS (Open Broadcast Software).

“Severe stuttering, lag, and choppy audio/video might occur when using NDI (Network Device Interface) for streaming or transferring audio/video feeds between PCs after installing the August 2025 Windows security update,” the company said in a new Windows release health update.

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of system compromise and data theft.

The exploit in question chains together CVE-2025–31324 and CVE-2025–42999 to bypass authentication and achieve remote code execution, SAP security company Onapsis said.

Unique fingerprints in 3D printing may foil adversaries

3D printing is a simple way to create custom tools, replacement pieces and other helpful objects, but it is also being used to create untraceable firearms, such as ghost guns, like the one implicated in the late 2024 killing of UnitedHealthcare CEO Brian Thompson.

Netanel Raviv, assistant professor of computer science & engineering in the McKelvey School of Engineering at Washington University in St. Louis, led a team from the departments of Computer Science & Engineering and Biomedical Engineering that has developed a way to create an embedded fingerprint in 3D-printed parts that would withstand the item being broken, allowing authorities to gain information for forensic investigation, such as the identity of the printer or the person who owns it and the time and place of printing.

The research will be presented at the USENIX Security Symposium Aug. 13–15, 2025, in Seattle. The first authors of the paper are Canran Wang and Jinweng Wang, who earned doctorates in computer science in 2024 and 2025, respectively. The research is published on the arXiv preprint server.

/* */