Toggle light / dark theme

Apache OpenOffice disputes data breach claims by ransomware gang

The Apache Software Foundation disputes claims that its OpenOffice project suffered an Akira ransomware attack, after the threat actors claimed to have stolen 23 GB of corporate documents.

Apache OpenOffice is a free, open-source office suite that includes word processing, spreadsheets, presentations, graphics, and database tools. It’s compatible with major file formats, such as Word and Excel, and runs on multiple operating systems.

On October 30th, the Akira ransomware gang claimed it had breached Apache OpenOffice and stolen 23 GB of data, including employee and financial information, as well as internal files.

Malicious Android apps on Google Play downloaded 42 million times

Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024 and May 2025, notes a report from cloud security company Zscaler.

During the same period, the company observed a 67% year-over-year growth in malware targeting mobile devices, with spyware and banking trojans being a prevalent risk.

Telemetry data shows that threat actors are shifting from traditional card fraud to exploiting mobile payments using phishing, smishing, SIM-swapping, and payment scams.

Brains and stock markets follow the same rules in crisis, study finds

What do brains and the stock market have in common? While this might sound like a set-up for a joke, new research from U-M researchers reveals that the behaviors of brains and economies during crises can be explained using observations common in the realm of physics. Their work is published in the journal Proceedings of the National Academy of Sciences.

UnCheol Lee, Ph.D. of the U-M Department of Anesthesiology and his collaborative team came up with the idea upon observing that some patients under anesthesia recover faster than others.

“Anesthetic drugs can be considered as introducing a controlled crisis in the brain, interrupting the brain’s network to induce unconsciousness,” explained Lee.

“Only a Question of Time” Does AI Mean We’re DOOMED? Plus Oz Pearlman Reads Piers Morgan’s Mind!

ExpressVPN: Right now you can get an extra four months of ExpressVPN for free. Just scan the QR code on the screen, or go to https://ExpressVPN.com/PIERS and get four extra months for free.

Two years ago, Elon Musk was among a thousand experts to sign an open letter demanding an urgent pause on the advancement of Artificial Intelligence because of the risks concerning job losses, misinformation and more.

But now Musk is now spending a billion dollars a month to compete in an AI arms race, which is inflating the stock market to bursting point.

Amazon just laid off 14,000 workers in its ongoing A.I pivot — so, are the worst fears of doomsaying experts already coming true?

Joining Piers Morgan to discuss are respected thinkers in this field; Dr Roman Yampolskiy, Dr Michio Kaku, Alex Smola and Avi Loeb.

Then; he’s performed for presidents, billionaires and sports stars, but Oz Pearlman’s recent extraction of Joe Rogan’s pin number may have been his biggest hit yet.

Massive surge of NFC relay malware steals Europeans’ credit cards

Near-Field Communication (NFC) relay malware has grown massively popular in Eastern Europe, with researchers discovering over 760 malicious Android apps using the technique to steal people’s payment card information in the past few months.

Contrary to the traditional banking trojans that use overlays to steal banking credentials or remote access tools to perform fraudulent transactions, NFC malware abuses Android’s Host Card Emulation (HCE) to emulate or steal contactless credit card and payment data.

They capture EMV fields, respond to APDU commands from a POS terminal with attacker-controlled replies, or forward terminal requests to a remote server, which crafts the proper APDU responses to enable payments at the terminal without the physical cardholder present.

This Chip Computes With Light, Breaking the 10 GHz Barrier for AI

Researchers have developed an optical computing system that performs feature extraction for quantitative trading with unprecedentedly low latency. Many advanced artificial intelligence (AI) systems, including those used in surgical robotics and high-speed financial trading, rely on processing lar

Beyond electronics: Optical system performs feature extraction with unprecedented low latency

Many modern artificial intelligence (AI) applications, such as surgical robotics and real-time financial trading, depend on the ability to quickly extract key features from streams of raw data. This process is currently bottlenecked by traditional digital processors. The physical limits of conventional electronics prevent the reduction in latency and the gains in throughput required in emerging data-intensive services.

The answer to this might lie in harnessing the power of light. Optical computing—or using light to perform demanding computations—has the potential to greatly accelerate feature extraction. In particular, optical diffraction operators, which are plate-like structures that perform calculations as light propagates through them, are highly promising due to their and capacity for parallel processing.

However, pushing these systems to operating speeds beyond 10 GHz in practice remains a technical challenge. This is mainly due to the difficulty of maintaining the stable, coherent light needed for optical computations.

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

In a report published earlier this week, Fortra said phishing kits associated with the Smishing Triad are being used to increasingly target brokerage accounts to obtain banking credentials and authentication codes, with attacks targeting these accounts witnessing a fivefold jump in the second quarter of 2025 compared to the same period last year.

“Once compromised, attackers manipulate stock market prices using ‘ramp and dump’ tactics,” security researcher Alexis Ober said. “These methods leave almost no paper trail, further heightening the financial risks that arise from this threat.”

The adversarial collective is said to have evolved from a dedicated phishing kit purveyor into a “highly active community” that brings together disparate threat actors, each of whom plays a crucial role in the phishing-as-a-service (PhaaS) ecosystem.

/* */