• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Friday, July 25, 2025
Techcratic
No Result
View All Result
  • AI
    Artificial Intelligence

    Benefits of Using LiteLLM for Your LLM Apps

    Artificial Intelligence

    5 Fun Generative AI Projects for Absolute Beginners

    Artificial Intelligence

    Vibe Coding Something Useful with Repl.it

    Artificial Intelligence

    Use generative AI in Amazon Bedrock for enhanced recommendation generation in equipment…

    Artificial Intelligence

    The Lifecycle of Feature Engineering: From Raw Data to Model-Ready Inputs

    Artificial Intelligence

    Building End-to-End Data Pipelines: From Data Ingestion to Analysis

    Artificial Intelligence

    How Rapid7 automates vulnerability risk scores with ML pipelines using Amazon SageMaker AI

    Artificial Intelligence

    Build a conversational data assistant, Part 2 – Embedding generative business intelligence with Amazon Q in QuickSight

    Artificial Intelligence

    Enabling Differentially Private Federated Learning for Speech Recognition: Benchmarks, Adaptive Optimizers, and Gradient Clipping

  • Apple

    July 25, 2025 – Public betas are here

    Ted Lasso co-creator teases season 4 ‘self-reboot,’ Shrinking season 3 tidbits

    Ted Lasso’s return could bring three additional new seasons

    Blender confirms iPad Pro app with full touch and Pencil support

    Blender confirms iPad Pro app with full touch and Pencil support

    New M5 iPad Pro rumor hints at another Mac feature coming to iPad

    M5 iPad Pro: Four new features are coming later this year

    Apple announces new series ‘Pluribus’ from the creator of Breaking Bad, watch the teaser here

    Apple announces new series ‘Pluribus’ from the creator of Breaking Bad, watch the teaser here

    Dutch delays ruling on Apple dating app fees while EU negotiates

    Dutch delays ruling on Apple dating app fees while EU negotiates

    Your Mac is getting more iPad-like in macOS Tahoe, here’s how

    Your Mac is getting more iPad-like in macOS Tahoe, here’s how

    I’ve been testing macOS Tahoe for weeks, and these are the five features I can’t live without

    Apple’s public betas are here—and they’re nothing but trouble

    Apple Intelligence research papers on AI hallucinations

    Apple Intelligence research papers on AI hallucinations

  • ComputerWorld
    Leena AI unveils conversational AI ‘colleagues’ for the enterprise

    Leena AI unveils conversational AI ‘colleagues’ for the enterprise

    IT buyers are investing in AI PCs — with no clue how to use them

    IT buyers are investing in AI PCs — with no clue how to use them

    Apple wants to build a circular manufacturing economy

    Apple wants to build a circular manufacturing economy

    Trump gets aggressive with new US AI action plan

    Trump gets aggressive with new US AI action plan

    Clorox sues Cognizant for $380M over alleged helpdesk failures in cyberattack

    Clorox sues Cognizant for $380M over alleged helpdesk failures in cyberattack

    Kandji helps secure Apple enterprise with Vulnerability Response

    Kandji helps secure Apple enterprise with Vulnerability Response

    Alibaba rolls out new AI coding model Qwen3-Coder, says it’s their most powerful

    Alibaba rolls out new AI coding model Qwen3-Coder, says it’s their most powerful

    Microsoft will stop using Chinese workers on US DoD systems

    Microsoft will stop using Chinese workers on US DoD systems

    The first traces of GPT-5 have appeared

    The first traces of GPT-5 have appeared

  • Gaming
    What's REALLY Going On with GTA6's Online Mode

    What's REALLY Going On with GTA6's Online Mode

    God Of War Ragnarok PC Gameplay Walkthrough – Part 35

    God Of War Ragnarok PC Gameplay Walkthrough – Part 35

    Linus Torvalds has apparently met Bill Gates for the first time in person and before you ask, no he didn’t clock him in the face

    Asus says ‘all issues have been resolved’ regarding Armoury Crate, MyAsus, and router vulnerabilities, so I’d jump on those updates now if you were putting them off

    God Of War Ragnarok Review | Now Available on PC

    God Of War Ragnarok Review | Now Available on PC

    Groa's Secret Part 3 – God Of War Ragnarok Walkthrough

    Groa's Secret Part 3 – God Of War Ragnarok Walkthrough

    I don’t need 64 GB of RAM but I am tempted when prices are as low as they are right now for genuinely speedy sticks

    Wuchang: Fallen Feathers devs promise performance fixes are on the way, as it fights a flock of negative Steam reviews: ‘These problems should never have occurred’

