Reading view

There are new articles available, click to refresh the page.

Pirated Copies of Microsoft Office Used to Distribute Frequent Malware in South Korea

South Korean South Korea Pirated Copies

South Korean researchers have observed the malicious use of pirated copies and cracked activators of legitimate productivity and office utility programs such as Hangul Word Processor and Microsoft Office to disguise malicious programs. The malware maintains persistence by scheduling regular upgrades on affected systems, leading to consistent installation of newer strains of the malware multiple times every week.

Malicious Pirated Copies of Microsoft Office and Other Programs

Researchers from AhnLab discovered that attackers have been creating and distributing malicious copies of popular utility software. These copies were distributed through common file-sharing platforms and torrent websites. The operation takes advantage of users looking to obtain free copies of software without paying the required license fee. When downloaded and executed, the programs usually appear as convincing cracked installers or activators for programs such as Microsoft Office or the Hangul word processor. While the initial downloader was developed in .NET, the attackers appear to have moved to more obfuscated attack techniques. The malware retrieves its instructions for the next stage of its attack from Telegram or Mastodon channels operated by the attackers. These channels contain encrypted Base64 strings that lead to Google Drive or GitHub URLs that host the malicious payloads. These malicious payloads are downloaded and decrypted through the use of the legitimate 7-zip archive utility that is commonly present on systems and operates with low footprint. Researchers discovered that the decrypted payloads contained PowerShell instructions to load and execute additional malware components on the victim's system. The malware strains loaded on the infected systems include:
  • OrcusRAT: A remote access trojan with extensive capabilities like keylogging, webcam access, and remote screen control.
  • XMRig Cryptominer: Configured to stop mining when resource-intensive apps are running to avoid detection. Also kills competing miners and security products.
  • 3Proxy: Injects itself into legitimate processes to open a backdoor proxy server.
  • PureCrypter: Fetches and runs additional malicious payloads from attacker-controlled servers.
  • AntiAV: Disrupts security products by repeatedly modifying their configuration files.
The commands include an updater that contains instructions to maintain persistence over the system through the use of the native Windows Task Scheduler present on the Windows operating system. C&C server addresses shared by the researchers also indicate that they have been disguised as a minecraft rpg server.

Continuous Reinfection and Distribution

The researchers said systems may remain infected even after the initial infection has been removed, due to the malware's ability to update itself as well as download additional malware payloads. They stated that the attackers had distributed new malware on affected systems multiple times each week to bypass file detection. The researchers said the number of systems that had been compromised in these attacks continued to increase as the registered task scheduler entries loaded additional malicious components on affected systems despite the removal of previous underlying malware. The researchers advised South Korean users to download software and programs from their official sources rather than file-sharing sites. Users who suspect that their systems may already have been infected should remove associated task scheduler entries to block the download of additional malware components, and update their antivirus software to the latest available versions. The researchers have additionally shared indicators of compromise, categories that have been detected as flagged in the attack, MD5 hashes of files used in the attack, associated C&C server addresses, and suspicious behaviors that have been observed during the attack. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

You Can Get Windows 11 Pro for $25 Right Now

You can upgrade your PC to Windows 11 Pro on sale for $24.97 right now (reg. $199) through May 31. The activation key is from a Microsoft-verified partner and backed by over 200 user reviews, and the Pro version of Windows 11 has some great features like Azure AD, Hyper-V, Windows Sandbox, and BitLocker Device Encryption.

Windows 11 comes with features like snap layouts, improved voice typing, seamless redocking, and a redesigned search tool. Other improvements include Biometrics login on supported devices, remote desktop access, TPM 2.0 for hardware-based security, Smart App Control, and Windows Studio Effects for video calls, with noise suppression and background blurring. The license code can be used to upgrade two separate PCs or other compatible devices.

You can get Windows 11 Pro on sale for $24.97 right now (reg. $199) until May 31 at 11:59 p.m. PT, though prices may change at any time.

All the Ways You Can Customize Google Calendar

Google Calendar falls into that category of apps that you probably just load up and use without too much thought. It's designed to be clean, lightweight, and functional by default, and that's perfect when you need to quickly check up on your schedule.

