Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: lw Clear Filter

Andrew Lloyd Webber Is Turning ‘Phantom of the Opera’ Into an Anime Epic

First came Masquerade, an immersive production of The Phantom of the Opera. Now Andrew Lloyd Webber’s Really Useful Group has announced a rebrand and a slate of new franchise expansions for the musical maestro’s universe of stories. Including… anime? Deadline reports that the company, now known as LW Entertainment, has plans for a Phantom of the Opera anime, an idea so wild it’s bound to work. And it’s not completely out of left field: Sailor Moon‘s Tuxedo Mask is already so Phantom-coded. (We

The end of perimeter defense: When your own AI tools become the threat actor

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Russia’s APT28 is actively deploying LLM-powered malware against Ukraine, while underground platforms are selling the same capabilities to anyone for $250 per month. Last month, Ukraine’s CERT-UA documented LAMEHUG, the first confirmed deployment of LLM-powered malware in the wild. The malware, attributed to APT28, utilizes stolen Hugging

Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Researchers have already found a critical vulnerability in the new NLWeb protocol Microsoft made a big deal about just just a few months ago at Build. It’s a protocol that’s supposed to be “HTML for the Agentic Web,” offering ChatGPT-like search to any website or app. Discovery of the embar

New Plague Linux malware stealthily maintains SSH access

A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access and bypass authentication on compromised systems. Nextron Systems security researchers, who identified the malware and dubbed it "Plague," describe it as a malicious Pluggable Authentication Module (PAM) that uses layered obfuscation techniques and environment tampering to avoid detection by traditional security tools. This malware features anti-debugging capabilities to

Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks

Microsoft warns that a cyber-espionage group linked to Russia's Federal Security Service (FSB) is targeting diplomatic missions in Moscow using local internet service providers. The hacking group tracked by Microsoft as Secret Blizzard (also known as Turla, Waterbug, and Venomous Bear) has been observed exploiting its adversary-in-the-middle (AiTM) position at the internet service provider (ISP) level to infect the systems of diplomatic missions with custom ApolloShadow malware. To do this, th

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network

Hackers planted a Raspberry Pi equipped with a 4G modem in the network of an unnamed bank in an attempt to siphon money out of the financial institution's ATM system, researchers reported Wednesday. The researchers with security firm Group-IB said the “unprecedented tactic allowed the attackers to bypass perimeter defenses entirely.” The hackers combined the physical intrusion with remote access malware that used another novel technique to conceal itself, even from sophisticated forensic tools.

Endgame Gear mouse config tool infected users with malware

Gaming peripherals maker Endgame Gear is warning that malware was hidden in its configuration tool for the OP1w 4k v2 mouse hosted on the official website between June 26 and July 9, 2025. The infected file was hosted on 'endgamegear.com/gaming-mice/op1w-4k-v2,' so users downloading the tool from that page during this period were infected. Endgame Gear is a German PC gaming peripherals firm known for its pro-gaming gear, including the XM and OP1 series mice, which are highly regarded among rev

Can Macs Get Viruses in 2025? Do You Need Antivirus for Your Mac?

Remember those old I’m a Mac, I’m a PC ads? In one, the Mac looks on, concerned, while the PC keeps sneezing from a virus it's caught, eventually crashing backward onto the ground. For a while, Macs did seem mostly immune to computer viruses. But when Apple’s market share ballooned, with it came a new fan club: hackers. Yes, MacOS comes with XProtect, Gatekeeper and other tools, and most Mac owners get by just fine with these plus a dash of skepticism. Still, security firms keep spotting fresh

Can Macs Get Viruses in 2025? Do You Need an Antivirus for Your Mac?

Remember those old I’m a Mac, I’m a PC ads? In one, the Mac looks on, concerned, while the PC keeps sneezing from a virus it's caught, eventually crashing backward onto the ground. For a while, Macs did seem mostly immune to computer viruses. But when Apple’s market share ballooned, with it came a new fan club: hackers. Yes, MacOS comes with XProtect, Gatekeeper and other tools, and most Mac owners get by just fine with these plus a dash of skepticism. Still, security firms keep spotting fresh

New Koske Linux malware hides in cute panda images

A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. Researchers from cybersecurity company AquaSec analyzed Koske and described it as "a sophhisticated Linux threat." Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks. Koske’s purpose is to deploy CPU and

Hacker sneaks infostealer malware into early access Steam game

A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. A few days ago, the hacker (also tracked as Larva-208), injected malicious binaries into the Chemia game files hosted on Steam. Chemia is a survival crafting game from developer ‘Aether Forge Studios,’ which is currently offered as early access on Steam but has no public release date. Chemia on Steam Source: BleepingComputer titled Chemia , also t

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware

The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised devices. This occurred after maintainer accounts were hijacked via phishing, followed by unauthorized owner changes that went unnoticed for several hours, potentially compromising many developers who downloaded the new releases. The 'is' package is a lightweight JavaScript utility library that provides a wide variety of type checking and value v

Tram Trains

We’re hiring someone in London to help grow Works in Progress's audience and sell Stripe Press books (and, soon, Works in Progress magazine subscriptions). If this could be you, please apply here! Many cities face the following problem. They have railway lines that go where people live. But these railway lines end at the edge of the city center, and don’t go out the other side. For cities with this problem, the solution is through running. Terminating a train and turning it around takes a lot

CSS's problems are Tailwind's problems

Tailwind is the Worst of All Worlds 21 July 2025 React, CSS, Tailwind, HTML Tailwind is the worst of all worlds. It is a regrettable step backwards that takes everything bad about CSS and modern web development and brings it all together in one library. CSS's Successes and Failures Of all the web technologies that underlie the modern web, the one that has received the fewest fundamental changes is CSS. We've gotten amazing things like flexbox, grid, container queries, and more which have