    Review Forspoken #abenteuer   #action   #rollenspiel

    Review Forspoken #abenteuer #action #rollenspiel

    FNaF Trailers

    FNaF Trailers

    REDRAGON S101 GAMING KEYBOARD

    Asus’ RTX 5070 Ti-equipped ROG Zephyrus G14 gaming laptop is $350 off

  • Retro Rewind
    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

  • Tech Art
    Mixed Media in Minature – Dawn and Julia Create

    Mixed Media in Minature – Dawn and Julia Create

    Val Britton: Ghost Coast | Virtual Tour | Berggruen Gallery

    Val Britton: Ghost Coast | Virtual Tour | Berggruen Gallery

    Spontaneous Intuitive Sketchbook Painting: Mixed Media Art Part 1of 3

    Spontaneous Intuitive Sketchbook Painting: Mixed Media Art Part 1of 3

    Character Illustration with Texture in Affinity Designer – Digital Drawing

    Character Illustration with Texture in Affinity Designer – Digital Drawing

    Studio INI's interactive installation for Design You Can Feel will “move with your movement”

    Studio INI's interactive installation for Design You Can Feel will “move with your movement”

    Heidrun Rathgeb "I Watch the Mountains Changing Colour" @ Sea View, Los Angeles

    Heidrun Rathgeb "I Watch the Mountains Changing Colour" @ Sea View, Los Angeles

    [Download] Intuitive 3D Modeling | Abstract Sculpture |  Feathers | DANA KRYSTLE

    [Download] Intuitive 3D Modeling | Abstract Sculpture | Feathers | DANA KRYSTLE

    Generative Art: Keajaiban Dari Algoritma, Teknologi, Komputasi, AI dan Seni

    Generative Art: Keajaiban Dari Algoritma, Teknologi, Komputasi, AI dan Seni

    “The Temptation of Ivory | AI-Generated Fashion Lookbook in 4K” #aiart #ailookbook #aimodel #ai

    “The Temptation of Ivory | AI-Generated Fashion Lookbook in 4K” #aiart #ailookbook #aimodel #ai

  • Tech Deals
    Professor Puzzle: Unclaimed: The Mystery of The Royal Hotel – A Puzzle Adventure Game,…

    Professor Puzzle: Unclaimed: The Mystery of The Royal Hotel – A Puzzle Adventure Game,…

    Samsung HW-B750D/ZA 5.1 ch Soundbar w/ Dolby Audio, Surround Sound expansion, Bass…

    Samsung HW-B750D/ZA 5.1 ch Soundbar w/ Dolby Audio, Surround Sound expansion, Bass…

    Pioneer Photo Albums Bund Top Loading Page Protectors with White Inserts, 12 by 12-Inch,…

    Pioneer Photo Albums Bund Top Loading Page Protectors with White Inserts, 12 by 12-Inch,…

    Lenovo Laptop Computer for Business & Home, Intel 10-Core i7-13620H (Beat Ultra 7 255U),…

    Lenovo Laptop Computer for Business & Home, Intel 10-Core i7-13620H (Beat Ultra 7 255U),…

    Dell Touchscreen Laptop Computer, Inspiron 15 for College Home Study and Business, Intel…

    Dell Touchscreen Laptop Computer, Inspiron 15 for College Home Study and Business, Intel…

    Canon PGI-250/ CLI-251 5 Color Amazon Pack

    Canon PGI-250/ CLI-251 5 Color Amazon Pack

    Apple iPad 9.7′ with WiFi, 32GB, Space Gray – MP2F2LL/A (Renewed)

    Apple iPad 9.7′ with WiFi, 32GB, Space Gray – MP2F2LL/A (Renewed)

    Acer Nitro 23.8″ Full HD 1920 x 1080 PC Gaming IPS Monitor | AMD FreeSync Premium |…

    Acer Nitro 23.8″ Full HD 1920 x 1080 PC Gaming IPS Monitor | AMD FreeSync Premium |…

    Wii Fit Plus (Renewed)

    Wii Fit Plus (Renewed)

  • Techs Got To Eat
    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

  • Tesla
    REEVAA 2025 Tesla Model Y New (Juniper) Screen Protector [No Glare & Fingerprint], 9H…

    REEVAA 2025 Tesla Model Y New (Juniper) Screen Protector [No Glare & Fingerprint], 9H…

    Ziciner 3PCS Non-Slip Car Pedal Pads, Manual Gearbox Gas Pedal Brake Pedal Cover,…

    Ziciner 3PCS Non-Slip Car Pedal Pads, Manual Gearbox Gas Pedal Brake Pedal Cover,…

    Elon Musk says Tesla Robotaxi is coming to California, but no one other than shareholders believe him

    Tesla is about to launch ‘Robotaxi’ in Bay Area, but with someone in the driver’s seat

    WILDROAD Car Roof Cargo Basket Combo of Upgraded 64″x 39″x 4″ Roof Rack Cargo Basket…

    WILDROAD Car Roof Cargo Basket Combo of Upgraded 64″x 39″x 4″ Roof Rack Cargo Basket…

    Tesla Cybertruck Accessories Fingerprint Resistant Car Door Handles for 2024 Cyber Truck…

    Tesla Cybertruck Accessories Fingerprint Resistant Car Door Handles for 2024 Cyber Truck…

    Sunshade for Car Windshield,240T Thickened Windshield Sun Shade for Blocking 99%…

