• Trump Seems Awfully Touchy About the Impression That He's Taking Orders From Elon Musk
    futurism.com
    Who's really in control? The President of the United States or his most outspoken financial backer?Now that multi-hyphenate billionaire Elon Musk's deep pockets got Donald Trump reelected, some tough questions have emerged for the incoming administration.Trump isn't laughing as Musk continues taking matters into his own hands, often giving the impression that the SpaceX CEO rather than his septuagenarian pal is really in charge of the upcoming White House.Trump spokesperson Karoline Leavitt seemed very touchy today about the suggestion that it's Musk calling the shots."As soon as President Trump released his official stance on [efforts to avoid a government shutdown], Republicans on Capitol Hill echoed his point of view," she said. "President Trump is the leader of the Republican Party. Full stop."Trump has previously issued a jokesy warning to Musk not to undermine his authority too much. But the situation gained new momentum this week when Musk took to X,in a barrage of over 100 posts, to pressure lawmakers to kill a bipartisan spending bill that would avoid an imminent government shutdown.Though he's been put in charge of a so-called Department of Government Efficiency which will operate from outside the government and play only an advisory role to slash the federal budget, Musk isn't an elected politician.Yet to Democrats and Republicans alike, his repeated calls to torpedo the bill efforts which have appeared to pay off made it feel like he was setting the agenda, instead of Trump himself."President-elect Musk is really setting down the marker of how he wants to run his administration,"former GOP representative Adam Kinzinger joked. "VP Trump better pay attention."Kinzinger's comments, and many others like it, have clearly struck a nerve, as evidenced by Leavitt's statement.Unsurprisingly, the torpedoing of the bill had plenty of lawmakers equally furious."Democrats and Republicans spent months negotiating a bipartisan agreement to fund our government," said senator Bernie Sanders in a statement. "The richest man on Earth, President Elon Musk, doesnt like it. Will Republicans kiss the ring?"Nobody really knows how this situation will pan out. Is Trump a "shadow president," operating in the pocket of the world's richest man? What other kinds of change could a furious Musk bring to the US government?This isn't just a pointless kerfuffle amongst some extremely influential people Musk's growing influence could have potentially incredibly harmful and destabilizing effects on how the US government is run, affecting the entire country and world.Meanwhile, Trump loyalists in Congress are holding the line that Musk and Trump have forged a lasting relationship."DOGE can only truly be accomplished by reigning in Congress to enact real government efficiency," representative Marjorie Taylor Greene tweeted. "The establishment needs to be shattered just like it was yesterday."Share This Article
    0 Comments ·0 Shares ·78 Views
  • A Quantum Computer Could Crack Bitcoin in Half, Research Finds
    futurism.com
    Earlier this month, Google announced a brand-new quantum chip dubbed Willow.The 105-qubit chip that's double the qubit count of the tech giant's preceding Sycamore chip completed a computation in under five minutes that would take a modern supercomputer a "mind-boggling" 10 septillion years, the company said.The news reignited a debate surrounding the security of blockchains, the distributed ledgers that run digital currencies like Bitcoin. Could a future quantum computer break the cryptocurrency's encryption, allowing thieves to abscond with unfathomable sums?As Fortune reports, researchers at the University of Kent found in a yet-to-be-peer-reviewed study that the risk is very real. In fact, just the downtime required to update the blockchain to protect itself from an encryption-breaking quantum computer could extend to 76 days and the resulting losses would likely be staggering."Bringing your technology down... can be very, very costly, even if its on for a few minutes or a few hours," coauthor and senior lecturer at the University of Kent Carlos Perez-Delgado told Fortune."If I had a large quantum computer right now, I could essentially take over all the Bitcoin," he added. "By tomorrow, I could be reading everybodys email and getting into everybodys computer accounts, and thats just the fact."But exactly how imminent this threat is remains highly debatable. In an update last week, AllianceBernstein analysts argued that Bitcoin contributors should "start preparing for the quantum future."However, "any practical threat to Bitcoin seems decades away," the analysts wrote.Researchers have similarly argued