Toggle light / dark theme

Shop-bought cable helps power two quantum networks

For decades, physicists have dreamed of a quantum internet: a planetary web of ultrasecure communications and super-powered computation built not from electrical signals, but from the ghostly connections between particles of light.

Now, scientists in Edinburgh say they’ve taken a major step toward turning that vision into something real.

Researchers at Heriot-Watt University have unveiled a prototype quantum network that links two smaller networks into one reconfigurable, eight-user system capable of routing and even teleporting entanglement on demand.

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

That’s not all. Since the attack plays out via the web browser, it’s also a cross-platform threat. This essentially turns any browser application on any platform that subscribes to the malicious notifications to be enlisted to the pool of clients, giving adversaries a persistent communication channel.

Matrix Push C2 is offered as a malware-as-a-service (MaaS) kit to other threat actors. It’s sold directly through crimeware channels, typically via Telegram and cybercrime forums, under a tiered subscription model: about $150 for one month, $405 for three months, $765 for six months, and $1,500 for a full year.

“Payments are accepted in cryptocurrency, and buyers communicate directly with the operator for access,” Dr. Darren Williams, founder and CEO of BlackFog, told The Hacker News. “Matrix Push was first observed at the beginning of October and has been active since then. There’s no evidence of older versions, earlier branding, or long-standing infrastructure. Everything indicates this is a newly launched kit.”

Microsoft to remove WINS support after Windows Server 2025

Microsoft has warned IT administrators to prepare for the removal of Windows Internet Name Service (WINS) from Windows Server releases starting in November 2034.

The legacy WINS computer name registration and resolution service has been deprecated with the release of Windows Server 2022 in August 2021, when Microsoft stopped active development and working on new features.

Windows Server 2025 will be the final Long-Term Servicing Channel release to come with WINS support, with the feature to be removed from future releases.

How the French philosopher Jean Baudrillard predicted today’s AI 30 years before ChatGPT

One of the most important members of this enlightened club is the philosopher Jean Baudrillard – even though his reputation over the past couple of decades has diminished to an association with a now bygone era when fellow French theorists such as Roland Barthes and Jacques Derrida reigned supreme.

In writing our new biography of Baudrillard, however, we have been reminded just how prescient his predictions about modern technology and its effects have turned out to be. Especially insightful is his understanding of digital culture and AI – presented over 30 years before the launch of ChatGPT.

Back in the 1980s, cutting-edge communication technology involved devices which seem obsolete to us now: answering machines, fax machines, and (in France) Minitel, an interactive online service that predated the internet. But Baudrillard’s genius lay in foreseeing what these relatively rudimentary devices suggested about likely future uses of technology.

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil.

“It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to update its C2 server,” Trustwave SpiderLabs researchers Nathaniel Morales, John Basmayor, and Nikita Kazymirskyi said in a technical breakdown of the campaign shared with The Hacker News.

It is distributed through a WhatsApp worm campaign, with the actor now deploying a Python script, a shift from previous PowerShell-based scripts to hijack WhatsApp and spread malicious attachments.

Google Search is now using AI to create interactive UI to answer your questions

In a move that could redefine the web, Google is testing AI-powered, UI-based answers for its AI mode.

Up until now, Google AI mode, which is an optional feature, has allowed you to interact with a large language model using text or images.

When you use Google AI mode, Google responds with AI-generated content that it scrapes from websites without their permission and includes a couple of links.

Quantum teleportation between photons from two distant light sources achieved

Everyday life on the internet is insecure. Hackers can break into bank accounts or steal digital identities. Driven by AI, attacks are becoming increasingly sophisticated. Quantum cryptography promises more effective protection. It makes communication secure against eavesdropping by relying on the laws of quantum physics. However, the path toward a quantum internet is still fraught with technical hurdles.

Researchers at the Institute of Semiconductor Optics and Functional Interfaces (IHFG) at the University of Stuttgart have now made a decisive breakthrough in one of the most technically challenging components, the . They report their results in Nature Communications.

New ShadowRay attacks convert Ray clusters into crypto miners

A global campaign dubbed ShadowRay 2.0 hijacks exposed Ray Clusters by exploiting an old code execution flaw to turn them into a self-propagating cryptomining botnet.

Developed by Anyscale, the Ray open-source framework allows building and scaling AI and Python applications in a distributed computing ecosystem organized in clusters, or head nodes.

According to researchers at runtime security company Oligo, a threat actor they track as IronErn440 is using AI-generated payloads to compromise vulnerable Ray infrastructure that is reachable over the public internet.

/* */