Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics

The threat actor behind the activity, according to Trend Micro, exhibited tactics mirroring those of advanced persistent threat (APT) groups, such as DLL side-loading, process injection, and the ability to evade endpoint detection and response (EDR) software.

The DLL side-loading techniques resemble those previously documented as part of attacks orchestrated by a China-linked hacking group called Earth Baxia, which was flagged by the cybersecurity company as targeting government entities in Taiwan and the Asia-Pacific region to deliver a backdoor known as EAGLEDOOR following the exploitation of a now-patched security flaw affecting OSGeo GeoServer GeoTools.

“The attack chain leveraged a legitimate browser-related file, Edge.exe (originally named cookie_exporter.exe), to sideload a malicious msedge.dll (SWORDLDR), which subsequently deployed the Charon ransomware payload,” researchers Jacob Santos, Ted Lee, Ahmed Kamal, and Don Ovid Ladore said.

Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses

An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show.

“This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and database exploitation,” ReliaQuest said in a report shared with The Hacker News.

These include the use of adoption of tactics that mirror those of Scattered Spider, such as highly-targeted vishing (aka voice phishing) and social engineering attacks, leveraging apps that masquerade as legitimate tools, employing Okta-themed phishing pages to trick victims into entering credentials during vishing, and VPN obfuscation for data exfiltration.

Hacking our way out of the universe

From Descartes to The Matrix, the idea that reality might be a simulation has long fascinated and terrified humanity. Elon Musk recently argued that the simulation hypothesis is most likely true. But if that’s the case, might there be a way to escape back to the real world? Join leading computer scientist Roman Yampolskiy as he argues that if we are living in a simulation, we can also hack our way out of it.

CrowdStrike, Uber, Zoom Among Industry Pioneers Building Smarter Agents With NVIDIA Nemotron and Cosmos Reasoning Models for Enterprise and Physical AI Applications

As enterprises develop AI agents to tackle complex, multistep tasks, models that can provide strong reasoning accuracy with efficient token generation enable intelligent, autonomous decision-making at scale.

NVIDIA Nemotron is a family of advanced open reasoning models that use leading models, NVIDIA-curated open datasets and advanced AI techniques to provide an accurate and efficient starting point for AI agents.

Neural navigation: Engineers map brain’s smallest blood vessels using computer models

Healthy brain function relies on a steady supply of blood. Disruptions in blood flow are linked to major neurological conditions like stroke, Alzheimer’s disease (AD), and traumatic brain injuries. But understanding how the brain fine-tunes this flow—especially across its smallest blood vessels—remains a challenge.

The brain’s blood supply includes a vast network of vessels, ranging from large arteries to microscopic capillaries. Between these lie transitional zone (TZ) vessels—such as penetrating arterioles, precapillary arterioles, and capillary sphincters—that bridge the gap and may play a big role in regulating flow. But their exact contribution, particularly during increased brain activity, remains a subject of scientific debate.

To explore these dynamics, researchers from the College of Engineering and Computer Science at Florida Atlantic University and the FAU Sensing Institute (I-SENSE) developed a highly detailed computer model of the mouse brain’s vasculature, treating each vessel segment as a tiny, adjustable valve.

Soft robots go right to the site of kidney stones

An international research team led by the University of Waterloo is developing technology to dissolve painful kidney stones in the urinary tract using tiny robots. The research is published in the journal Advanced Healthcare Materials.

The new technique, tested in a life-size, 3D-printed model, features thin, spaghetti-like strips fitted with magnets that can be moved into place near uric acid with a operated by doctors.

The soft, flexible robot strips are about a centimeter long and contain an enzyme called urease. Once in place, the urease reduces the acidity of the surrounding urine, thereby dissolving stones until they are small enough to pass naturally in just a few days.

Molecular mechanisms show how the blood-brain barrier gets leakier with age

A new study from researchers at the University of Illinois Chicago reveals how the blood-brain barrier gets leakier with age, contributing to memory deficits. The study, published in Cell Reports, uncovered the molecular mechanisms behind this process and could provide new therapeutic targets to address cognitive decline earlier in the aging process.

The is a layer of cells lining the brain’s blood vessels that keep viruses, bacteria and toxins out while allowing helpful nutrients and chemicals in. A key structure of the blood-brain barrier are tight junctions that act as bridges between cells, restricting entry of molecules. A protein called occludin helps fulfill this essential role.

“It’s a highly regulatable process that allows some molecules to go through and others to remain in circulation,” said Yulia Komarova, UIC associate professor in the department of pharmacology and at the College of Medicine and senior author of the study. “Basically, it’s a mechanism that separates the central nervous system from everything else.”

/* */