However, you've got more options for changing the look of Google Calendar on the web than you might have realized. Dig a little deeper into the settings, and you'll find you're able to tweak what's on screen in a variety of ways, from the number of days you can see at once, to how recurring and past events are handled in the interface.

If Google Calendar is a key tool you rely on, it makes sense to get it set up in the way that will be most useful to you—providing less clutter, quicker access to the info you need, and less time wasted clicking through to additional screens. Here are all the different settings worth adjsuting.

Custom views

Whatever view you're currently using for Google Calendar on the web, you can change it by clicking on the drop-down menu in the top right corner, to the right of the gear button. It'll be labeled with the name of the current view, like Month or Week. The same drop-down menu features some basic view options, such as whether or not declined events and weekends are shown on screen.

To really take control over what you can see, you can create a custom view. Click the gear button (top right), then Settings and View options. In the Set custom view drop-down menu, you'll see you can choose everything from 2 days to 4 weeks as the time period displayed when you load up Google Calendar in your web browser.

Google Calendar
Get Google Calendar to show a specific number of days on screen. Credit: Lifehacker

The setting is saved automatically, and will appear as the last option in the drop-down menu on the main Google Calendar screen (with the Month and Week options in it). Unfortunately, the same custom view option doesn't sync to the mobile Google Calendar apps—you have to make do with the default ones

Back on the View options page, there's another drop-down menu that lets you control what day the week should start on—Saturday, Sunday, or Monday. This changes the layout of any view where you're looking at more than seven days together at once. Last but not least, there's a keyboard shortcut you can make use of in the Google Calendar web app to quickly jump to your custom view: Just tap the X key.

Other view options

Click the gear icon (top right), choose Settings and View options, and you'll see there are several other ways to configure the look of Google Calendar, besides creating your own custom view. Use Reduce the brightness of past events to have older calendar entries look more faded on screen, for example—a handy way of helping you see where you're up to in your current schedule.

There are check boxes for showing or hiding weekends, showing or hiding events you've declined invitations to, and showing or hiding completed tasks. Getting some of these details off screen can reduce the clutter in Google Calendar, making your timetable easier on the eye. Number labels for the weeks can be shown or hidden too.

Google Calendar
You can change the density of the layout and the color choices too. Credit: Lifehacker

Open up the Time zone tab on the Settings page, and you're able to get a secondary time zone displayed on the day and week views—this makes it easier to see how events are scheduled across different parts of the world. You can also enable several time zone clocks in the side panel on the left, via the World clock tab: You can see at a glance what time it is in a city (and what the weather's currently doing, too).

Then you've got the settings you can edit on the actual Google Calendar view itself. Click the three horizontal lines (top left) to show or hide the left-hand side panel, and in that panel use the check boxes to show and hide individual calendars—a quick way of focusing on what you really need to see. You can also click the gear icon (top right) then Density and color to tweak the text size and label colors used.

These Tools Let You Run Windows Apps on macOS

Getting the Windows experience on a Mac computer has become more difficult with the arrival of Apple's own chipsets: The Boot Camp Assistant developed by Apple that allowed dual-booting doesn't work at all with Apple silicon computers, while emulators like Parallels aren't quite as straightforward to use on these newer systems either.

With that in mind, if you do need to get a Windows program running on macOS, it's easier to just focus on that one app—rather than emulating the entire operating system. There are a couple of user-friendly tools for macOS that can help here, so you can bring over your favorite Windows apps to your Mac without too much trouble.

Wineskin

Wineskin is the free option here, and it uses the Homebrew package manager. You need to open up Terminal on macOS, type the following command, then hit Enter:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

Once the Homebrew installation process completes, you'll see instructions to run the following commands to complete the setup, with your account name listed where is (hit Enter after each one):

(echo; echo 'eval "$(/opt/homebrew/bin/brew shellenv)"') >> /Users//.zprofile

eval "$(/opt/homebrew/bin/brew shellenv)"

With Homebrew set up successfully, you're ready to install Wineskin. At the Terminal prompt, enter the following text and press Enter:

brew install --cask --no-quarantine gcenx/wine/unofficial-wineskin

When you see the message telling you that Wineskin has been installed, you can close down the Terminal and open Wineskin from the Applications folder in Finder, or by looking for it in Spotlight.

