Austin Reaves likely looking at $30+ million a season in free agency next summer

Austin Reaves is on arguably the best contract in the NBA. The 20-point-a-game scorer last season for the Lakers will make $13.9 million — less than the full midlevel exception — this season, the third year of his four-year, $53.8 million contract.

Next summer, Reaves is expected to use his player option to become a free agent — and the man is going to get paid. Several executives told ESPN’s Tim Bontemps to expect a deal that averages more than $30 million a season.

I think he will get $30 [million] plus,” one executive told ESPN, echoing multiple front office sources who were asked about the next deal Reaves could command.

Those executives also echoed the idea that Reaves will re-sign with the Lakers — he is loyal, Los Angeles needs him as the No. 2 shot creator next to Luka Doncic, and he’s a fan favorite so the backlash of letting him walk would be ugly. Reaves’ ability to shoot the rock (37.7% on 3-pointers last season, 39.9% on catch-and-shoot attempts), play off the ball or on, makes him an ideal fit next to Doncic.

However, there are questions that this season is going to answer about Reaves and his fit with the team. One is the playoffs, where Reaves struggled against the athletic Timberwolves defense, scoring 16.2 points and 3.6 assists per game while shooting just 41.1% overall and 31.9% from beyond the arc — now he needs to prove that was a fluke. While he’s improved on that end, Reaves remains a minus defender, which is tough to put next to Doncic for long stretches (especially in the playoffs).

That said, look at the guards making around $30 million a season right now — Jalen Suggs, Tyler Herro, Jordan Poole, Dejounte Murray — and Reaves slots in nicely with that group. A deal in the four-year, $120 million range sounds about right.

If the Lakers don’t want to pay it, other teams will. But the Lakers will pay it. Expect Los Angeles and Reaves to work out a deal, although he could be a late official signing as the Lakers use their expected cap space (depending on what happens with LeBron James’ future with the team) to build out the roster they want around Doncic, then use their Bird rights to re-sign Reaves. That said, the deal will get done.

Could Tatum play this season? Celtics president gives interesting answer

Could Tatum play this season? Celtics president gives interesting answer originally appeared on NBC Sports Boston

When Jayson Tatum went down with a ruptured Achilles in Game 4 of the Eastern Conference semifinals in May, the expectation was that he’d likely miss the entire 2025-26 season.

That very well could be the case, especially as the Boston Celtics enter a “gap year” with lowered expectations after losing Jrue Holiday, Kristaps Porzingis, Luke Kornet and (likely) Al Horford this offseason.

But is there some chance Tatum turbo-charges his rehab to the point where he’s ready to play late in the 2025-26 season? And if he’s cleared to play, would the Celtics be willing to put him back in the lineup?

Team president Rich Gotham was posed that hypothetical Thursday at a groundbreaking event for an early childhood education center in Providence R.I. — and he didn’t exactly say no.

“That’s a down-the-road question. That’s one you can’t really answer today,” Gotham responded. “But what I know about JT is, he’s gonna do everything he can to put us in a position to make a decision.

“He’s gonna work hard to get back as soon as he can, and we’ll see how soon that is. But for right now, we’re not really looking at timetables.”

President of basketball operations Brad Stevens has insisted on multiple occasions that the Celtics aren’t putting a timetable on Tatum’s recovery. But that also means the team hasn’t ruled Tatum out for the 2025-26 season, as the Indiana Pacers did with Tyrese Haliburton shortly after he tore his Achilles in the NBA Finals.

And as long as Tatum isn’t officially ruled out, there will be speculation about a potential late-season return, especially given the way he’s attacking his rehab.

Tatum already was in the gym less than 50 days after his surgery and was filmed doing a pool workout without a cast over July 4 weekend. It appears he’s already ditched his walking boot and was walking without a noticeable limp at the Patriots’ training camp practice on Wednesday, as well as Thursday’s event in Providence.

NBA players typically have needed nine to 12 months to rehab from Achilles surgeries. Considering Tatum’s age (27) and work ethic, it wouldn’t be surprising if he’s closer to that nine-month timeline, which would be February 2026.