    Sunshade for Car Windshield,240T Thickened Windshield Sun Shade for Blocking 99%…

    Topfit for Tesla Model Y Trunk Mats Cargo Liner Waterproof Dog Car Seat Covers Protector…

    Topfit for Tesla Model Y Trunk Mats Cargo Liner Waterproof Dog Car Seat Covers Protector…

    3D Bug Remover – All Purpose Exterior Cleaner & Degreaser to Wipe Away Bugs on Plastic,…

    3D Bug Remover – All Purpose Exterior Cleaner & Degreaser to Wipe Away Bugs on Plastic,…

    Mixsuper Liner Car Cover for Tesla Cybertruck 2024-2026, 7 Layers Waterproof Car Cover…

    Mixsuper Liner Car Cover for Tesla Cybertruck 2024-2026, 7 Layers Waterproof Car Cover…

  • UFO
    The Enigma of the Black Knight Satellite

    The Enigma of the Black Knight Satellite

    UFO

    UFO

    Ambassadors from Earth: Pioneering Explorations with Unmanned Spacecraft (Outward Odyssey: A People’s History of Spaceflight)

    Ambassadors from Earth: Pioneering Explorations with Unmanned Spacecraft (Outward Odyssey: A People’s History of Spaceflight)

    UFO JATUH DI PESAWAHAN, WARGA HEBOH! #shortvideo

    UFO JATUH DI PESAWAHAN, WARGA HEBOH! #shortvideo

    Alienware 16 Area-51 Gaming Laptop – Ultra 9 275HX (24-Core, Up to 5.4GHz), GeForce RTX 5080, 16″ QHD+ 240Hz, 32GB DDR5, 1TB SSD, Backlit KB, 16GB GDDR7, Wins 11 Pro, Office License, w/DVD Drive

    Alienware 16 Area-51 Gaming Laptop – Ultra 9 275HX (24-Core, Up to 5.4GHz), GeForce RTX 5080, 16″ QHD+ 240Hz, 32GB DDR5, 1TB SSD, Backlit KB, 16GB GDDR7, Wins 11 Pro, Office License, w/DVD Drive

    Plan 9 From Outer Space

    Plan 9 From Outer Space

    Aliens Construct the 8th Wonder of the World | Ancient Aliens | #Shorts

    Aliens Construct the 8th Wonder of the World | Ancient Aliens | #Shorts

    SU WALKER – PSYCHIC, MEDICAL INTUITIVE, P'NTI / SASQUATCH CONTACTEE & ARTIST – Lon Strickler (Host)

    SU WALKER – PSYCHIC, MEDICAL INTUITIVE, P'NTI / SASQUATCH CONTACTEE & ARTIST – Lon Strickler (Host)

    NOOLA Hydration Backpack with 3L TPU Water Bladder, Tactical Molle Water Backpack for Men Women, Hydration Pack for Hiking, Biking, Running and Climbing

    NOOLA Hydration Backpack with 3L TPU Water Bladder, Tactical Molle Water Backpack for Men Women, Hydration Pack for Hiking, Biking, Running and Climbing

  • AI
    Artificial Intelligence

    Benefits of Using LiteLLM for Your LLM Apps

    Artificial Intelligence

    5 Fun Generative AI Projects for Absolute Beginners

    Artificial Intelligence

    Vibe Coding Something Useful with Repl.it

    Artificial Intelligence

    Use generative AI in Amazon Bedrock for enhanced recommendation generation in equipment…

    Artificial Intelligence

    The Lifecycle of Feature Engineering: From Raw Data to Model-Ready Inputs

    Artificial Intelligence

    Building End-to-End Data Pipelines: From Data Ingestion to Analysis

    Artificial Intelligence

    How Rapid7 automates vulnerability risk scores with ML pipelines using Amazon SageMaker AI

    Artificial Intelligence

    Build a conversational data assistant, Part 2 – Embedding generative business intelligence with Amazon Q in QuickSight

    Artificial Intelligence

    Enabling Differentially Private Federated Learning for Speech Recognition: Benchmarks, Adaptive Optimizers, and Gradient Clipping

  • Apple

    July 25, 2025 – Public betas are here

    Ted Lasso co-creator teases season 4 ‘self-reboot,’ Shrinking season 3 tidbits

    Ted Lasso’s return could bring three additional new seasons

    Blender confirms iPad Pro app with full touch and Pencil support

    Blender confirms iPad Pro app with full touch and Pencil support

    New M5 iPad Pro rumor hints at another Mac feature coming to iPad

    M5 iPad Pro: Four new features are coming later this year

    Apple announces new series ‘Pluribus’ from the creator of Breaking Bad, watch the teaser here

    Apple announces new series ‘Pluribus’ from the creator of Breaking Bad, watch the teaser here

    Dutch delays ruling on Apple dating app fees while EU negotiates

    Dutch delays ruling on Apple dating app fees while EU negotiates

    Your Mac is getting more iPad-like in macOS Tahoe, here’s how

    Your Mac is getting more iPad-like in macOS Tahoe, here’s how

    I’ve been testing macOS Tahoe for weeks, and these are the five features I can’t live without

