SpiralGA

Loading

  • May, Wed, 2025

Important Recall Notice for Ninja Foodi OP300-Series Units

If you own a Ninja Foodi, this update is critical. SharkNinja has issued a recall of 1.8 million Ninja Foodi OP300-series Pressure Cookers/Tendercrisp Air Fryers due to a safety hazard. The recall stems from reports that the pressure-cooking lid can be removed while the unit is still pressurized, potentially causing severe burns from the hot contents. This issue has been confirmed by SharkNinja and the U.S. Consumer Product Safety Commission (CPSC).

How to Check if Your Unit Is Affected
Inspect the rating label on the back of your Ninja Foodi for the model number. If your unit matches any of the following, it is part of the recall:

  • OP300
  • OP300C
  • OP301
  • OP301A
  • OP301C
  • OP302
  • OP302BRN
  • OP302HAQ
  • OP302HB
  • OP302HCN
  • OP302HW
  • OP305
  • OP305CO
  • OP305CCO
  • OP350CO

Where Were These Units Sold?
The affected products were sold in the U.S. and Canada between January 2019 and March 2025 at major retailers, including Amazon, Costco, Sam’s Club, Target, Walmart, and online platforms.

What Should You Do?
If your Ninja Foodi is part of the recall:

  1. Stop using the pressure-cooking function immediately. You may still use other settings, such as slow-cooking or steaming.
  2. Discard the current lid.
  3. Complete the replacement form to receive a free, updated lid that prevents accidental removal.

Contact SharkNinja for Assistance
For more details, reach out to SharkNinja via:

Your safety is our priority—act promptly to ensure safe use of your Ninja Foodi.

  • May, Wed, 2025

Zero Day

The latest network security breach involved a sophisticated cyberattack targeting a major cloud service provider, compromising sensitive customer data through a zero-day vulnerability in their authentication system. Attackers exploited the flaw to gain unauthorized access, leading to the exposure of personal information and financial records, prompting the company to issue emergency patches and advise users to update their credentials while emphasizing enhanced monitoring and collaboration with cybersecurity agencies to prevent future incidents.