Hackers Abuse Cloudflare Tunnel Infrastructure to Deliver Multiple RATs
https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure/
Cybersecurity experts have identified a sophisticated attack campaign exploiting Cloudflare’s tunnel infrastructure to distribute various remote access trojans (RATs).
The infrastructure, which has demonstrated remarkable resilience since February 2024, serves as a distribution platform for malicious files and trojans that enable attackers to gain unauthorized access to victims’ systems.
originally posted at https://stacker.news/items/958204
New Cookie-Bite Attack Let Hackers Bypass MFA & Maintain Access to Cloud Servers
https://cybersecuritynews.com/cookie-bite-attack/
A sophisticated attack technique dubbed “Cookie-Bite” enables cybercriminals to silently bypass multi-factor authentication (MFA) and maintain persistent access to cloud environments.
Varonis Threat Labs revealed that attackers leverage stolen browser cookies to impersonate legitimate users without requiring credentials, effectively rendering traditional MFA protections obsolete.
originally posted at https://stacker.news/items/957965
No Longer Science Fiction: Scientists Develop First-Ever Touchable 3D Holograms
UPNA researchers created a 3D mid-air display allowing natural hand interaction with virtual objects using an elastic diffuser and high-speed projections.
Dr. Elodie Bouzbib from the Public University of Navarra (UPNA), together with Iosune Sarasate, Unai Fernández, Manuel López-Amo, Iván Fernández, Iñigo Ezcurdia, and Asier Marzo, has achieved a breakthrough in three-dimensional display technology. The team successfully demonstrated mid-air 3D graphics that can be manipulated using hand gestures. Both Asier Marzo and Iñigo Ezcurdia are members of the Institute of Smart Cities.
originally posted at https://stacker.news/items/957536
Human Consciousness Is a "Controlled Hallucination" And AI Can Never Achieve It
https://www.popularmechanics.com/science/a64555175/conscious-ai-singularity/
Traipse into the world of artificial intelligence research, and it won’t take long to stumble across a concept known as the “singularity.” A loan word from astrophysics describing the heart of a black hole where known physics collapses, the term in the AI sense refers to a future artificial mind surpassing the intelligence of humans, leading to rapid innovation or destruction—depending on who you ask.
originally posted at https://stacker.news/items/957528
Critical Commvault Command Center Flaw Enable Attackers to Execute Code Remotely
https://thehackernews.com/2025/04/critical-commvault-command-center-flaw.html
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations.
The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0.
"A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without authentication," Commvault said in an advisory published on April 17, 2025. "This vulnerability could lead to a complete compromise of the Command Center environment."
originally posted at https://stacker.news/items/957176
Quantum batteries could make quantum computers more efficient
Hooking up a quantum computer to a quantum battery could make it much more energy-efficient and enable machines to pack more processing power into the same physical space.
Quantum batteries, like regular batteries, can store energy to provide power, but rather than using electrochemical reactions, they are built from quantum bits, or qubits, that can extract energy from quantum processes, like entanglement. While they have the advantage of charging much faster than regular devices, researchers have struggled to build working examples or find practical uses for them.
originally posted at https://stacker.news/items/956604
New Malware Hijacking Docker Images with Unique Obfuscation Technique
https://cybersecuritynews.com/new-malware-hijacking-docker-images/
A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking.
Security researchers from Darktrace and Cado Security Labs have analyzed this campaign, revealing both the technical ingenuity of the attackers and the growing risks facing containerized infrastructure.
originally posted at https://stacker.news/items/956390
Underwater Volcano Reveals Thousands of Giant Eggs in Breathtaking Discovery
Beneath the ocean's surface, an astonishing discovery off the coast of Vancouver Island reveals thousands of giant, vibrant eggs nestled within an active underwater volcano, shedding light on the mysterious life cycles of deep-sea creatures and the extraordinary ecosystems that thrive in such extreme environments.
originally posted at https://stacker.news/items/956378
Mind-Blowing Speed of Quantum Entanglement Measured for the First Time
Scientists have achieved a groundbreaking milestone in quantum physics by measuring the speed of quantum entanglement for the first time, a discovery that holds the potential to revolutionize secure communication and computational technologies.
originally posted at https://stacker.news/items/956344
Historic Quantum Physics Breakthrough Reveals What an Electron Really Looks Like
In a groundbreaking revelation that could redefine our understanding of material science, researchers have for the first time measured the shape of a moving electron, promising to revolutionize the fields of quantum physics and electronic manufacturing.
originally posted at https://stacker.news/items/955830
Scientists Discover an Enormous Gravitational Hole in the Indian Ocean
https://www.wecb.fm/scientists-discover-an-enormous-gravitational-hole-in-the-indian-ocean/
Imagine a place in the vast expanse of the Indian Ocean where the gravity feels slightly weaker than anywhere else on Earth. This phenomenon, known as the Indian Ocean Geoid Low (IOGL), has puzzled scientists for decades, and a new study has finally unveiled the reasons behind this mysterious gravitational anomaly.
originally posted at https://stacker.news/items/955489
Active! Mail RCE flaw exploited in attacks on Japanese orgs
An Active! Mail zero-day remote code execution vulnerability is actively exploited in attacks on large organizations in Japan.
