Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: lw Clear Filter

Endgame Gear mouse config tool infected users with malware

Gaming peripherals maker Endgame Gear is warning that malware was hidden in its configuration tool for the OP1w 4k v2 mouse hosted on the official website between June 26 and July 9, 2025. The infected file was hosted on 'endgamegear.com/gaming-mice/op1w-4k-v2,' so users downloading the tool from that page during this period were infected. Endgame Gear is a German PC gaming peripherals firm known for its pro-gaming gear, including the XM and OP1 series mice, which are highly regarded among rev

Can Macs Get Viruses in 2025? Do You Need Antivirus for Your Mac?

Remember those old I’m a Mac, I’m a PC ads? In one, the Mac looks on, concerned, while the PC keeps sneezing from a virus it's caught, eventually crashing backward onto the ground. For a while, Macs did seem mostly immune to computer viruses. But when Apple’s market share ballooned, with it came a new fan club: hackers. Yes, MacOS comes with XProtect, Gatekeeper and other tools, and most Mac owners get by just fine with these plus a dash of skepticism. Still, security firms keep spotting fresh

Can Macs Get Viruses in 2025? Do You Need an Antivirus for Your Mac?

Remember those old I’m a Mac, I’m a PC ads? In one, the Mac looks on, concerned, while the PC keeps sneezing from a virus it's caught, eventually crashing backward onto the ground. For a while, Macs did seem mostly immune to computer viruses. But when Apple’s market share ballooned, with it came a new fan club: hackers. Yes, MacOS comes with XProtect, Gatekeeper and other tools, and most Mac owners get by just fine with these plus a dash of skepticism. Still, security firms keep spotting fresh

New Koske Linux malware hides in cute panda images

A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. Researchers from cybersecurity company AquaSec analyzed Koske and described it as "a sophhisticated Linux threat." Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks. Koske’s purpose is to deploy CPU and

Hacker sneaks infostealer malware into early access Steam game

A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. A few days ago, the hacker (also tracked as Larva-208), injected malicious binaries into the Chemia game files hosted on Steam. Chemia is a survival crafting game from developer ‘Aether Forge Studios,’ which is currently offered as early access on Steam but has no public release date. Chemia on Steam Source: BleepingComputer titled Chemia , also t

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware

The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised devices. This occurred after maintainer accounts were hijacked via phishing, followed by unauthorized owner changes that went unnoticed for several hours, potentially compromising many developers who downloaded the new releases. The 'is' package is a lightweight JavaScript utility library that provides a wide variety of type checking and value v

Tram Trains

We’re hiring someone in London to help grow Works in Progress's audience and sell Stripe Press books (and, soon, Works in Progress magazine subscriptions). If this could be you, please apply here! Many cities face the following problem. They have railway lines that go where people live. But these railway lines end at the edge of the city center, and don’t go out the other side. For cities with this problem, the solution is through running. Terminating a train and turning it around takes a lot

CSS's problems are Tailwind's problems

Tailwind is the Worst of All Worlds 21 July 2025 React, CSS, Tailwind, HTML Tailwind is the worst of all worlds. It is a regrettable step backwards that takes everything bad about CSS and modern web development and brings it all together in one library. CSS's Successes and Failures Of all the web technologies that underlie the modern web, the one that has received the fewest fundamental changes is CSS. We've gotten amazing things like flexbox, grid, container queries, and more which have

Best Internet Providers in Milwaukee, Wisconsin

AT&T and Spectrum are CNET's top picks when it comes to the best internet providers in Milwaukee, Wisconsin. AT&T Fiber is our top pick, offering faster download and upload speeds over a fiber connection, with plans ranging from $55 to $245 a month. It delivers all that at a price comparable to Spectrum -- our second choice for Milwaukee residents. If you're a heavy internet user, whether it's for working from home, just browsing or keeping your kids entertained -- Milwaukee has several solid o