Wineskin macOS
Setting up Wineskin on macOS. Credit: Lifehacker

First up, you need to install an engine by clicking on the + (plus) icon—it's fine to select the default one that pops up, but sometimes different Windows apps need different engines, so you may need to swap if you're experiencing problems. Then, click Update Wrapper to get the latest master wrapper, which packages your app of choice in a way that means it can run on macOS.

With that done, click Create New Blank Wrapper. At this point you need to give your new wrapper a name to identify it and the program it's running. Your wrapper will be set up in Finder, in the Wineskin folder in your user applications list (you'll be asked if you want to jump straight to it when the initial setup process has been completed).

Wineskin macOS
You'll need to point Wineskin to a Windows executable. Credit: Lifehacker

Launch this wrapper, and you're then ready to choose the Windows executable you want to run. Try Install Software first, as this is the easiest option: You can point Wineskin to a setup file, or a folder of files (for portable apps). Wineskin should handle the process of getting everything configured, and you can then run the wrapper whenever you like to use the Windows application.

If this doesn't work for the program you're using, click Advanced on the main Wineskin dialog to access more options—you can point the tool towards specific executables, change how Windows keys are remapped to macOS keys, and customize various other aspects of the way Wineskin tries to run this particular program.

CrossOver

CrossOver macOS
CrossOver offers a library of Windows software to install. Credit: Lifehacker

CrossOver is the paid option: It'll set you back $74, but there is a free 14-day trial available so you can see if it's worth your while before parting with any cash. It's a little more user-friendly than Wineskin and gives you more help along the way, so some people will find it the better choice even with the cost attached.

Get the software installed and set up, then simply search for the Windows program you want to run—like Steam, for example, if you want to do some gaming. You'll see each app title is accompanied by a star rating that tells you how well the program works through CrossOver on macOS (which can save you some money buying apps and games that aren't going to work great).

CrossOver macOS
Setting up a Windows app on macOS with CrossOver. Credit: Lifehacker

When you've got the program you want, click Install, and everything is handled for you. CrossOver gets the Windows application set up, and within a few minutes you should be enjoying your Windows software on macOS. CrossOver keeps a list of your installed programs as "bottles" in its main interface, and you can select them from there to run them and configure various aspects of how they're deployed on macOS.

If the program you want to run isn't listed in the Install screen in CrossOver, click the Install an unlisted application option on the right. The process here is a little bit more involved, but not overly so—you'll need to give CrossOver more details about the application that you're trying to install, and where the setup executable is.

Russian Hackers Use Legit Remote Monitoring Software to Spy on Ukraine and Allies

Remote Monitoring, RMM

Russian hackers were found using legitimate remote monitoring and management software to spy on Ukraine and its allies. The malicious scripts required for downloading and running the RMM program on the victims’ computers are hidden among the legitimate Python code of the “Minesweeper” game from Microsoft. The Government Computer Emergency Response Team of Ukraine (CERT-UA), operating under the State Special Communications Service, warned that Russian cybercriminals are using the legitimate SuperOps RMM software program to gain unauthorized access to Ukrainian organizations’ information systems, particularly those in the financial sector. The Cyber Security Center of the National Bank of Ukraine (CSIRT-NBU) and CERT-UA recorded and analyzed phishing emails sent to victims with a Dropbox link containing an executable file (.SCR) that was about 33 megabytes in size. The emails were sent from the address “support@patient-docs-mail.com,” which impersonated a medical center and had the subject line “Personal Web Archive of Medical Documents.” The .SCR file contained a Python clone of the Minesweeper game along with malicious Python code that downloads additional scripts from a remote source “anotepad.com.” The Minesweeper code contained a function named “create_license_ver” which is repurposed to decode and execute the hidden malicious code. The legitimate SuperOps RMM program is eventually downloaded and installed from a ZIP file, granting attackers remote access to the victim’s computer. The CERT-UA found five similar files, named after financial and insurance institutions in Europe and the USA, indicating that these cyberattacks, which took place between February and March 2024, have a wide geographic reach. CERT-UA tracked this threat activity to an actor it identified as UAC-0188. UAC-0118, also known as FRwL or FromRussiaWithLove, is a Russian state-aligned hacktivist threat actor group that emerged during the Russia-Ukraine war in 2022. They primarily targeted critical infrastructure, media, energy and government entities. FRwL has been previously linked to the use of the Vidar stealer and Somnia ransomware, which they employ as a data wiper rather than for financial gain. While there is no direct evidence linking FRwL to the Russian Main Intelligence Directorate, it is possible that they coordinate activities with state-aligned hacktivist groups.