Best Internet Providers in Milwaukee, Wisconsin

AT&T and Spectrum are CNET's top picks when it comes to the best internet providers in Milwaukee, Wisconsin. AT&T Fiber is our top pick, offering faster download and upload speeds over a fiber connection, with plans ranging from $55 to $245 a month. It delivers all that at a price comparable to Spectrum -- our second choice for Milwaukee residents. If you're a heavy internet user, whether it's for working from home, just browsing or keeping your kids entertained -- Milwaukee has several solid o

Apple TV+ shares Stillwater season 4 trailer ahead of August 1 premiere

Just weeks after announcing its return date, Apple has released the trailer for the new season of Stillwater, the mindfulness-themed animated series based on Jon J Muth’s bestselling Zen book collection. Watch the trailer below. Stillwater returns to Apple TV+ on August 1 Stillwater is one of the highest-rated kids’ shows on Apple TV+, and it has snatched quite a few awards since it premiered in 2020. After a two-year hiatus, the show is set to return in two weeks, and Apple TV+ has just rele

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

The UK National Cyber Security Centre (NCSC) has formally attributed ‘Authentic Antics’ espionage malware attacks to APT28 (Fancy Bear), a threat actor already linked to Russia’s military intelligence service (GRU). The NCSC revealed in a detailed technical analysis of the Authentic Antics malware dated May 6th that it is stealing credentials and OAuth 2.0 tokens that allow access to a target's email account. The malware was observed in use in 2023 and runs inside the Outlook process and produ

GitHub abused to distribute payloads on behalf of malware-as-a-service

Researchers from Cisco’s Talos security team have uncovered a malware-as-a-service operator that used public GitHub accounts as a channel for distributing an assortment of malicious software to targets. The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise networks that rely on the code repository for the software they develop. GitHub removed the three accounts that hosted the malicious payloads shortly after being notified

Microsoft Teams voice calls abused to push Matanbuchus malware

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. Matanbuchus is a malware-as-a-service operation seen promoted on the dark web first in early 2021. It was advertised as a $2,500 Windows loader that executes malicious payloads directly in memory to evade detection. In June 2022, threat analyst Brad Duncan reported that the malware loader was being used to deliver Cobalt Strike beacons in a large-scale

Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms. The BadBox 2.0 malware botnet is a cybercrime operation that utilizes infected Android Open Source Project (AOSP) devices, including smart TVs, streaming boxes, and other connected devices that lack security protections, such as Google Play Protect. These devices become infected either by threat actor

Hackers exploit a blind spot by hiding malware inside DNS records

Hackers are stashing malware in a place that’s largely out of the reach of most defenses—inside domain name system (DNS) records that map domain names to their corresponding numerical IP addresses. The practice allows malicious scripts and early-stage malware to fetch binary files without having to download them from suspicious sites or attach them to emails, where they frequently get quarantined by antivirus software. That’s because traffic for DNS lookups often goes largely unmonitored by man

Chinese authorities are using a new tool to hack seized phones and extract data

Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more. On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XORIndex to developer systems. The packages collectively count more than 17,000 downloads and were discovered by researchers at package security platform Socket, who assess them to be part of the continued Contagious Interview operation. Socket researchers say that the campaign follows threat activity detected since April. Last month, the same acto

# [derive(Clone)] Is Broken

use std::sync::Arc; struct NoClone ; struct WrapArc <T>(Arc<T>); fn main () { let foo = WrapArc (Arc:: new (NoClone)); let foo_ = foo. clone (); } Do you think this code should compile? What about the following code: struct AlwaysEq <T>(T); impl <T> PartialEq for AlwaysEq <T> { fn eq (& self , _other: & Self ) -> bool { true } } impl <T> Eq for AlwaysEq <T> {} struct NotEq ; struct WrapAlwaysEq <T>(AlwaysEq<T>); fn assert_is_eq (_: impl Eq ) {} fn main () { let x = WrapAlwaysEq ( AlwaysEq (No

New macOS malware targets crypto and Web3 startups with fake Zoom update

North Korean hackers are behind a new and unusually sophisticated macOS malware campaign that targets the crypto industry using fake Zoom invites. Here’s how it works. Dubbed “NimDoor” by researchers at SentinelLabs, the attack is more sophisticated than the typical macOS threat, and it chains together AppleScript, Bash, C++, and Nim to exfiltrate data and maintain access in compromised systems. Here’s SentinelLabs’ executive summary of the hack: DPRK threat actors are utilizing Nim-compiled

NimDoor crypto-theft macOS malware revives itself when killed

North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a previously unseen signal-based persistence mechanism. The attack chain, which involves contacting victims via Telegram and luring them into running a fake Zoom SDK update, delivered via Calendly and email, resembles the one Huntress manag

Many ransomware strains will abort if they detect a Russian keyboard installed (2021)

In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian. So many readers had questions in response to the tweet that I thought it was worth a blog post exploring this one weird cyber defense trick.

Apple TV+ confirms return date for award-winning animated series ‘Stillwater’

Stillwater is one of the highest-rated Apple TV+ shows for kids, and it has snatched quite a few awards since it premiered in 2020. And after a two-year hiatus since the end of last season, Apple has officially confirmed the show’s return date for season 4. Stillwater returns for season 4 on August 1 For those unfamiliar, Stillwater is Apple’s gentle, mindfulness-focused animated series based on Jon J Muth’s bestselling Zen book collection. The show follows three siblings, Karl, Addy, and Mic