The bigger question is whether the Celtics would want him to return to action, especially if they’re not a legitimate playoff contender in his absence, which seems likely. But Gotham would caution any fan writing off this team before the season starts.

“You’re going to see a team out there working as hard as possible,” Gotham said, per Dalzell. “I don’t think it’s inconceivable that we will be a good team — a good winning team — next year. I’m not sure it’s going to be the step down that people anticipate.”

So, what if the Celtics are in the playoff hunt next spring and Tatum looks ready to return? It sounds like the Celtics would have a decision to make.

Warriors’ Moses Moody details how Kobe Bryant footage helped improve footwork

Warriors’ Moses Moody details how Kobe Bryant footage helped improve footwork originally appeared on NBC Sports Bay Area

Kobe Bryant has influenced plenty of young NBA players; Moses Moody is no exception.

The Warriors guard joined ‘The Young Man & the Three” podcast and discussed what change he’s made recently and improved on the most over the last year.

The 23-year-old said that while training with Dash Athletics (Jamal Dash Lovell) the intricacies of his footwork didn’t stick until he watched some of Bryant’s footage.

“Last year, working with Dash Athletics, he was sitting there, he was trying to like, get me to understand that for a while through the workout,” Moody said. “But I was recording every workout… I would go home and watch all of my drills and stuff and some reps felt better than others and I didn’t know why.

“And It didn’t really crack to me until me and Dash started watching some Kobe footage and Kobe was doing exactly what he was talking about. Then I went back and watched my footage and I realized that thing, that simplicity of that one step, or those steps, and being purposeful with my feet and that opened it up.”

Add Moody to the ever-growing list of young players that Bryant’s legacy continues to impact.

Download and follow the Dubs Talk Podcast

Draymond Green fueled awkward Steph Curry moment for star’s younger brother

Draymond Green fueled awkward Steph Curry moment for star’s younger brother originally appeared on NBC Sports Bay Area

Nobody is safe from Draymond Green’s trash talk, not even Steph Curry’s brother Seth.

The younger Curry, on the latest episode of his podcast, “Greatest Of Their Era,” was discussing with co-host Travonne Edwards and guest C.J. Watson the role of a journeyman NBA player, and shared a hilarious story about the time Green’s trash talk led to an awkward moment for his longtime teammate’s brother.

“I’m at the free throw line, and Draymond’s out there. We’re talking … I say something, and he’s like, ‘Why are you talking? You’re a journeyman. Every team in the league.’ It was funny because Steph was right there,” Seth Curry recalled. “It was kind of awkward.

“Draymond, that’s my guy, but he’s going to talk when we’re on the floor. But I’m talking back to him. I’m a journeyman, but I’m talking back to him like ‘That’s a badge of honor for me.’ How many guys do you know that’s been on two teams and out the league? I’d rather be on eight, nine teams, have a 12-year career, than be one-and-done. I take pride in it.”

The younger Curry went undrafted out of Duke in 2013 before signing with the Memphis Grizzlies ahead of the 2013-14 NBA season. Seth later played for the Cleveland Cavaliers that same season and since has played for seven additional teams (Phoenix, Sacramento, Dallas, Portland, Philadelphia, Brooklyn and Charlotte).

Simply put, he’s a journeyman.

And that’s something he takes great pride in, as he prepares to play in his 12th NBA season.

It’s unclear where Seth, currently a free agent, will play next season, but there reportedly is mutual interest between him and the Warriors.

If he were to join his brother in Golden State next season, it’s fair to assume he will be safe from Green’s trash talk … right?

Download and follow the Dubs Talk Podcast

Fantasy Baseball Waiver Wire: Prioritize hitters on both sides of this weekend’s Marlins-Braves series

This is a terrific weekend to stream starting pitchers in fantasy baseball, as there are several hurlers on the list at the bottom of this article who can be started with enthusiasm in most leagues. On the hitting side, the four-game series between the Marlins and Braves is one to target, and the Giants are facing the Nationals’ pitching staff at the right time.

Diamondbacks vs. Rockies: Although Arizona stripped some talent from its lineup at the trade deadline, there is still enough firepower to take advantage of the league’s worst pitching staff. Lourdes Gurriel Jr. (43%) is the most obvious player to add from this lineup, while Alek Thomas (1%) and Tyler Locklear (6%) also make sense in deeper formats.

Marlins @ Braves: On volume alone, hitters on the Marlins and Braves are worth streaming this weekend, as they are the only teams who will play four games in three days. The Braves have struggled to survive many rotation injuries, which makes Marlins hitters especially appealing. Otto Lopez (31%) is steady and productive, while rookie speedster Jakob Marsee (6%) has shown enough in his brief trial to create some fantasy buzz. Jurickson Profar (36%) is the top Atlanta hitter to add, and Drake Baldwin (18%) is a solid catcher streamer.

Tigers vs. Angels: The Tigers should reach base often this weekend when they face Kyle Hendricks (1.24 WHIP), Jack Kochanowicz (1.63 WHIP), Yusei Kikuchi (1.40 WHIP) and a bullpen with a 1.43 WHIP. With three eligible positions, Javier Báez (22%) is easy to fit into a lineup. The same can be said of Colt Keith (18%), who has swung a hot bat of late, as has outfielder Wenceel Pérez (5%).

Giants vs. Nationals: Washington’s pitching staff has endured an incredibly bad stretch of late, allowing 71 runs over seven games since July 29, and they may not have the talent to turn things around right away. Jung Hoo Lee (41%) should reach base often in this series, and Casey Schmitt (3%) could make an impact.

[Join or create a Yahoo Fantasy Football league for the 2025 NFL season]

Mets @ Brewers: The Brewers have pitched well during their summer surge, and this weekend they will roll out three starters who each have an ERA under 3.20. The Mets top-four hitters — Francisco Lindor, Juan Soto, Pete Alonso and Brandon Nimmo — are the only ones who warrant fantasy attention for this series.

Mariners vs. Rays: Runs may be hard to come by for both teams in this series, as five of the six starting pitchers have an ERA under 3.25. Junior Caminero is the only must-start player from the Rays, although Yandy Díaz and Brandon Lowe will stay in some lineups. The Mariners have a few players who will remain in lineups, including Cal Raleigh, Julio Rodriguez and Randy Arozarena, but they are likely to be less impactful than usual.

Blue Jays @ Dodgers: Toronto’s productive offense could stall for a few days when they are matched up with an effective trio of starters — Clayton Kershaw, Blake Snell and Yoshinobu Yamamoto. Vladimir Guerrero Jr. and Bo Bichette are the only Blue Jays who must remain active.

Rangers vs. Phillies: Christopher Sanchez, Zack Wheeler and Jesús Luzardo form an imposing trio of starters for the Rangers to face this weekend. Corey Seager and Wyatt Langford will stay in lineups but the rest of the Rangers belong on the bench.

[Smarter waivers, better trades, optimized lineups — Yahoo Fantasy Plus unlocks it all]

I nearly fell off my chair when I noticed that Rodriguez still isn’t rostered in over half of all leagues. The right-hander is one of the best relievers in baseball (1.51 ERA, 0.86 WHIP) and has been the Giants closer since Camilo Doval was traded to the Yankees a week ago. Rodríguez should earn a save when the Giants face the lowly Nats this weekend, and should be a top-10 closer for the remainder of the season.

Although many managers won’t think of White, he has an excellent chance to swipe a base while playing four games over three days. The outfielder has become a full-time player in a depleted lineup and has seven steals in 213 at-bats. He will enjoy facing Miami, which has allowed 17 more steals than any team.

In order, here are the best streamers for the weekend, with their start date and Yahoo! roster rate in brackets.