Possible Defense Against Ongoing Remote Monitoring Campaign

CERT-UA recommends the following:
  • Organizations not using SuperOps RMM should verify the absence of network activity associated with the domain names: [.]superops[.]com, [.]superops[.]ai.
  • Improve employee cyber hygiene.
  • Use and constantly update anti-virus software.
  • Regularly update operating systems and software.
  • Use strong passwords and change them regularly.
  • Back up important data.

Ukrainian Financial Institutions Also on Smokeloader’s Radar

The financially motivated group UAC-0006 has actively launched phishing attacks targeting Ukraine through 2023. CERT-UA reported the resurfacing of UAC-0006 in spring 2024, with hackers attempting to distribute Smokeloader, a common malware in the group’s toolkit. This threat group’s goal has primarily been to steal credentials and execute unauthorized fund transfers, posing a significant risk to financial systems. SmokeLoader is a malicious bot application and trojan that can evade security measures to infect Windows devices. It can then install other malware, steal sensitive data and damage files, among other issues. Throughout 2023, UAC-0006 conducted several phishing campaigns against Ukraine, exploiting financial lures and using ZIP and RAR attachments to distribute Smokeloader CERT-UA last week issued another warning about a significant surge in UAC-0006 activity. Hackers have conducted at least two campaigns to distribute Smokeloader, displaying similar patterns to previous attacks. The latest operations involve emails with ZIP archives containing images that include executable files and Microsoft Access files with macros that execute PowerShell commands to download and run other executable files. After initial access, the attackers download additional malware, including TALESHOT and RMS. The botnet currently consists of several hundred infected computers. CERT-UA anticipates an increase in fraudulent operations involving remote banking systems and thus, strongly recommends enhancing the security of accountants’ automated workstations and ensuring the implementation of necessary policies and protection mechanisms to reduce infection risks. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Tearful testimony confirms for many how much Post Office’s Vennells knew

There were times during Horizon inquiry when victims of scandal struggled to keep composure as former chief executive pleaded ignorance

It was difficult for the victims attending the public inquiry into the Horizon scandal on the fifth floor of Aldwych House in central London to demur from the conclusion of Moya Greene, a former chief executive of Royal Mail and Paula Vennells’ boss until the Post Office split off in 2012.

“I think you knew,” Greene had written to Vennells in January, according to a text message published by the inquiry this week.

Continue reading...