    Apple’s public betas are here—and they’re nothing but trouble

    Apple Intelligence research papers on AI hallucinations

    Apple Intelligence research papers on AI hallucinations

  • ComputerWorld
    Leena AI unveils conversational AI ‘colleagues’ for the enterprise

    Leena AI unveils conversational AI ‘colleagues’ for the enterprise

    IT buyers are investing in AI PCs — with no clue how to use them

    IT buyers are investing in AI PCs — with no clue how to use them

    Apple wants to build a circular manufacturing economy

    Apple wants to build a circular manufacturing economy

    Trump gets aggressive with new US AI action plan

    Trump gets aggressive with new US AI action plan

    Clorox sues Cognizant for $380M over alleged helpdesk failures in cyberattack

    Clorox sues Cognizant for $380M over alleged helpdesk failures in cyberattack

    Kandji helps secure Apple enterprise with Vulnerability Response

    Kandji helps secure Apple enterprise with Vulnerability Response

    Alibaba rolls out new AI coding model Qwen3-Coder, says it’s their most powerful

    Alibaba rolls out new AI coding model Qwen3-Coder, says it’s their most powerful

    Microsoft will stop using Chinese workers on US DoD systems

    Microsoft will stop using Chinese workers on US DoD systems

    The first traces of GPT-5 have appeared

    The first traces of GPT-5 have appeared

  • Gaming
    What's REALLY Going On with GTA6's Online Mode

    What's REALLY Going On with GTA6's Online Mode

    God Of War Ragnarok PC Gameplay Walkthrough – Part 35

    God Of War Ragnarok PC Gameplay Walkthrough – Part 35

    Linus Torvalds has apparently met Bill Gates for the first time in person and before you ask, no he didn’t clock him in the face

    Asus says ‘all issues have been resolved’ regarding Armoury Crate, MyAsus, and router vulnerabilities, so I’d jump on those updates now if you were putting them off

    God Of War Ragnarok Review | Now Available on PC

    God Of War Ragnarok Review | Now Available on PC

    Groa's Secret Part 3 – God Of War Ragnarok Walkthrough

    Groa's Secret Part 3 – God Of War Ragnarok Walkthrough

    I don’t need 64 GB of RAM but I am tempted when prices are as low as they are right now for genuinely speedy sticks

    Wuchang: Fallen Feathers devs promise performance fixes are on the way, as it fights a flock of negative Steam reviews: ‘These problems should never have occurred’

    Review Forspoken #abenteuer   #action   #rollenspiel

    Review Forspoken #abenteuer #action #rollenspiel

    FNaF Trailers

    FNaF Trailers

    REDRAGON S101 GAMING KEYBOARD

    Asus’ RTX 5070 Ti-equipped ROG Zephyrus G14 gaming laptop is $350 off

  • Retro Rewind
    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

  • Tech Art
    Mixed Media in Minature – Dawn and Julia Create

    Mixed Media in Minature – Dawn and Julia Create

    Val Britton: Ghost Coast | Virtual Tour | Berggruen Gallery

    Val Britton: Ghost Coast | Virtual Tour | Berggruen Gallery

    Spontaneous Intuitive Sketchbook Painting: Mixed Media Art Part 1of 3

    Spontaneous Intuitive Sketchbook Painting: Mixed Media Art Part 1of 3

    Character Illustration with Texture in Affinity Designer – Digital Drawing

    Character Illustration with Texture in Affinity Designer – Digital Drawing

    Studio INI's interactive installation for Design You Can Feel will “move with your movement”

    Studio INI's interactive installation for Design You Can Feel will “move with your movement”

    Heidrun Rathgeb "I Watch the Mountains Changing Colour" @ Sea View, Los Angeles

    Heidrun Rathgeb "I Watch the Mountains Changing Colour" @ Sea View, Los Angeles

    [Download] Intuitive 3D Modeling | Abstract Sculpture |  Feathers | DANA KRYSTLE

    [Download] Intuitive 3D Modeling | Abstract Sculpture | Feathers | DANA KRYSTLE

    Generative Art: Keajaiban Dari Algoritma, Teknologi, Komputasi, AI dan Seni

    Generative Art: Keajaiban Dari Algoritma, Teknologi, Komputasi, AI dan Seni

    “The Temptation of Ivory | AI-Generated Fashion Lookbook in 4K” #aiart #ailookbook #aimodel #ai

    “The Temptation of Ivory | AI-Generated Fashion Lookbook in 4K” #aiart #ailookbook #aimodel #ai

  • Tech Deals
    Professor Puzzle: Unclaimed: The Mystery of The Royal Hotel – A Puzzle Adventure Game,…

    Professor Puzzle: Unclaimed: The Mystery of The Royal Hotel – A Puzzle Adventure Game,…