Apple TV+ shares Stillwater season 4 trailer ahead of August 1 premiere

Just weeks after announcing its return date, Apple has released the trailer for the new season of Stillwater, the mindfulness-themed animated series based on Jon J Muth’s bestselling Zen book collection. Watch the trailer below. Stillwater returns to Apple TV+ on August 1 Stillwater is one of the highest-rated kids’ shows on Apple TV+, and it has snatched quite a few awards since it premiered in 2020. After a two-year hiatus, the show is set to return in two weeks, and Apple TV+ has just rele

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

The UK National Cyber Security Centre (NCSC) has formally attributed ‘Authentic Antics’ espionage malware attacks to APT28 (Fancy Bear), a threat actor already linked to Russia’s military intelligence service (GRU). The NCSC revealed in a detailed technical analysis of the Authentic Antics malware dated May 6th that it is stealing credentials and OAuth 2.0 tokens that allow access to a target's email account. The malware was observed in use in 2023 and runs inside the Outlook process and produ

GitHub abused to distribute payloads on behalf of malware-as-a-service

Researchers from Cisco’s Talos security team have uncovered a malware-as-a-service operator that used public GitHub accounts as a channel for distributing an assortment of malicious software to targets. The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise networks that rely on the code repository for the software they develop. GitHub removed the three accounts that hosted the malicious payloads shortly after being notified

Microsoft Teams voice calls abused to push Matanbuchus malware

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. Matanbuchus is a malware-as-a-service operation seen promoted on the dark web first in early 2021. It was advertised as a $2,500 Windows loader that executes malicious payloads directly in memory to evade detection. In June 2022, threat analyst Brad Duncan reported that the malware loader was being used to deliver Cobalt Strike beacons in a large-scale

Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms. The BadBox 2.0 malware botnet is a cybercrime operation that utilizes infected Android Open Source Project (AOSP) devices, including smart TVs, streaming boxes, and other connected devices that lack security protections, such as Google Play Protect. These devices become infected either by threat actor

Hackers exploit a blind spot by hiding malware inside DNS records

Hackers are stashing malware in a place that’s largely out of the reach of most defenses—inside domain name system (DNS) records that map domain names to their corresponding numerical IP addresses. The practice allows malicious scripts and early-stage malware to fetch binary files without having to download them from suspicious sites or attach them to emails, where they frequently get quarantined by antivirus software. That’s because traffic for DNS lookups often goes largely unmonitored by man

Chinese authorities are using a new tool to hack seized phones and extract data

Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more. On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XORIndex to developer systems. The packages collectively count more than 17,000 downloads and were discovered by researchers at package security platform Socket, who assess them to be part of the continued Contagious Interview operation. Socket researchers say that the campaign follows threat activity detected since April. Last month, the same acto

# [derive(Clone)] Is Broken

use std::sync::Arc; struct NoClone ; struct WrapArc <T>(Arc<T>); fn main () { let foo = WrapArc (Arc:: new (NoClone)); let foo_ = foo. clone (); } Do you think this code should compile? What about the following code: struct AlwaysEq <T>(T); impl <T> PartialEq for AlwaysEq <T> { fn eq (& self , _other: & Self ) -> bool { true } } impl <T> Eq for AlwaysEq <T> {} struct NotEq ; struct WrapAlwaysEq <T>(AlwaysEq<T>); fn assert_is_eq (_: impl Eq ) {} fn main () { let x = WrapAlwaysEq ( AlwaysEq (No

New macOS malware targets crypto and Web3 startups with fake Zoom update

North Korean hackers are behind a new and unusually sophisticated macOS malware campaign that targets the crypto industry using fake Zoom invites. Here’s how it works. Dubbed “NimDoor” by researchers at SentinelLabs, the attack is more sophisticated than the typical macOS threat, and it chains together AppleScript, Bash, C++, and Nim to exfiltrate data and maintain access in compromised systems. Here’s SentinelLabs’ executive summary of the hack: DPRK threat actors are utilizing Nim-compiled

NimDoor crypto-theft macOS malware revives itself when killed

North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a previously unseen signal-based persistence mechanism. The attack chain, which involves contacting victims via Telegram and luring them into running a fake Zoom SDK update, delivered via Calendly and email, resembles the one Huntress manag

Many ransomware strains will abort if they detect a Russian keyboard installed (2021)

In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian. So many readers had questions in response to the tweet that I thought it was worth a blog post exploring this one weird cyber defense trick.