💾

© Photograph: James Veysey/REX/Shutterstock

💾

© Photograph: James Veysey/REX/Shutterstock

Courtroom Recording Platform Abused to Deliver Backdoor Implant

Courtroom recording Platform

Hackers compromised a popular courtroom recording platform used across jails and prisons around the globe, to gain full control of systems through a backdoor implanted in a software update. Justice AV Solutions (JAVS) software records events like lectures, court hearings and council meetings, with over 10,000 installations worldwide. Users can download it through the vendor's website as a Windows-based installer package. This week, the company announced it had identified a security issue with a previous version of its JAVS Viewer software. The company stated on Thursday, “Through ongoing monitoring and collaboration with cyber authorities, we identified attempts to replace our Viewer 8.3.7 software with a compromised file.” JAVS removed all versions of Viewer 8.3.7 from its website, reset all passwords and conducted a full internal audit of its systems. The company confirmed that all currently available files on the JAVS website are genuine and malware-free. It also verified that no JAVS source code, certificates, systems, or other software releases were compromised. The malicious file containing malware did not originate from JAVS or any associated third party. As a precautionary measure, the company urged users to verify any JAVS software they install is digitally signed by the company.
“Manually check for file 'fffmeg.exe': If the malicious file is found or detected, we recommend a full re-image of the PC and a reset of any credentials used by the user on that computer.”
If Viewer 8.3.7.250 is the version currently installed, but no malicious files are found, JAVS advised uninstalling the Viewer software and performing a full Anti-Virus/malware scan. “Please reset any passwords used on the affected system before upgrading to a newer version of Viewer 8,” the company recommended. Cybersecurity firm Rapid7 analyzed the issue and found that the corrupted JAVS Viewer software, which opens media and logs files, included a backdoored installer that gives attackers full access to affected systems. Based on the open-source intelligence, Rapid7 determined that the binary fffmpeg.exe is associated with the GateDoor and Rustdoor malware family. These malwares perform malicious actions such as collecting information, downloading additional files, and executing commands. RustDoor focuses on backdoor functions, but GateDoor has many loader functions. “The infrastructure used by the two malware appears to be related to a RaaS affiliate called ShadowSyndicate, and the possibility that they are cybercrime collaborators who specialize in providing infrastructure cannot be ruled out,” said S2W, the company who first observed the backdoors earlier in February. Rapid7 tracked the issue as CVE-2024-4978 and coordinated the disclosure with the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Rapid7 noted that the malicious versions of the software were signed by "Vanguard Tech Limited," allegedly based in London. In its advisory, Rapid7 urged users to reimage all endpoints where the software was installed and reset credentials on web browsers and for any accounts logged into affected endpoints, both local and remote.
“Simply uninstalling the software is insufficient, as attackers may have implanted additional backdoors or malware. Re-imaging provides a clean slate,” Rapid7 advised.
The issue first surfaced on platform X (formerly Twitter) in April when a threat intelligence researcher claimed that “malware is being hosted on the official website of JAVS.” On May 10, Rapid7 responded to an alert on a client's system and traced an infection back to an installer downloaded from the JAVS website. The malicious file downloaded by the victim was no longer available on the website, and it's unclear who removed it. A few days later, researchers found a different installer file containing malware on the JAVS website, confirming the vendor site as the source of the initial infection. JAVS did not comment on the discrepancy between their findings and Rapid7's analysis. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Best Keyboard Shortcuts to Use on Spotify

Here at Lifehacker we're big fans of keyboard shortcuts, whether it's for your operating system, your web browser, or any of your web apps. They help you get more done in a shorter period of time, without having to lift your fingers from the keyboard or shift your gaze from whatever you're looking at (if your muscle memory is fully trained).

You can actually find keyboard shortcuts in more places than you might have realized, and that includes desktop and web apps for Windows and macOS. Sure, the desktop clients are easy enough to use without them, but when you need to skip a song or lower the volume, they can be really helpful.

We're going to mention some of our favorite ones for Spotify here, but you can see a full list by pressing Ctrl+? (Windows) or Cmd+? (macOS). Most shortcuts are the same across both operating systems, if you use Cmd in place of Ctrl (or vice versa), and they should work fine in both the desktop client and the web app player.

Basic playback controls

Spotify app
Playback can be controlled with Space. Credit: Lifehacker

Start and stop playback: Got a video call coming in? Someone shouting at you from another room? Hit Space to pause audio playback, then tap it again to carry on.

Shuffle and repeat: If you want to mix up the current playlist or hear the same songs over again (or both), Ctrl/Cmd+S toggles the shuffle mode, and Ctrl/Cmd+R toggles repeat.

Skip forwards and backwards: Navigating playlists is a key part of using Spotify, and Ctrl/Cmd+Right arrow and Ctrl/Cmd+Left arrow will skip forwards and backwards.

Seek forwards and backwards: If you want to jump around within a track, on Windows it's Shift+Right arrow or Shift+Left arrow. On macOS, hold down the Cmd key as well.

Raise or lower the volume: If some adjustment to the Spotify audio volume is required, use Ctrl/Cmd+Up arrow or Ctrl/Cmd+Down arrow to raise or lower it as required.

Like the current track: Sometimes you'll want to like the current track on Spotify without having to search it out—use Shift+Alt+B on Windows or Shift+Option+B on macOS.

Playlists and music

Spotify app
Use Ctrl/Cmd+N to create a new playlist. Credit: Lifehacker

Get to your playlists: You can use the Shift+Alt+1 (Windows) or Shift+Option+1 (macOS) shortcut to see your playlists; replace 1 with 0 to jump to the Your Library screen instead.

Create new playlists: The keyboard shortcut for creating a new Spotify playlist is Ctrl/Cmd+N; if you want to create a new playlist folder, hold down the Shift key as well.

Filter tracks in the current playlist: If you want to pick our tracks in the current playlist, use Ctrl/Cmd+F—a search bar then appears at the top of the playlist for you to fill out.

Search for something to listen to: If you want to run a search of the entire Spotify catalog, use Ctrl/Cmd+K to bring up the quick search box, then add your search query.

Search inside your library: For running searches that you want to limit to tracks that have been saved to your Spotify library, use Ctrl+Alt+F (Windows) or Cmd+Option+F (macOS).

Select everything: There will be a few screens where you want to select all the tracks on screen, whether it's an album or a playlist or something else—Ctrl/Cmd+A is the shortcut.

Layout and navigation

Spotify app
Get to the Spotify settings with the Ctrl/Cmd+, shortcut. Credit: Lifehacker

Open the context menu: If you need to access the context menu on a track or album or anything else selected in Spotify, you can use Alt+J on Windows or Option+J on macOS.

See the queue: Want to know what's coming up next in the Spotify queue? Use Alt+Shift+Q (Windows) or Option+Shift+Q (macOS) to see the queue on the right.

Jump to the currently playing track: If you've navigated away to the playlist that's playing and want to get back, tap Alt+Shift+J on Windows or Option+Shift+J on macOS.

See what's new: If you're in need of something new to listen to, the Shift+Alt+N (Windows) or Shift+Option+N (macOS) will take you straight to Spotify's new music page.

Toggle the sidebars: Use Shift+Alt+L and Shift+Alt+R (Windows), or Shift+Option+L and Shift+Option+R (macOS) to show or hide the left and right sidebars in the Spotify app.

Open up Spotify preferences: If you need to customize any aspect of your Spotify experience, tap Ctrl/Cmd+, (comma) to get straight to the main settings screen.

Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search – Source: www.bleepingcomputer.com

microsoft-outage-affects-bing,-copilot,-duckduckgo-and-chatgpt-internet-search-–-source:-wwwbleepingcomputer.com

Source: www.bleepingcomputer.com – Author: Mayank Parmar A massive Microsoft outage affects Bing.com, Copilot for web and mobile, Copilot in Windows, ChatGPT internet search and DuckDuckGo. Microsoft outage started at approximately 3 AM EDT and seems to have primarily affected users in Asia and Europe. According to user reports and our tests, if you try to open Bing.com, […]

La entrada Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

These New Emojis May Be Included in iOS 18 and Android 15

Who doesn't love new emojis? Sure, we all use the classics, but can you imagine digital life without Melting Face or Salute Face? (I certainly can't.) So, when you hear about new emojis in the works, it's always good news.

Before we get too carried away, these emojis aren't ready for primetime just yet. Instead, it turns out the Unicode Consortium, the organization which maintains the Unicode standard, has released a short list of new emoji candidates for Unicode 16. This list contains seven new emoji and one new flag, and, if approved, will be included with the rest of the Unicode 16 standard in a future version of iOS and Android. In all likelihood, a version of iOS 18 and a version of Android 15 will get the following emojis:

  • Face With Bags Under Eyes

  • Fingerprint

  • Leafless Tree

  • Root Vegetable

  • Harp

  • Shovel

  • Splatter

  • Flag: Sark

I imagine, among these eight, the "face with bags under eyes" will get the most use. Even Unicode's interpretation of the emoji is fun, so I look forward to what designers for Apple, Google, Samsung, and other companies make of it. As for Sark, it's a tiny, autonomous, car-free island located between England and France. I'm happy its population of 562 will soon have an emoji of their flag.

As these eight emojis are heading into the Unicode 16 beta, it's not clear when we'll actually see them both accepted and on platforms like iOS and Android. The beta itself lasts through July 2. The last time we got an emoji update was back in January: Those of us on iOS got six new emoji with iOS 17.4, including Head Shaking Horizontally, Head Shaking Vertically, Phoenix, Lime, Brown Mushroom, and Broken Chain. Truth be told, I'm not sure I've used a single one of those since they launched. (I guess I don't shake my head enough.)

Shadow of the Erdtree’s trailer gives us more Elden Ring lore to get wrong

"Look, everybody! It's the one thing that ties the whole story together! And it's pointing us toward this legacy dungeon, inside which must surely lie safety and salvation. Let us go forth."

Enlarge / "Look, everybody! It's the one thing that ties the whole story together! And it's pointing us toward this legacy dungeon, inside which must surely lie safety and salvation. Let us go forth." (credit: FromSoftware/Bandai Namco)

There are lots of ways to enjoy Elden Ring, beyond the core attack/dodge/survive gameplay. You can obsess over builds, appreciate the mastery of speedrunners and grand masters like Let Me Solo Her, or mix and match the huge variety of armor in pursuit of Fashion Souls. And then there is lore. There is so much of it, and most of it has the consistency of campfire smoke.

Elden Ring tells its backstory (written in part by George R.R. Martin) primarily through item descriptions and environmental hints. The scraps of narrative that do exist stand unsteadily against unreliable narrators, contradictions, cut content, and lovably enthusiastic fans who take small hints to their illogical extremes. Developer FromSoftware and primary creator Hidetaka Miyazaki do almost nothing to disprove misunderstandings or reward accurate conclusions, although they appreciate the energy. Miyazaki will just casually tell IGN that there's a "small element" that hasn't been discovered, offer nothing more on that, and leave fans like me craven with an unmet need for conclusion.

Elden Ring: Shadow of the Erdtree story trailer.

I love this and cherish the way FromSoftware will never in my lifetime confirm my hopes or expectations. So with the surprise arrival of an honest-to-goodness story-based trailer for the Shadow of the Erdtree expansion, due out June 21, I was given yet another feast of vague notions and evocative images.

Read 11 remaining paragraphs | Comments

Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities

Several vulnerabilities have been discovered in the Linux kernel that could lead to privilege escalation, denial of service, or information leaks. The Ubuntu security team has addressed these issues in the latest Ubuntu security updates for multiple releases. In this article, we will explore some of the vulnerabilities fixed and learn how to apply updates […]

The post Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities appeared first on TuxCare.

The post Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities appeared first on Security Boulevard.

CATSTRAVAGANZA

The Desktop Cat Cursor (not free but really cheap) , from Samperson, turns your computer's pointer into a big cat's paw extending onto the screen. Currently only for Windows 10 and 11 but a Mac version is in the works.

YO DAWG KAT, I HEARD YOU LIKE.... You could pair the Desktop Cat Cursor with this update of the classic desktop toy Neko for extra kitty fun. This rewrite requires ability to compile Go (I got it working pretty easily), but should work on most desktop platforms. It doesn't expose a UI so you'll have to do an end-task to close it. (If you start it from a command line, you could halt it with Ctrl-C.)

Backdoors and Miners Amid eScan Antivirus Backdoor Exploit

Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, posing a significant threat to large corporate networks. In this blog, we’ll look into the details of this eScan antivirus backdoor exploit and […]

The post Backdoors and Miners Amid eScan Antivirus Backdoor Exploit appeared first on TuxCare.

The post Backdoors and Miners Amid eScan Antivirus Backdoor Exploit appeared first on Security Boulevard.

❌