Active! mail is a web-based email client developed initially by TransWARE and later acquired by Qualitia, both Japanese companies.
While it's not widely used worldwide like Gmail or Outlook, Active! is often used as a groupware component in Japanese-language environments of large corporations, universities, government agencies, and banks.
originally posted at https://stacker.news/items/954657
Europe whacks American Big Tech with $797 million fine. Meta cries ‘tariff’
https://www.cnn.com/2025/04/23/tech/european-union-apple-meta-fines-intl/index.html
The European Union has fined Apple and Meta a combined €700 million ($797 million) in the first enforcement of its landmark digital competition law.
The penalties for breaching the Digital Markets Act come amid attacks on the EU by the Trump administration for what it sees as the bloc’s unfair targeting of American companies.
originally posted at https://stacker.news/items/954633
Linux Kernel Vulnerability Let Attackers Escalate Privilege - PoC Released
https://cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/
A newly discovered vulnerability, CVE-2024-53141, in the Linux kernel’s IP sets framework has exposed a critical security flaw that allows local attackers to escalate privileges and potentially gain root access.
The vulnerability, assigned a CVSS score of 7.8, uncovered by researchers st424204 and d4em0n, specifically affects the bitmap:ip set type within the netfilter subsystem.
originally posted at https://stacker.news/items/954563
DeepSeek Breach Opens Floodgates to Dark Web
https://www.darkreading.com/cyberattacks-data-breaches/deepseek-breach-opens-floodgates-dark-web
The recent DeepSeek security breach has once again highlighted the significant vulnerabilities in artificial intelligence (AI) systems and raises alarming questions about where the exposed data may have ended up.
Shortly after DeepSeek's release, security researchers uncovered extensive vulnerabilities in the system's infrastructure. Publicly exposed sensitive user data and proprietary information like this often makes its way to the Dark Web — a thriving underground market where stolen data is routinely traded, sold, and exploited.
originally posted at https://stacker.news/items/954554
Cantor nears $3 billion crypto venture with SoftBank and Tether, FT reports
https://finance.yahoo.com/news/cantor-nears-3-billion-crypto-005515690.html
Brandon Lutnick, son of U.S. Commerce Secretary Howard Lutnick and chair of brokerage Cantor Fitzgerald, is partnering with SoftBank, Tether and Bitfinex to create a multibillion-dollar bitcoin acquisition vehicle, the Financial Times reported on Tuesday.
The vehicle, Cantor Equity Partners, will use the cash to create a new firm, called 21 Capital. It will receive $3 billion in bitcoin from the other cryptocurrency investors and trading firms, the report added, citing unnamed sources.
originally posted at https://stacker.news/items/954528
You Could Be at Risk: Earthquake Fault Zones Far Wider Than Previously Thought
Fault zones are often wide, branching networks rather than narrow lines, requiring a shift to 3D models for better earthquake prediction and hazard analysis, while narrow creep zones highlight potential errors in interpreting past seismic events.
At the Seismological Society of America’s Annual Meeting, researchers tackled a deceptively simple question: How wide are faults?
Christie Rowe of the Nevada Seismological Laboratory at the University of Nevada, Reno, and Alex Hatem of the U.S. Geological Survey analyzed global data from individual earthquakes to find a more complete answer, one that accounts for both surface ruptures and deeper fault movements, including creeping sections.
originally posted at https://stacker.news/items/954101
Cyberattack Knocks Texas City’s Systems Offline
https://www.securityweek.com/cyberattack-knocks-texas-citys-systems-offline/
The assault started on April 18, when some of the systems in the city’s internal network were reported as unresponsive, and prompted the immediate activation of the incident response plan.
To secure its network, Abilene disconnected critical assets and the systems that were impacted by the attack, the city’s officials announced on Monday.
“We also launched an investigation and engaged industry-leading cybersecurity experts to determine the nature and scope of the incident and notified relevant authorities,” the officials said.
The city’s IT department has been working over the weekend to restore services and minimize impact on operations, Abilene’s officials said, noting that systems are monitored for any unusual activity.
originally posted at https://stacker.news/items/954093
Google Starts Scanning Your Photos—3 Billion Users Must Now Decide
When Google added photo scanning technology to Android phones, it caused a huge backlash, with the company accused of “secretly” installing new monitoring technology on Android phones “without user permission.”
At the time, Google assured me that SafetyCore was an enabling framework and would not actually start scanning photos or other content. The new app, it said, “provides on-device infrastructure for securely and privately performing classification to help users detect unwanted content. Users control SafetyCore, and SafetyCore only classifies specific content when an app requests it through an optionally enabled feature.”
originally posted at https://stacker.news/items/953760
No Big Bang? A Theory of Repeating Bursts Could Explain Everything
https://scitechdaily.com/no-big-bang-a-theory-of-repeating-bursts-could-explain-everything/
A bold new theory suggests the universe didn’t begin with a single Big Bang, but instead unfolds through a series of ultra-fast, invisible bursts called “temporal singularities.”
These fleeting events flood space with energy and matter, forming the galaxies and structures we see today — without needing dark matter or dark energy. The model challenges long-held cosmological assumptions and offers a fresh explanation for the universe’s expansion, proposing that these singularities, although unobservable, may be the true drivers of cosmic evolution.
originally posted at https://stacker.news/items/953674