Apple TV+ confirms return date for award-winning animated series ‘Stillwater’

Stillwater is one of the highest-rated Apple TV+ shows for kids, and it has snatched quite a few awards since it premiered in 2020. And after a two-year hiatus since the end of last season, Apple has officially confirmed the show’s return date for season 4. Stillwater returns for season 4 on August 1 For those unfamiliar, Stillwater is Apple’s gentle, mindfulness-focused animated series based on Jon J Muth’s bestselling Zen book collection. The show follows three siblings, Karl, Addy, and Mic

Malwarebytes Antivirus Review 2025: Decent Software, Terrible Customer Service

CNET’s expert staff reviews and rates dozens of new products and services each month, building on more than a quarter century of expertise. 7.0 / 10 SCORE Malwarebytes Antivirus Buy at Malwarebytes Score Breakdown Performance 8 /10 Security 9 /10 Customer Support 4 /10 Usability 7 /10 Value 5 /10 Features 9 /10 Pros Free malware scanning and browser safety tools Decent VPN Impressive privacy policies Excellent dark web monitoring tools Cons Free version doesn’t provide real-time protection

Malware on Google Play, Apple App Store stole your photos—and crypto

A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting Android and iOS devices. The malware is a possible evolution of SparkCat, which Kaspersky discovered in January. SparkCat used optical character recognition (OCR) to steal cryptocurrency wallet recovery phrases from images saved on infected devices. When installing crypto wallets, the installation process tells users to write down the wallet's recovery phrase and store it

Malware-Laced GitHub Repos Found Masquerading as Developer Tools

(English translation below) Klarrio ontdekt grootschalig malware-netwerk op GitHub Klarrio heeft onlangs een belangrijke ontdekking gedaan: Het gaat om een omvangrijk malware-netwerk op open source-platform GitHub dat de CTO van Klarrio, Bruno De Bus, dankzij eigen onderzoek heeft weten bloot te leggen. Het is al langer bekend dat er door middel van gekloonde Open-Source GitHub repositories pogingen gedaan worden om malware te installeren voor nietsvermoedende gebruikers. Maar de schaal waaro

DuckDuckGo scam blocker detects fake stores, crypto sites, virus alerts, more

The privacy-focused web browser DuckDuckGo has boosted its anti-scam features. It can now detect and block fake ecommerce stores, crypto sites, virus alerts, and more. The new security feature is completely free for all users on both Mac and iOS browsers, with no Privacy Pro subscription needed … DuckDuckGo already had the ability to detect common phishing and malware attacks, as well as malicious ads, but these features have now been boosted and branded as Scam Blocker. There are the two new

North Korean hackers deepfake execs in Zoom call to spread Mac malware

The North Korean BlueNoroff hacking group is deepfaking company executives during Zoom calls to trick employees into installing custom malware on their macOS devices. BlueNoroff (aka Sapphire Sleet or TA444) is a North Korean advanced persistent threat (APT) group known for conducting cryptocurrency theft attacks using Windows and Mac malware. Huntress researchers uncovered a new BlueNoroff attack on June 11, 2025, when they were called to investigate a potential intrusion on a partner's netwo

Address bar shows hp.com. Browser displays scammers’ malicious text anyway.

Not the Apple page you're looking for “If I showed the [webpage] to my parents, I don't think they would be able to tell that this is fake,” Jérôme Segura, lead malware intelligence analyst at Malwarebytes, said in an interview. “As the user, if you click on those links, you think, ‘Oh I'm actually on the Apple website and Apple is recommending that I call this number.’” The unknown actors behind the scam begin by buying Google ads that appear at the top of search results for Microsoft, Apple,

Security Bite: Infostealer malware spikes 28% among Mac users, says Jamf

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl