1.
2.
20-Year-Old Malware Rewrites History of Cyber Sabotage
(darkreading.com)
3.
4.
Show HN: Pseudonymizing sensitive data for LLMs without losing context
(news.ycombinator.com)
9.
10.
11.
CyberVolk’s ransomware debut stumbles on cryptography weakness
(bleepingcomputer.com)
12.
Ransomware IAB abuses EDR for stealthy malware execution
(bleepingcomputer.com)
13.
The first new subsea habitat in 40 years is about to launch
(technologyreview.com)
14.
16.
17.
NimDoor crypto-theft macOS malware revives itself when killed
(bleepingcomputer.com)