Hi guys, To celebrate the #BitcoinPizzaDay I'm selling a full ticket pass for the #Bitcoin2025 conference in Vegas with a good discount. It includes the following perks: 1. Admission to Days 2 and 3 of Bitcoin 2025 2. Access to Main Stage, Open-Source Stages, and more featuring top speakers 3. Entry to the world’s largest Bitcoin Expo Hall 4. Access to the Bitcoin Conference App Does not include access to Code & Country Industry Day If someone is interested - DM me.
Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents Security researchers at Fortinet’s FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized Microsoft Word documents to deliver information-stealing malware to unsuspecting Windows users. The attack exploits a well-known vulnerability to deploy FormBook, a dangerous malware variant designed to harvest sensitive user credentials and data. originally posted at
Scientists discover elusive third type of quantum particle Researchers suggest a new class of quantum particles, paraparticles, could exist, expanding beyond the known fermions and bosons. originally posted at
Hackers Abuse Cloudflare Tunnel Infrastructure to Deliver Multiple RATs Cybersecurity experts have identified a sophisticated attack campaign exploiting Cloudflare’s tunnel infrastructure to distribute various remote access trojans (RATs). The infrastructure, which has demonstrated remarkable resilience since February 2024, serves as a distribution platform for malicious files and trojans that enable attackers to gain unauthorized access to victims’ systems. originally posted at
New Cookie-Bite Attack Let Hackers Bypass MFA & Maintain Access to Cloud Servers A sophisticated attack technique dubbed “Cookie-Bite” enables cybercriminals to silently bypass multi-factor authentication (MFA) and maintain persistent access to cloud environments. Varonis Threat Labs revealed that attackers leverage stolen browser cookies to impersonate legitimate users without requiring credentials, effectively rendering traditional MFA protections obsolete. originally posted at
No Longer Science Fiction: Scientists Develop First-Ever Touchable 3D Holograms UPNA researchers created a 3D mid-air display allowing natural hand interaction with virtual objects using an elastic diffuser and high-speed projections. Dr. Elodie Bouzbib from the Public University of Navarra (UPNA), together with Iosune Sarasate, Unai Fernández, Manuel López-Amo, Iván Fernández, Iñigo Ezcurdia, and Asier Marzo, has achieved a breakthrough in three-dimensional display technology. The team successfully demonstrated mid-air 3D graphics that can be manipulated using hand gestures. Both Asier Marzo and Iñigo Ezcurdia are members of the Institute of Smart Cities. originally posted at
Human Consciousness Is a "Controlled Hallucination" And AI Can Never Achieve It Traipse into the world of artificial intelligence research, and it won’t take long to stumble across a concept known as the “singularity.” A loan word from astrophysics describing the heart of a black hole where known physics collapses, the term in the AI sense refers to a future artificial mind surpassing the intelligence of humans, leading to rapid innovation or destruction—depending on who you ask. originally posted at
Critical Commvault Command Center Flaw Enable Attackers to Execute Code Remotely A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. "A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without authentication," Commvault said in an advisory published on April 17, 2025. "This vulnerability could lead to a complete compromise of the Command Center environment." originally posted at
Quantum batteries could make quantum computers more efficient Hooking up a quantum computer to a quantum battery could make it much more energy-efficient and enable machines to pack more processing power into the same physical space. Quantum batteries, like regular batteries, can store energy to provide power, but rather than using electrochemical reactions, they are built from quantum bits, or qubits, that can extract energy from quantum processes, like entanglement. While they have the advantage of charging much faster than regular devices, researchers have struggled to build working examples or find practical uses for them. originally posted at
New Malware Hijacking Docker Images with Unique Obfuscation Technique A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking. Security researchers from Darktrace and Cado Security Labs have analyzed this campaign, revealing both the technical ingenuity of the attackers and the growing risks facing containerized infrastructure. originally posted at