Toggle light / dark theme

Ever felt like a song really resonates with you? That may be more true than you think.

A new theory suggests that we don’t just listen to it; our bodies physically resonate with music, as our brains’ natural oscillations synchronize with structures like rhythm and pitch.

Music is often thought of as a ‘universal language’ – people across cultures will bust out similar moves, and young kids will instinctively bop to a beat.

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver tracked as CVE-2025–31324, indicating that multiple threat actors are taking advantage of the bug.

Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware family, which is traced by Microsoft under the moniker Storm-2460.

BianLian is assessed to be involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the e-crime group.

Then last year, Trustwave SpiderLabs revealed details of another phishing campaign targeting the same region with malicious payloads which it said exhibits similarities with that of Horabot malware.

The latest set of attacks starts with a phishing email that employs invoice-themed lures to entice users into opening a ZIP archive containing a PDF document. However, in reality, the attached ZIP file contains a malicious HTML file with Base64-encoded HTML data that’s designed to reach out to a remote server and download the next-stage payload.

“Attackers can exploit the flaw via a malicious web page or script that causes the scripting engine to misinterpret object types, resulting in memory corruption and arbitrary code execution in the context of the current user. If the user has administrative privileges, attackers could gain full system control – enabling data theft, malware installation, and lateral movement across networks.”

CVE-2025–30400 is the third privilege escalation flaw in DWM Core Library to be weaponized in the wild since 2023. In May 2024, Microsoft issued patches for CVE-2024–30051, which Kaspersky said was used in attacks distributing QakBot (aka Qwaking Mantis) malware.

“Since 2022, Patch Tuesday has addressed 26 elevation of privilege vulnerabilities in DWM,” Satnam Narang, senior staff research engineer at Tenable, said in a statement shared with The Hacker News.

In geometry, the is the convex regular 4-polytope (four-dimensional analogue of a Platonic solid) with Schläfli symbol {3,3,5}. It is also known as the C600, hexacosichoron [ 1 ] and hexacosihedroid. [ 2 ] It is also called a tetraplex (abbreviated from “tetrahedral complex”) and a polytetrahedron, being bounded by tetrahedral cells.

The boundary is composed of 600 tetrahedral cells with 20 meeting at each vertex. Together they form 1,200 triangular faces, 720 edges, and 120 vertices. It is the 4-dimensional analogue of the icosahedron, since it has five tetrahedra meeting at every edge, just as the icosahedron has five triangles meeting at every vertex. Its dual polytope is the 120-cell.