Toggle light / dark theme

Quantum global race: “The word ‘secret’ no longer exists”

Please see this news story on a remarkable new technological cybersecurity breakthrough for mitigating the threats of Q-Day and AI:

#cybersecurity #quantum #tech


The next leap in technology: a quantum computer unlike anything humanity has seen, capable of breaking all encryption and challenging the most crucial national security defenses.
Tal Shenhav from i24NEWS Hebrew channel has the story.

Hacker claims to leak WIRED database with 2.3 million records

A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties.

On December 20, a threat actor using the name “Lovely” leaked the database on a hacking forum, offering access for approximately $2.30 in the site’s credits system. In the post, Lovely accused Condé Nast of ignoring vulnerability reports and claimed the company failed to take security seriously.

“Condé Nast does not care about the security of their users’ data. It took us an entire month to convince them to fix the vulnerabilities on their websites,” reads a post on a hacking forum.

Ancient Priests Hacked Consciousness With Sound

Let’s travel back in time. We are in Malta, deep beneath the earth, inside a chamber, where the only light is that of torches. We hear a low hum that reverberates through the stone walls. A priestess enters, chanting a mantra, resonating within the walls, and her voice echoes with unparallel precision, while rhythmic drumbeats pulse like a heartbeat. The participants are entranced, they feel their minds slip from this mundane world into realms of heightened awareness. Suddenly, visions of spirits, out-of-body journeys, and profound insights interfere with the very nature of reality. Do you think this is fantasy? Absolutely not. This is the essence of the ancient rituals where sound and vibration served as gateways to altered states of consciousness. As we go deep into the mysteries of sacred sounds, we will uncover how mantras and drums were instruments of rebellion against the illusions of the material world, where mystics challenged the tyrannical grip of false gods through transcendent practices.

In this fascinating exploration, we will travel through time and cultures, and we will examine the scientific and spiritual foundations of these auditory phenomena. We will move from the shamanic drums of indigenous tribes to the mantras of the Vedic sages and the hymnic invocations of ancient Greece. And we will find a common thread: the “sound”. The universal key to unlocking the mind’s hidden potentials. We’ll also venture into archaeoacoustics, the study of sound in ancient sites, and connect these old practices to modern research on binaural beats, revealing how vibration continues to bridge the ancient and the contemporary in our quest for cosmic liberation. And as usual, we keep reinventing ancient knowledge of thousands of years before us.

Technological Disruption: Strategic Inflection Points From 2026

By Chuck Brooks


Quantum Computing and the Dismantling of Cryptographic Foundations Quantum technology may be the most transformative long-term influence on the horizon. Although large-scale, fault-tolerant quantum computers may remain years from realization, their expected influence is already transforming cybersecurity strategies. As quantum technology advances, the risk of “harvest now, decrypt later” assaults suggests that today’s encrypted sensitive data could become vulnerable in the future.

From 2026 to 2030, enterprises will increasingly recognize that cryptographic agility is vital. The move to post-quantum cryptography standards means that old systems, especially those in critical infrastructure, financial services, and government networks, need to be fully inventoried, evaluated, and upgraded.

Fake MAS Windows activation domain used to spread PowerShell malware

A typosquatted domain impersonating the Microsoft Activation Scripts (MAS) tool was used to distribute malicious PowerShell scripts that infect Windows systems with the ‘Cosmali Loader’

BleepingComputer has found that multiple MAS users began reporting on Reddit [1, 2] yesterday that they received pop-up warnings on their systems about a Cosmali Loader infection.

You have been infected by a malware called ‘cosmali loader’ because you mistyped ‘get.activated.win’ as ‘get.activate[.]win’ when activating Windows in PowerShell.

Google AI CEO Demis Hassabis calls Meta AI chief scientist Yann LeCun ‘plain incorrect’, read his long post on why he thinks Yann is ‘wrong’

The TOI Tech Desk is a dedicated team of journalists committed to delivering the latest and most relevant news from the world of technology to readers of The Times of India. TOI Tech Desk’s news coverage spans a wide spectrum across gadget launches, gadget reviews, trends, in-depth analysis, exclusive reports and breaking stories that impact technology and the digital universe. Be it how-tos or the latest happenings in AI, cybersecurity, personal gadgets, platforms like WhatsApp, Instagram, Facebook and more; TOI Tech Desk brings the news with accuracy and authenticity.

WebRAT malware spread via fake vulnerability exploits on GitHub

The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities.

Previously spread through pirated software and cheats for games like Roblox, Counter Strike, and Rust, WebRAT is a backdoor with info-stealing capabilities that emerged at the beginning of the year.

According to a report from Solar 4RAYS in May, WebRAT can steal credentials for Steam, Discord, and Telegram accounts, as well as cryptocurrency wallet data. It can also spy on victims through webcams and capture screenshots.

Advancing Computers to Think Like Humans: Neuromorphic Meshing Explained

#neuromorphic #computing #futuretech


By Chuck Brooks, Skytop Contributor / December 3, 2025

Chuck Brooks serves as President and Consultant of Brooks Consulting International. Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program, where he teaches graduate courses on risk management, homeland security, and cybersecurity.

Chuck has received numerous global accolades for his work and promotion of cybersecurity. Recently, he was named the top cybersecurity expert to follow on social media, and also as one top cybersecurity leaders for 2024. He has also been named “Cybersecurity Person of the Year” by Cyber Express, Cybersecurity Marketer of the Year, and a “Top 5 Tech Person to Follow” by LinkedIn” where he has 120,000 followers on his profile.

As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, The US Embassy to the Holy See, and the Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech. He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for DHS CISA focused on security space systems.

/* */