    Samsung HW-B750D/ZA 5.1 ch Soundbar w/ Dolby Audio, Surround Sound expansion, Bass…

    Samsung HW-B750D/ZA 5.1 ch Soundbar w/ Dolby Audio, Surround Sound expansion, Bass…

    Pioneer Photo Albums Bund Top Loading Page Protectors with White Inserts, 12 by 12-Inch,…

    Pioneer Photo Albums Bund Top Loading Page Protectors with White Inserts, 12 by 12-Inch,…

    Lenovo Laptop Computer for Business & Home, Intel 10-Core i7-13620H (Beat Ultra 7 255U),…

    Lenovo Laptop Computer for Business & Home, Intel 10-Core i7-13620H (Beat Ultra 7 255U),…

    Dell Touchscreen Laptop Computer, Inspiron 15 for College Home Study and Business, Intel…

    Dell Touchscreen Laptop Computer, Inspiron 15 for College Home Study and Business, Intel…

    Canon PGI-250/ CLI-251 5 Color Amazon Pack

    Canon PGI-250/ CLI-251 5 Color Amazon Pack

    Apple iPad 9.7′ with WiFi, 32GB, Space Gray – MP2F2LL/A (Renewed)

    Apple iPad 9.7′ with WiFi, 32GB, Space Gray – MP2F2LL/A (Renewed)

    Acer Nitro 23.8″ Full HD 1920 x 1080 PC Gaming IPS Monitor | AMD FreeSync Premium |…

    Acer Nitro 23.8″ Full HD 1920 x 1080 PC Gaming IPS Monitor | AMD FreeSync Premium |…

    Wii Fit Plus (Renewed)

    Wii Fit Plus (Renewed)

  • Techs Got To Eat
    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

  • Tesla
    REEVAA 2025 Tesla Model Y New (Juniper) Screen Protector [No Glare & Fingerprint], 9H…

    REEVAA 2025 Tesla Model Y New (Juniper) Screen Protector [No Glare & Fingerprint], 9H…

    Ziciner 3PCS Non-Slip Car Pedal Pads, Manual Gearbox Gas Pedal Brake Pedal Cover,…

    Ziciner 3PCS Non-Slip Car Pedal Pads, Manual Gearbox Gas Pedal Brake Pedal Cover,…

    Elon Musk says Tesla Robotaxi is coming to California, but no one other than shareholders believe him

    Tesla is about to launch ‘Robotaxi’ in Bay Area, but with someone in the driver’s seat

    WILDROAD Car Roof Cargo Basket Combo of Upgraded 64″x 39″x 4″ Roof Rack Cargo Basket…

    WILDROAD Car Roof Cargo Basket Combo of Upgraded 64″x 39″x 4″ Roof Rack Cargo Basket…

    Tesla Cybertruck Accessories Fingerprint Resistant Car Door Handles for 2024 Cyber Truck…

    Tesla Cybertruck Accessories Fingerprint Resistant Car Door Handles for 2024 Cyber Truck…

    Sunshade for Car Windshield,240T Thickened Windshield Sun Shade for Blocking 99%…

    Sunshade for Car Windshield,240T Thickened Windshield Sun Shade for Blocking 99%…

    Topfit for Tesla Model Y Trunk Mats Cargo Liner Waterproof Dog Car Seat Covers Protector…

    Topfit for Tesla Model Y Trunk Mats Cargo Liner Waterproof Dog Car Seat Covers Protector…

    3D Bug Remover – All Purpose Exterior Cleaner & Degreaser to Wipe Away Bugs on Plastic,…

    3D Bug Remover – All Purpose Exterior Cleaner & Degreaser to Wipe Away Bugs on Plastic,…

    Mixsuper Liner Car Cover for Tesla Cybertruck 2024-2026, 7 Layers Waterproof Car Cover…

    Mixsuper Liner Car Cover for Tesla Cybertruck 2024-2026, 7 Layers Waterproof Car Cover…

  • UFO
    The Enigma of the Black Knight Satellite

    The Enigma of the Black Knight Satellite

    UFO

    UFO

    Ambassadors from Earth: Pioneering Explorations with Unmanned Spacecraft (Outward Odyssey: A People’s History of Spaceflight)

    Ambassadors from Earth: Pioneering Explorations with Unmanned Spacecraft (Outward Odyssey: A People’s History of Spaceflight)

    UFO JATUH DI PESAWAHAN, WARGA HEBOH! #shortvideo

    UFO JATUH DI PESAWAHAN, WARGA HEBOH! #shortvideo

    Alienware 16 Area-51 Gaming Laptop – Ultra 9 275HX (24-Core, Up to 5.4GHz), GeForce RTX 5080, 16″ QHD+ 240Hz, 32GB DDR5, 1TB SSD, Backlit KB, 16GB GDDR7, Wins 11 Pro, Office License, w/DVD Drive

    Alienware 16 Area-51 Gaming Laptop – Ultra 9 275HX (24-Core, Up to 5.4GHz), GeForce RTX 5080, 16″ QHD+ 240Hz, 32GB DDR5, 1TB SSD, Backlit KB, 16GB GDDR7, Wins 11 Pro, Office License, w/DVD Drive

    Plan 9 From Outer Space

    Plan 9 From Outer Space

    Aliens Construct the 8th Wonder of the World | Ancient Aliens | #Shorts

    Aliens Construct the 8th Wonder of the World | Ancient Aliens | #Shorts

    SU WALKER – PSYCHIC, MEDICAL INTUITIVE, P'NTI / SASQUATCH CONTACTEE & ARTIST – Lon Strickler (Host)

    SU WALKER – PSYCHIC, MEDICAL INTUITIVE, P'NTI / SASQUATCH CONTACTEE & ARTIST – Lon Strickler (Host)

    NOOLA Hydration Backpack with 3L TPU Water Bladder, Tactical Molle Water Backpack for Men Women, Hydration Pack for Hiking, Biking, Running and Climbing

    NOOLA Hydration Backpack with 3L TPU Water Bladder, Tactical Molle Water Backpack for Men Women, Hydration Pack for Hiking, Biking, Running and Climbing

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

How a GraphQL Bug Resulted in Authentication Bypass

Hacker News by Hacker News
January 26, 2025
in Hacker News
Reading Time: 13 mins read
129
A A
0

Haoxi Tan
2024-07-29 17:00:00
www.hackerone.com

What Is an Authentication Bypass Vulnerability?

An authentication bypass vulnerability is a weakness in a system that fails to protect against unauthenticated access, allowing an attacker to bypass authentication entirely. There are many different attack vectors and vulnerabilities that lead to authentication bypass, such as SQL injection, insecure account recovery flows, or insecure use of cookies, but ultimately the impact is the same.

In this particular instance, the authentication bypass was enabled by an alternate channel: a GraphQL API with little to no access control, which exposed user creation and modification functionality.

Business Impact of Authentication Bypass

The business impact of authentication bypass is typically severe. Depending on the level of access the vulnerability allows one to gain access without authentication, sensitive data could be accessed and manipulated without any accountable audit trail as to who performed them. 

In the context of the bug discussed in this post, the impact would depend on how this promotional banner was implemented (via iframes or direct script loading). A malicious attacker may have abused this vulnerability to commit financial fraud, carry out social engineering attacks, redirect users to a different site, steal customer PII (Personally Identifiable Information), or deface the website, leading to financial, reputational, and regulatory consequences for the business.

Details: The Bug Report

The main e-commerce website had a promotion banner managed from a third-party integration, hosted on a separate subdomain but embedded on the main website. The third-party application had a GraphQL endpoint on which introspection was enabled, allowing full enumeration of all its endpoints and capabilities.

GraphQL introspection is a useful feature in development that exposes underlying schema via a query. This includes information such as the nodes and fields, their data types, and the queries and mutations that can be performed. It’s also very helpful to any potential attackers, as it allows them to thoroughly enumerate your GraphQL database and potentially perform dangerous actions.

An example introspection query fired from GraphQL Playground

A “mutation” is the GraphQL term for an operation that changes the “graph” (the underlying data). In this case, a mutation called Register was found by the researcher, and used to register a user account. Sensitive actions such as user registration should only be called from a backend, from a registration page well protected with measures such as anti-bot reCAPTCHA and email verification. Enabling a registration functionality from an API is not only dangerous to the application, but in this case, allows more sensitive actions to be taken in the GraphQL endpoint.

Finally, after finding and calling the CreateAdminUser mutation, the researcher was able to access even more functionality of the API, including modification of the banner content and details about the promotional products.

How Hackers Find Authentication Bypass Via GraphQL

GraphQL is a very popular technology, and it’s not uncommon to see it in use even if it’s not tagged as a technology you can filter programs by on HackerOne. So how and why do hackers find GraphQL Authentication Bypass vulnerabilities?

Q: What is it about GraphQL that makes you want to test it?

J. Francisco Bolivar: Being a bug hunter I am always on the lookout for new technologies that have not yet received much scrutiny from the security community. GraphQL, a newer API design paradigm, stands out because of its unique approach to data retrieval and queries. […] This capability also creates potential vulnerabilities such as DoS attacks through expensive queries or schema exposing introspection queries. Furthermore, since GraphQL is not as mature or widespread as REST, many implementations may lack robust security measures. Consequently, there exists a vast space for discovering unknown security flaws. My intention in testing GraphQL is to identify these gaps and contribute towards hardening this promising technology’s overall security posture.

 

Q: Immediately after you realize that GraphQL is being used, what’s your next step?

J. Francisco Bolivar: Once I realize that GraphQL is being used, my next step involves a series of reconnaissance and analysis actions to understand the structure, capabilities, and potential security weaknesses of the GraphQL implementation, Some of the steps I use to apply are:

  • Schema Introspection: Retrieve and examine the GraphQL schema, to grasp structure, types, queries, and mutations.
  • Sensitive Data Analysis: Looking for all sensitive fields that it might handle.
  • Query Complexity Testing: We want to make sure that the query complexity of our server is within certain limits and that its depth does not reach too deep so as to prevent potential resource exhausting attacks.
  • Authorization Checks: Try to access restricted data or carry out unauthorized operations to find out if there are any high-level authorization bypasses.
  • Input Validation Testing: Test input validation by sending crafted payloads that have been hand-crafted to fit the bill.
  • Error Message Analysis: Analyze error responses from Web Services in order to find out what kind of information leaks about the underlying infrastructure there may be.
  • Subscription Testing: If subscriptions are allowed, test for potential data leakage or unauthorized access while Real-Time data transmission is in use.

As Francisco Bolivar said, once the hacker finds the GraphQL endpoint, the first step is to enumerate any GraphQL endpoints for information about its schema. Note that queries can be sent both in the form of GET or POST requests. In a GET request, the query would be in a query parameter like this:

https://host/graphql?query=query{__typename}

In a POST request, it would be a request sent to https://host/graphql with the body:

If the target endpoint is indeed running GraphQL, it would respond with something like:

{“data”:{“__typename”:”Query”}}

To test if introspection is enabled, the hacker can send a basic introspection query:

query={__schema{types{name,fields{name,args{name,description,type{name,kind,ofType{name, kind}}}}}}}

If introspection is enabled, the hacker might paste the returned schema into GraphQL Voyager to visualize the entire graph and the relationships between different types and fields within them, as well as use tools like GraphQL Playground or Postman to see all the queries that can be made.

 

 

If introspection is not enabled, insights can still be gained into the schema by analyzing frontend Javascript source code, as the web application making requests to GraphQL endpoints need to know where and how to make them. Using the browser’s developer tools, an attacker may utilize the search functionality to search across all source code files on the site for keywords such as “graphql”, “query” and “mutation”.

 

Other ways to deduce schema information include brute-forcing and inspecting background HTTP traffic. A Burp extension called GraphQuail automatically analyzes traffic to GraphQL endpoints in Burp live proxy traffic to build a schema file, and it will emulate a GraphiQL or Voyager interface within the target website using an identifier added after the target endpoint.

 

 

If the hacker is not getting enough traffic, or doesn’t have a frontend website to get legitimate GraphQL queries, they may use a tool called clairvoyance which can brute force potential types in a wordlist, and analyze error messages from GraphQL servers to guess the schema since they can leak names through typo guessing:

While enumerating the schema, the attacker will look for authentication-related mutations that can be performed, such as registration of users, resetting passwords, changing user details (like email), or access permissions (like whether the user is an admin).

Furthermore, they’ll likely try to query fields belonging to users that might be sensitive to authentication-related information, such as auth tokens, passwords and MFA secrets that could aid in authentication bypass. During this process, they’ll also check for other vulnerabilities commonly present in GraphQL APIs, such as IDORs (Insecure Direct Object References), leaking of sensitive PII, and broken access control. 

So there are lots of vulnerabilities in GraphQL systems ripe for finding. But why are auth bypasses a common impact of GraphQL bugs? We asked Francisco Bolivar:

Q: Why is it common for GraphQL bugs to result in auth bypasses?

J. Francisco Bolivar: One often encounters authorization bypasses in GraphQL bugs, because of its query language and schema design which are both flexible and complex. A number of variables explain this:

  • Field-Level Granularity: The client is allowed to request particular data fields and nested data from GraphQl within a single query. In such circumstances, not all fields and types undergo equal authentication checks. An ineffective access control logic may determine permissions at a higher level than it can enforce by field or nested objects, accidentally allowing access to sensitive information.
  • Complex Schema Structures: GraphQL schemas can be quite complicated with deep nesting of types and relationships. This makes the implementation and maintenance of comprehensive access control rules more prone to oversight thereby resulting in chances of authorisation gaps.
  • Introspection Queries: GraphQL supports introspection queries that clients can use to discover the schema by default. Introspections when lacking proper security measures may help attackers find out about hidden fields, types and operations hence giving them valuable information they need to form queries that dodge checking authorizations.

How Can You Avoid GraphQL-Related Bugs in Your Applications?

Disabling GraphQL introspection definitely reduces an attacker’s visibility into your application, but there’s a game of balance here: if you have a bug bounty program, it may be beneficial to leave it on for testing or staging environments that researchers have access to so that they can quickly find critical issues such as authentication bypass and address the root causes. On the other hand, if you only make your production environment available to bug bounty hackers, then you should turn introspection off to minimize risk.

As for protecting against discovering the GraphQL schema via leaking correct types from suggestions in validation error messages, it’s currently not a first-class configuration feature in Apollo (which is one of the most popular GraphQL servers), but there’s a workaround using the formatError handler where you can string match for “Did you mean” and change the error message to something more generic.

