Quantum scientists have cracked a longstanding problem by devising a method to speed up measurements without losing accuracy, a key hurdle for quantum technology. By cleverly adding extra qubits, they traded “space” for time, gathering more information faster without destabilizing the fragile qua
Category: cybercrime/malcode – Page 2
Japan on Friday enacted a new law that would permit the country’s authorities to preemptively engage with adversaries through offensive cyber operations to ensure threats are suppressed before they cause significant damage.
The new law, which was first mooted in 2022, is intended to help Japan strengthen its cyber defense “to a level equal to major Western powers” and marks a break from the country’s traditional approach to cyber defense, which had tracked closely to its Article 9 constitutional commitment to pacifism.
The new Active Cyberdefense Law mirrors recent reinterpretations of Article 9, providing Japan’s Self-Defence Forces with the right to provide material support to allies under the justification that failing to do so could endanger the whole of the country.
“Space weather can impact systems that use IT for critical functions and everyday processes,” James Spann, a senior scientist at the Office of Space Weather Observations at the U.S. National Oceanic and Atmospheric Administration’s (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) department, told Space.com in an email. “These space weather impacts can have the same symptoms as a cyberattack, where systems will be brought down, or lockup, or transmit erroneous information.”
NESDIS oversaw a tabletop space weather exercise conducted in May 2024, the first such drill testing the U.S. preparedness for a major solar storm. Results of the exercise, which brought together 35 US government agencies, were published in a report in April.
In one of the simulations during the exercise, NOAA and the U.S. Air Force reported a severe solar flare and radio burst, but another federal department or agency “reported contradictory information, suggesting that the radio and communications disruptions were possibly the result of a cyberattack,” according to the report. Above all, it showed the need for effective communication following such events.
Introducing Codex: a cloud-based software engineering agent that can work on many tasks in parallel, powered by codex-1. With Codex, developers can simultaneously deploy multiple agents to independently handle coding tasks such as writing features, answering questions about your codebase, fixing bugs, and proposing pull requests for review.
Scientists say that hiding secret messages using AI chatbots could lead to a world of iron-clad encryption.
Samsung patched CVE-2025–4632, a 9.8 CVSS flaw exploited to deploy Mirai botnet after PoC release.
At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver tracked as CVE-2025–31324, indicating that multiple threat actors are taking advantage of the bug.
Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware family, which is traced by Microsoft under the moniker Storm-2460.
BianLian is assessed to be involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the e-crime group.
Xinbi enabled $8.4B in Telegram-based transactions since 2022, fueling cybercrime, scams, and crypto laundering.
Meta Mirage phishing attack exploits 14,000+ URLs via cloud hosts, stealing credentials and ad accounts.
Then last year, Trustwave SpiderLabs revealed details of another phishing campaign targeting the same region with malicious payloads which it said exhibits similarities with that of Horabot malware.
The latest set of attacks starts with a phishing email that employs invoice-themed lures to entice users into opening a ZIP archive containing a PDF document. However, in reality, the attached ZIP file contains a malicious HTML file with Base64-encoded HTML data that’s designed to reach out to a remote server and download the next-stage payload.