  • Slade Cecconi @ CWS (Sunday, 28%)

  • Logan Henderson vs. NYM (Saturday, 34%)

  • Adrian Houser @ SEA (Sunday, 33%)

  • Nick Martinez @ PIT (Saturday, 24%)

  • Eduardo Rodriguez vs. COL (Saturday, 15%)

  • Justin Verlander vs. WSH (Sunday, 24%)

  • Charlie Morton vs. LAA (Saturday, 27%)

  • J.T. Ginn @ BAL (Friday, 6%)

  • Luis Severino @ BAL (Sunday, 31%)

Packet Power EMX and EG

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.3
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Packet Power
  • Equipment: EMX, EG
  • Vulnerability: Missing Authentication for Critical Function

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to gain full access to the device without authentication.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Packet Power products are affected:

  • EMX: Versions prior to 4.1.0
  • EG: Versions prior to 4.1.0

3.2 VULNERABILITY OVERVIEW

3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions.

CVE-2025-8284 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-8284. A base score of 9.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER

Anthony Rose and Jacob Krasnov of BC Security reported this vulnerability to CISA.

4. MITIGATIONS

Packet Power recommends the following:

  • Update the affected products to version 4.1.0 or later.
  • Isolate devices whenever possible.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

  • August 7, 2025: Initial Publication

Johnson Controls FX80 and FX90

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.4
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Johnson Controls Inc.
  • Equipment: FX80 and FX90
  • Vulnerability: Dependency on Vulnerable Third-Party Component

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to compromise the device’s configuration files.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Johnson Controls products are affected:

  • FX80: FX 14.10.10
  • FX80: FX 14.14.1
  • FX90: FX 14.10.10
  • FX90: FX 14.14.1

3.2 VULNERABILITY OVERVIEW

3.2.1 DEPENDENCY ON VULNERABLE THIRD-PARTY COMPONENT CWE-1395

The affected product is vulnerable to a vulnerable third-party component, which could allow an attacker to compromise device configuration files.

CVE-2025-43867 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2025-43867. A base score of 8.4 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:H/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Commercial Facilities, Government Facilities, Transportation Systems, Energy
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Ireland

3.4 RESEARCHER

Johnson Controls reported this vulnerability to CISA.

4. MITIGATIONS

Johnson Controls recommends users update to the latest version. Successful exploitation of CVE-2025-43867 could trigger CVEs CVE-2025-3936 through CVE-2025-3945.

  • For systems running version 14.10.10, apply the 14.10.11 patch from the software portal.
  • For systems running version 14.14.1, apply the 14.14.2 patch from the software portal.
  • Note: FX 14.10.10 contains Niagara 4.10u10
  • Note: FX 14.14.1 contains Niagara 4.14u1

Login credentials are required to access the software portal.

For more detailed mitigation instructions, visit Johnson Controls Product Security Advisory JCI-PSA-2025-09 v1

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

  • August 7, 2025: Initial Publication

Delta Electronics DIAView

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.3
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Delta Electronics
  • Equipment: DIAView
  • Vulnerability: Improper Limitation of a Pathname to a Restricted Directory

2. RISK EVALUATION

Successful exploitation of this vulnerability may allow a remote attacker to read or write files on the affected device.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Delta Electronics reports the following versions of DIAView industrial automation management system for providing real-time system control are affected:

  • DIAView: Versions 4.2.0.0

3.2 VULNERABILITY OVERVIEW

3.2.1 Improper Limitation of a Pathname to a Restricted Directory CWE-22

Delta Electronics DIAView is vulnerable to a path traversal vulnerability, which may allow an attacker to read or write files remotely on the system.

CVE-2025-53417 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-53417. A base score of 9.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Chemical, Commercial Facilities, Critical Manufacturing, Energy, Transportation Systems, Water and Wastewater Systems
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Taiwan

3.4 RESEARCHER

hir0ot, working with Trend Micro Zero Day Initiative, reported this vulnerability to CISA.

4. MITIGATIONS

Delta Electronics recommends users update to DIAView v4.3.0 or later.

For more information, see Delta Electronics advisory Delta-PCSA-2025-00010.

Delta Electronics offers users the following general recommendations:

  • Do not click on untrusted Internet links or open unsolicited attachments in emails.
  • Avoid exposing control systems and equipment to the Internet.
  • Place control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use a secure access method, such as a virtual private network (VPN).

If you have any product-related support concerns, contact Delta via the portal page for any information or materials you may require.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

  • August 7, 2025: Initial Publication