The root cause of these types of vulnerabilities are, however, not GraphQL introspection, but the broken access control that allowed unauthenticated users to escalate privileges through sensitive mutations which they shouldn’t be allowed to call. To address this root cause, authorization must be explicitly specified for each query and mutation in the schema, with the appropriate permission levels (for example, a normal user should not be able to call the CreateAdminUser mutation). The most secure code is code that does not exist: extraneous functionality such as CreateAdminUser should not even exist if it’s not needed – the same goes with any other queries and mutations in a large GraphQL database.

Conclusion

With the rising popularity of GraphQL in web applications, it is essential to secure authentication and authorization correctly in GraphQL API, lest it becomes a path for attackers to bypass authentication and escalate privileges. With its large attack surface, GraphQL APIs should be constantly audited to lock down security permissions and remove unnecessary functionality. Fortunately, this severe vulnerability was found and reported via HackerOne’s bug bounty program and fixed within a matter of days. 

This bug was found during the 2023 HackerOne Ambassador World Cup (AWC), an eight-month-long, competition-driven way to build community engagement, collaboration, and ambassador brand awareness throughout the hacker community. We have some words from Francisco Bolivar about his own experience at the AWC:

Q: What do you like about participating in the Ambassador World Cup?

J. Francisco Bolivar: Participating in the Ambassador World Cup was one of the best experiences I had. It’s the most important bug bounty competition, and I’m proud to have won it with my team, Spain. The experience allows me to connect with a global community, challenge and enhance my skills, and engage in meaningful cultural exchanges. Winning the Best Bug prize for AS Watson adds to my pride and highlights the significant impact of our work.

The 2024 AWC is currently taking place! The AWC, led by HackerOne Brand Ambassadors, allows teams of hackers worldwide to identify impactful vulnerabilities in participating customer programs. Reach out to your customer success manager to learn more about how your program can engage in the 2024 tournament!

Secure Your Web Application From Authentication Bypass With HackerOne

The advantage of having a bug bounty program is that hackers from our community constantly test your new applications, domains, and API endpoints as soon as they go live. HackerOne and our community of ethical hackers are best equipped to help organizations identify and remediate Authentication Bypass and other vulnerabilities, whether through bug bounty, Pentest as a Service (PTaaS), Code Security Audit, or other solutions by considering the attacker’s mindset on discovering a vulnerability.

Download the 7th Annual Hacker Powered Security Report to learn more about the impact of the top 10 HackerOne vulnerabilities, or contact HackerOne to get started taking on Authentication Bypass vulnerabilities at your organization.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Unlock unlimited streaming with a free Amazon Prime trial!
Sign up today!

Help Power Techcratic’s Future – Scan To Support

If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.

As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!

BITCOIN

Bitcoin Logo

Bitcoin QR Code

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Scan the QR code with your crypto wallet app

DOGECOIN

Dogecoin Logo

Dogecoin QR Code

D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA

Scan the QR code with your crypto wallet app

ETHEREUM

Ethereum Logo

Ethereum QR Code

0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a

Scan the QR code with your crypto wallet app

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162Share28ShareShare4ShareTweet101
Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

Neon Now Runs in VS Code
Hacker News

Neon Now Runs in VS Code

July 25, 2025
1.3k
Tridium Niagara Framework Flaws Expose Sensitive Network Data
Hacker News

Tridium Niagara Framework Flaws Expose Sensitive Network Data

July 25, 2025
1.3k
Who has the fastest F1 website in 2021? Part 3
Hacker News

Who has the fastest F1 website in 2021? Part 3

July 25, 2025
1.3k
neiltron/apple-health-mcp: MCP server for querying Apple Health data with natural language and SQL
Hacker News

neiltron/apple-health-mcp: MCP server for querying Apple Health data with natural language and SQL

July 25, 2025
1.3k
New VoIP Botnet Targets Routers Using Default Passwords
Hacker News

New VoIP Botnet Targets Routers Using Default Passwords

July 25, 2025
1.3k
Multiple Hacker Groups Exploit SharePoint 0-Day Vulnerability in the Wild
Hacker News

Multiple Hacker Groups Exploit SharePoint 0-Day Vulnerability in the Wild

July 25, 2025
1.3k
Celebrating 20 years of MDN
Hacker News

Celebrating 20 years of MDN

July 25, 2025
1.3k
Low-Temp 2D Semiconductors: A Chipmaking Shift
Hacker News

Low-Temp 2D Semiconductors: A Chipmaking Shift

July 24, 2025
1.3k
Load More
Next Post
Smartphone

Samsung Galaxy S25 series arrives, Week 4 in review

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Senior DB2 z/OS, Systems Database Administrator

OpenAI’s most capable AI model, GPT-5, may be coming in August

Reminder: You Can Get Apple Products Tax-Free in 10 States

Tesla Doesn’t Need Permits For Their CA “Robotaxi,” It May Come Today

Clever DIYer Turns Old Memory Chips Into a CPU

Professor Puzzle: Unclaimed: The Mystery of The Royal Hotel – A Puzzle Adventure Game,…

Techcratic – Your All In One Tech Hub
© 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired