Author: user
Three Chinese astronauts stranded in space for more than a week now have a safe way back to Earth after an unmanned “lifeboat” spacecraft is dispatched to pick them up in orbit at the Tiangong space station. However, the trio will not return home until the spring of 2026, when their original mission is scheduled to end.The rescue mission ended a nearly month-long drama that began when a piece of suspected space junk struck and damaged another return capsule hours before passengers departed from the space station, setting off a chain reaction of orbital strandings.The fiasco revealed potential flaws in…
Spotify plans to increase subscription prices in the US in the first quarter of next year, according to a new report in the Financial Times. This move marks the streaming service’s first price increase in the U.S. since July 2024. The company recently raised prices in several other countries, including the UK, Switzerland and Australia. Spotify subscriptions currently cost $11.99 per month in the US, compared to $9.99 per month when the service first launched in this country 14 years ago. JPMorgan analysts estimate that a $1 monthly price increase in the U.S. could add about $500 million to Spotify’s…
Cybersecurity researchers are warning of a new campaign that combines ClickFix lures with fake adult websites to trick users into running malicious commands under the guise of an “important” Windows security update. “The campaign utilizes fake adult websites (xHamster, a PornHub clone) as a phishing mechanism and is likely distributed via malvertising,” Acronis said in a new report shared with Hacker News. “The adult themes and possible connections to questionable websites increase the psychological pressure on victims to comply with the installation of sudden ‘security updates’.” ClickFix-style attacks have proliferated over the past year, typically using prompts for technical fixes…
Footage of a hungry wolf performing a complex sequence of actions on a British Columbia beach may mark the first time tools have been used on a wild canid.The wolf swam into deep water to retrieve a floating buoy attached to a submerged crab trap. Although the wolves could not see the crab traps, they seemed to know that the traps were there and how the human tools worked. Once back on shore, the wolf began winding a line that led to the trap, the scientists explained in a new research paper. Finally, when the trap emerged from the water,…
simple factsName: Sistema Ox Bel HaLocation: Quintana Roo, Yucatan Peninsula, MexicoCoordinates: 20.18507611995248, -87.49650948586978Why it’s unbelievable: This massive submerged cave system is one of the longest in the world and is home to many spectacular features and ruins.Sistema Ox Velha, which means “three channels” in the local Mayan language, is a vast submerged labyrinth that extends at least 326 miles (524 kilometers) underground, according to the Quintana Roo Aquifer System Research Center (CINDAQ). This makes it the longest submerged system in the world and the second-longest cave system, after the 426-mile-long (686 km) Mammoth Cave in Kentucky.According to a 2020 study,…
November 2025 marks 100 years since archaeologists first examined the mummified remains of Tutankhamun. What followed was not a scientific triumph, but a destruction. Howard Carter’s team used hot knives and violence to decapitate the pharaoh, mutilate his limbs, and sever his torso. Then they covered it up.Tutankhamun’s tomb was first discovered in the Valley of the Kings in November 1922 by a mostly Egyptian excavation team led by Howard Carter. However, it took several years for the excavation team to organize and catalog the tomb’s antechamber. This was the first part of what would become a 10-year excavation.Delays due…
November 25, 2025Ravi LakshmananMalware/vulnerabilities The attacker known as ToddyCat has been observed employing new methods to access corporate email data belonging to targeted companies, including using a custom tool called TCSectorCopy. “This attack allows the user’s browser to be used to obtain OAuth 2.0 authentication protocol tokens, which can be used to access corporate email outside the perimeter of the compromised infrastructure,” Kaspersky said in technical details. ToddyCat is believed to have been active since 2020 and has a track record of targeting various organizations in Europe and Asia using various tools, Samurai and TomBerBil, to maintain access and steal…
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to becoming a primary weapon, using it to scale attacks, automate reconnaissance, and create highly realistic social engineering campaigns. storm on the horizon Global instability and rapid technology advancements are forcing security teams to adapt not just their defensive technology, but their entire workforce approach. The average SOC already processes approximately 11,000 alerts each day, but the volume and sophistication of threats is accelerating. For business leaders, this has a direct impact on business continuity, regulatory compliance, and ultimately financials. SOCs that can’t keep…
New research from the Plymouth Marine Laboratory shows that pathogenic and antimicrobial-resistant bacteria are colonizing microplastics in the natural environment. Microplastics are plastic particles less than 5 mm in size and are very widespread pollutants. It is estimated that more than 125 trillion particles are accumulated in the ocean (from the earth’s surface to the ocean floor) and have been detected in soil, rivers, lakes, animals, and human bodies. An emerging concern associated with these substrates is the microbial communities that rapidly establish on particle surfaces and form complex biofilms known as “plastispheres.” These communities often include pathogenic (disease-causing) and…
November 25, 2025Ravi LakshmananMalware/Browser Security Cybersecurity researchers have revealed details of a new campaign that leverages Blender Foundation files to distribute an information theft tool known as StealC V2. “This ongoing operation, which has been active for at least six months, involves embedding malicious .blend files into platforms such as CGTrader,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. “Users unknowingly download these 3D model files, which are designed to run embedded Python scripts when opened in Blender, a free, open-source 3D creation suite.” The cybersecurity firm said this activity has similarities to previous campaigns…