Toggle light / dark theme

Cybercriminals have started using Static Web Apps, an Azure service, in their phishing attacks against Microsoft 365 (opens in new tab) users.

Researchers from MalwareHunterTeam noted Static Web Apps have two features that are being abused with ease — custom branding for web apps, and web hosting for static content such as HTML, CSS, JavaScript, or images.

Hackers so far are focusing on decentralized finance (DeFi) projects to steal crypto this year, a new report found, a reversal from 2021 when they used scams and online fraud for most of their exploits.

So far, investors have lost over $1.22 billion to hackers in the first three months of the year, nearly eight times more than the $154 million lost in the first quarter of 2021, according to crypto security firm Immunefi. Ninety-nine percent of those losses were from software exploits, the report found, specifically the hacks against Wormhole and Ronin.

This is not an anomaly, experts warn. It’s likely this kind of nefarious activity will become more common, while scamming of investors could wane.

A newly discovered data wiper malware that wipes routers and modems has been deployed in the cyberattack that targeted the KA-SAT satellite broadband service to wipe SATCOM modems on February 24, affecting thousands in Ukraine and tens of thousands more across Europe.

The malware, dubbed AcidRain by researchers at SentinelOne, is designed to brute-force device file names and wipe every file it can find, making it easy to redeploy in future attacks.

SentinelOne says this might hint at the attackers’ lack of familiarity with the targeted devices’ filesystem and firmware or their intent to develop a reusable tool.

We’ve seen this funky dual disk polar printer already recently, but [Heinz Loepmeier] has been busy working on it, so here’s an update. The primary focus here is nozzleboss, a blender plugin which enables the surface textures of already sliced objects to be manipulated. The idea is to read in the gcode for the object, and convert it to an internal mesh representation that blender needs in order to function. From there the desired textures can be applied to the surfaces for subsequent stages to operate upon. One trick that nozzleboss can do is to create weight maps to tweak the extrusion flow rate or print velocity value according to the pixel value at the surface — such ‘velocity painting’ can produce some very subtle surface effects on previously featureless faces. Another

trick is to use the same weight maps and simply map colours to blender text blocks which are injected into the gcode at export time. These gcode blocks can be used swap tool heads or extruders, enabling blending of multiple filament colours or types in the same object.

Some nice examples of such printing manipulation can be seen on [Heinz’s] instagram page for the project. So, going back to the hardware again, the first video embedded below shows the ‘dual disk polar printer’ fitted with a crazy five-extruders-into-one-nozzle mixing hotend setup, which should be capable of full CMYK colour mixing and some. The second video below shows an interesting by-product of the wide horizontal motion range of the machine, that the whole printing area can be shifted to a nozzle at the other end of the gantry. This enables a novel way to switch extruders, by just moving the whole bed and print under the nozzle of interest! One final observation — is that of the print surface — it does look rather like they’re printing direct onto a slab of marble, which I think is the first time we’ve seen that.

Interesting printer designs are being worked on a lot these days, here’s a really nice 5-axis prusa i3 hack, and if you want to stay in the cartesian world, but your desktop machine is just too small, then you can always supersize it.

WASHINGTON — SpiderOak Mission Systems announced March 29 it won a contract from Lockheed Martin Space for its cybersecurity software.

The contract allows Lockheed Martin to use SpiderOak’s OrbitSecure software. “This is commercial technology that was developed for terrestrial applications and has been repurposed for the space business, specifically for low Earth orbit,” SpiderOak chairman Charles Beames told SpaceNews.

Beames said he could not disclose the value of the contract with Lockheed Martin. “The goal is to make OrbitSecure available to Lockheed Martin customers as part of an offering to provide an extra level of cybersecurity,” he said.

Ernesto Di Maio is severely allergic to the yeast in leavened foods. “I have to go somewhere and hide because I will be fully covered with bumps and bubbles on the whole body,” he says. “It’s really brutal.”

Di Maio is a materials scientist at the University of Naples Federico II where he studies the formation of bubbles in polymers like polyurethane. He’s had to swear off bread and pizza, which can make outings in Italy a touch awkward. “It’s quite hard in Naples not to eat pizza,” he explains. “People would say, ‘Don’t you like pizza? Why are you having pasta? That’s strange.’”

So Di Maio put Iaccarino and another graduate student, Pietro Avallone, to work on a project to make pizza dough without yeast. The results of this scientific and culinary experiment are published in Tuesday’s edition of Physics of Fluids. Di Maio pulled in another colleague: chemical engineer Rossana Pasquino who studies the flow of materials, everything from toothpaste to ketchup to plastics. “Pizza [dough] is a funny material,” she explains, “because it flows, but it has to be also like rubber. It has to be elastic enough [when it’s cooked] to be perfect when you eat it.” — I had to post this because I love Pizza.


Bread geeks, take note! The new technique, developed in a lab in Naples, involves the smart application of materials science and physics to make airy, bubbly dough without fermentation.

You’ve probably received this message already — just don’t open it. Details:


Facebook Messenger users have been told to ignore a four-letter message that could lead to disastrous financial consequences or stolen personal information.

Scammers use the instant messaging platform to send out a four-word “look what I found …” message, and a link from compromised accounts. These message also include emojis as well, 7News reports.

If interacted with, the link takes the user to a site where they’re asked to enter their Facebook log in details. This allows the scammer to steal sensitive information from the user’s profile, or install malware on their phone or computer.