Toggle light / dark theme

New ErrTraffic service enables ClickFix attacks via fake browser glitches

A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating ‘fake glitches’ on compromised websites to lure users into downloading payloads or following malicious instructions.

The platform promises conversion rates as high as 60% and can determine the target system to deliver compatible payloads.

ClickFix is a social engineering technique where targets are tricked into executing dangerous commands on their systems under believable pretenses, such as fixing technical problems or validating their identity.

US cybersecurity experts plead guilty to BlackCat ransomware attacks

Two former employees of cybersecurity incident response companies Sygnia and DigitalMint have pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.

33-year-old Ryan Clifford Goldberg of Watkinsville, Georgia (in federal custody since September 2023), and 28-year-old Kevin Tyler Martin of Roanoke, Texas, who were charged in November, have now pleaded guilty to conspiracy to obstruct commerce by extortion and are set to be sentenced on March 12, 2026, facing up to 20 years in prison each.

Together with a third accomplice, the two BlackCat ransomware affiliates breached the networks of multiple victims across the United States between May 2023 and November 2023, paying a 20% share of ransoms in exchange for access to BlackCat’s ransomware and extortion platform.

How do I make clear ice at home? A food scientist shares easy tips

When you splurge on a cocktail in a bar, the drink often comes with a slab of aesthetically pleasing, perfectly clear ice. The stuff looks much fancier than the slightly cloudy ice you get from your home freezer. How do they do this?

Clear ice is actually made from regular water—what’s different is the freezing process.

With a little help from science, you can make clear ice at home, and it’s not even that tricky. However, there are quite a few hacks on the internet that won’t work. Let’s dive into the physics and chemistry involved.

Hacker arrested for KMSAuto malware campaign with 2.8 million downloads

A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing malware disguised as the KMSAuto tool for illegally activating Windows and Office software.

The 29-year-old man was extradited from Georgia to South Korea following a related request under Interpol’s coordination.

According to the Korean National Police Agency, the suspect used KMSAuto to lure victims into downloading a malicious executable that scanned the clipboard for cryptocurrency addresses and replaced them with ones controlled by the attacker — known as ‘clipper malware’

Romanian energy provider hit by Gentlemen ransomware attack

A ransomware attack hit Oltenia Energy Complex (Complexul Energetic Oltenia), Romania’s largest coal-based energy producer, on the second day of Christmas, taking down its IT infrastructure.

The 40-year-old Romanian energy provider employs over 19,000 people, operates four power plants with an installed production capacity of 3,900 MWh, and provides about 30% of Romania’s electricity.

“As a result of the attack, some documents and files were encrypted, and several computer applications became temporarily unavailable, including ERP systems, document management applications, the company’s email service, and website,” it said over the weekend.

Quantum global race: “The word ‘secret’ no longer exists”

Please see this news story on a remarkable new technological cybersecurity breakthrough for mitigating the threats of Q-Day and AI:

#cybersecurity #quantum #tech


The next leap in technology: a quantum computer unlike anything humanity has seen, capable of breaking all encryption and challenging the most crucial national security defenses.
Tal Shenhav from i24NEWS Hebrew channel has the story.

Hacker claims to leak WIRED database with 2.3 million records

A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties.

On December 20, a threat actor using the name “Lovely” leaked the database on a hacking forum, offering access for approximately $2.30 in the site’s credits system. In the post, Lovely accused Condé Nast of ignoring vulnerability reports and claimed the company failed to take security seriously.

“Condé Nast does not care about the security of their users’ data. It took us an entire month to convince them to fix the vulnerabilities on their websites,” reads a post on a hacking forum.

Ancient Priests Hacked Consciousness With Sound

Let’s travel back in time. We are in Malta, deep beneath the earth, inside a chamber, where the only light is that of torches. We hear a low hum that reverberates through the stone walls. A priestess enters, chanting a mantra, resonating within the walls, and her voice echoes with unparallel precision, while rhythmic drumbeats pulse like a heartbeat. The participants are entranced, they feel their minds slip from this mundane world into realms of heightened awareness. Suddenly, visions of spirits, out-of-body journeys, and profound insights interfere with the very nature of reality. Do you think this is fantasy? Absolutely not. This is the essence of the ancient rituals where sound and vibration served as gateways to altered states of consciousness. As we go deep into the mysteries of sacred sounds, we will uncover how mantras and drums were instruments of rebellion against the illusions of the material world, where mystics challenged the tyrannical grip of false gods through transcendent practices.

In this fascinating exploration, we will travel through time and cultures, and we will examine the scientific and spiritual foundations of these auditory phenomena. We will move from the shamanic drums of indigenous tribes to the mantras of the Vedic sages and the hymnic invocations of ancient Greece. And we will find a common thread: the “sound”. The universal key to unlocking the mind’s hidden potentials. We’ll also venture into archaeoacoustics, the study of sound in ancient sites, and connect these old practices to modern research on binaural beats, revealing how vibration continues to bridge the ancient and the contemporary in our quest for cosmic liberation. And as usual, we keep reinventing ancient knowledge of thousands of years before us.

/* */