that it would take quantum computers with millionsof qubits to break Bitcoin encryption in a single day.Analysts have also found that SHA-256 encryption, which serves as the security measure protecting Bitcoin miners today, could eventually be cracked albeit with quantum hardware that hasn't even been dreamed up yet.On a broader scale, apart from cracking cryptocurrencies, Google's latest quantum chip also falls woefully short of doing anything actually useful as of right now."The particular calculation in question is to produce a random distribution," German physicist and science communicator Sabine Hossenfeldertweeted in response to Google's recent announcement. "The result of this calculation has no practical use."In short, while many agree that quantum computers could pose a growing threat to the cryptography behind Bitcoin, the cryptocurrency community could still have plenty of time to implement changes to protect the blockchain.Which is easier said than done. As Fortune points out, Bitcoin's decentralized nature could make pushing an encryption update an immense task.But that doesn't mean the cryptocurrency shouldn't do it. In an October blog post, Vitalik Buterin, the cofounder of the prominent cryptocurrency Ethereum, argued that advancing quantum computing tech could have "consequences across the entire Ethereum roadmap.""The indisputable fact that nobody can argue is that when we do get there," Perez-Delgado told Fortune, "our current securities, the cybersecurity systems which includes everything from Bitcoin to email will be in great danger."More on Bitcoin: Man Accused of Being Satoshi Nakamoto Goes Into HidingShare This Article
    0 Comments ·0 Shares ·78 Views
  • Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
    thehackernews.com
    Dec 19, 2024Ravie LakshmananSupply Chain / Software SecurityThreat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry.The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve second-stage payloads, respectively."While typosquatting attacks are hardly new, the effort spent by nefarious actors on these two libraries to pass them off as legitimate is noteworthy," Sonatype's Ax Sharma said in an analysis published Wednesday."Furthermore, the high download counts for packages like "types-node" are signs that point to both some developers possibly falling for these typosquats, and threat actors artificially inflating these counts to boost the trustworthiness of their malicious components."The npm listing for @typescript_eslinter/eslint, Sonatype's analysis revealed, points to a phony GitHub repository that was set up by an account named "typescript-eslinter," which was created on November 29, 2024. Present with this package is a file named "prettier.bat." Another package linked to the same npm/GitHub account is named @typescript_eslinter/prettier. It impersonates a well-known code formatter tool of the same name, but, in reality, is configured to install the fake @typescript_eslinter/eslint library.The malicious library contains code to drop "prettier.bat" into a temporary directory and add it to the Windows Startup folder so that it's automatically run every time the machine is rebooted."Far from being a 'batch' file though, the "prettier.bat" file is actually a Windows executable (.exe) that has previously been flagged as a trojan and dropper on VirusTotal," Sharma said.On the other hand, the second package, types-node, incorporates to reach out to a Pastebin URL and fetch scripts that are responsible for running a malicious executable that's deceptively named "npm.exe.""The case highlights a pressing need for improved supply chain security measures and greater vigilance in monitoring third-party software registry developers," Sharma said.The development comes as ReversingLabs identified several malicious extensions that were initially detected in the Visual Studio Code (VSCode) Marketplace in October 2024, a month after which one additional package emerged in the npm registry. The package attracted a total of 399 downloads.The list of rogue VSCode extensions, now removed from the store, is below -EVM.Blockchain-ToolkitVoiceMod.VoiceModZoomVideoCommunications.ZoomZoomINC.Zoom-WorkplaceEthereum.SoliditySupportZoomWorkspace.Zoomethereumorg.Solidity-Language-for-EthereumVitalikButerin.Solidity-EthereumSolidityFoundation.Solidity-EthereumEthereumFoundation.Solidity-Language-for-EthereumSOLIDITY.Solidity-LanguageGavinWood.SolidityLangEthereumFoundation.Solidity-for-Ethereum-Language"The campaign started with targeting of the crypto community, but by the end of October, extensions published were mostly impersonating the Zoom application," ReversingLabs researcher Lucija Valenti said. "And each malicious extension published was more sophisticated than the last."All the extensions as well as the npm package have been found to include obfuscated JavaScript code, acting as a downloader for a second-stage payload from a remote server. The exact nature of the payload is currently not known.The findings once again emphasize the need for exercising caution when it comes to downloading tools and libraries from open-source systems and avoid introducing malicious code as a dependency in a larger project. "The possibility of installing plugins and extending functionality of IDEs makes them very attractive targets for malicious actors," Valenti said. "VSCode extensions are often overlooked as a security risk when installing in an IDE, but the compromise of an IDE can be a landing point for further compromise of the development cycle in the enterprise."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·96 Views
  • Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords
    thehackernews.com
    Dec 19, 2024Ravie LakshmananMalware / BotnetJuniper Networks is warning that Session Smart Router (SSR) products with default passwords are being targeted as part of a malicious campaign that deploys the Mirai botnet malware.The company said it's issuing the advisory after "several customers" reported anomalous behavior on their Session Smart Network (SSN) platforms on December 11, 2024."These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network," it said. "The impacted systems were all using default passwords."Mirai, which has had its source code leaked in 2016, has spawned several variants over the years. The malware is capable of scanning for known vulnerabilities as well as default credentials to infiltrate devices and enlist them into a botnet for mounting distributed denial-of-service (DDoS) attacks.To mitigate such threats, organizations are recommended to change their passwords with immediate effect to strong, unique ones (if not already), periodically audit access logs for signs of suspicious activity, use firewalls to block unauthorized access, and keep software up-to-date.Some of the indicators associated with Mirai attacks include unusual port scanning, frequent SSH login attempts indicating brute-force attacks, increased outbound traffic volume to unexpected IP addresses, random reboots, and connections from known malicious IP addresses."If a system is found to be infected, the only certain way of stopping the threat is by reimaging the system as it cannot be determined exactly what might have been changed or obtained from the device," the company said.The development comes as the AhnLab Security Intelligence Center (ASEC) revealed that poorly managed Linux servers, particularly publicly exposed SSH services, are being targeted by a previously undocumented DDoS malware family dubbed cShell."cShell is developed in the Go language and is characterized by exploiting Linux tools called screen and hping3 to perform DDoS attacks," ASEC said.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·106 Views
  • Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits
    thehackernews.com
    Dec 19, 2024Ravie LakshmananVulnerability / Network SecurityFortinet has issued an advisory for a now-patched critical security flaw impacting Wireless LAN Manager (FortiWLM) that could lead to disclosure of sensitive information.The vulnerability, tracked as CVE-2023-34990, carries a CVSS score of 9.6 out of a maximum of 10.0."A relative path traversal [CWE-23] in FortiWLM may allow a remote unauthenticated attacker to read sensitive files," the company said in an alert released Wednesday.However, according to a description of the security flaw in the NIST's National Vulnerability Database (NVD), the path traversal vulnerability could also be exploited by an attacker to "execute unauthorized code or commands via specially crafted web requests."The flaw impacts the following versions of the product -FortiWLM versions 8.6.0 through 8.6.5 (Fixed in 8.6.6 or above)FortiWLM versions 8.5.0 through 8.5.4 (Fixed in 8.5.5 or above)The company credited Horizon3.ai security researcher Zach Hanley for discovering and reporting the shortcoming. It's worth mentioning here that CVE-2023-34990 refers to the "unauthenticated limited file read vulnerability" the cybersecurity company revealed back in March as part of a broader set of six flaws in FortiWLM."This vulnerability allows remote, unauthenticated attackers to access and abuse builtin functionality meant to read specific log files on the system via a crafted request to the /ems/cgi-bin/ezrf_lighttpd.cgi endpoint," Hanley said at the time."This issue results from the lack of input validation on request parameters allowing an attacker to traverse directories and read any log file on the system."A successful exploitation of CVE-2023-34990 could allow the threat actor to read FortiWLM log files and get hold of the session ID of a user and login, thereby allowing them to exploit authenticated endpoints as well.To make matters worse, the attackers could take advantage of the fact that the web session IDs are static between user sessions to hijack them and gain administrative permissions to the appliance.That's not all. An attacker could also combine CVE-2023-34990 with CVE-2023-48782 (CVSS score: 8.8), an authenticated command injection flaw that has also been fixed in FortiWLM 8.6.6, to obtain remote code execution in the context of root.Also patched by Fortinet is a high-severity operating system command injection vulnerability in FortiManager that may allow an authenticated remote attacker to execute unauthorized code via FGFM-crafted requests.The vulnerability (CVE-2024-48889, CVSS score: 7.2) has been addressed in the below versions -FortiManager 7.6.0 (Fixed in 7.6.1 or above)FortiManager versions 7.4.0 through 7.4.4 (Fixed in 7.4.5 or above)FortiManager Cloud versions 7.4.1 through 7.4.4 (Fixed in 7.4.5 or above)FortiManager versions 7.2.3 through 7.2.7 (Fixed in 7.2.8 or above)FortiManager Cloud versions 7.2.1 through 7.2.7 (Fixed in 7.2.8 or above)FortiManager versions 7.0.5 through 7.0.12 (Fixed in 7.0.13 or above)FortiManager Cloud versions 7.0.1 through 7.0.12 (Fixed in 7.0.13 or above)FortiManager versions 6.4.10 through 6.4.14 (Fixed in 6.4.15 or above)Fortinet also noted that a number of older models, 1000E, 1000F, 2000E, 3000E, 3000F, 3000G, 3500E, 3500F, 3500G, 3700F, 3700G, and 3900E, are affected by CVE-2024-48889 provided the "fmg-status" is enabled.With Fortinet devices becoming an attack magnet for threat actors, it's essential that users keep their instances up-to-date to safeguard against potential threats.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·93 Views
  • Ransomware Attack on Rhode Island Highlights Risk to Government
    www.informationweek.com
    On Dec. 5, a warning from vendor Deloitte alerted the state government of Rhode Island that RIBridges, its online social services portal, was the potential target of a cyberattack. By Dec. 10, Deloitte confirmed the breach. On Dec. 13, Rhode Island instructed Deloitte to shut down the portal due to the presence of malicious code, according to an alert published by the state government.Brain Cipher, the group claiming responsibility, is threatening to release the sensitive data stolen in the attack, potentially impacting hundreds of thousands of people, according to The New York Times.State and local government entities, such as RIBridges, are popular targets for ransomware gangs. They are repositories of valuable data, provide essential services, and are often under-resourced. What do we know about this attack so far and the ongoing cyber risks state and local governments face?The Brain Cipher AttackRIBridges manages many of Rhode Islands public benefits programs, such as the Supplemental Nutrition Assistance Program (SNAP), Medicaid, and health insurance purchased on the states marketplace. Deloitte manages the system and Brain Cipher claims to have attacked Deloitte, BleepingComputer reports.We are aware of the claims by the threat actor. Our investigation indicates that the allegations relate to a single client's system, which sits outside of the Deloitte network. No Deloitte systems have been impacted, according to an emailed statement from Deloitte.Related:The information involved in the breach could include names, addresses, dates of birth and Social Security numbers, as well as certain banking information, according to the RIBridges alert.Rhode Island Governor Daniel McKee (D) issued a public service announcement urging the states residents to protect their personal information in the wake of the breach.Based on the information that's being put out there by the governor about the steps you can take to minimize the fallout of this, that tells me that they're unlikely to be paying the ransom, says Truman Kain, senior product researcher at managed cybersecurity platform Huntress.Brain Cipher appears to be a relatively new ransomware gang. We've tracked five confirmed attacks so far, including this one. Two others have been on government entities as well: one in Indonesia and one in France, Rebecca Moody, head of data research at Comparitech, a tech research website, tells InformationWeek.In June, the ransomware group hit Indonesias national data center. It demanded an $8 million ransom, which it ultimately did not receive. In August, it posted Runion des Muses Nationaux (RMN), a public cultural organization in France, to its data leak site, alleging the theft of 300GB of data, according to Comparitech.Related:In addition to these confirmed attacks, there are 19 unconfirmed attacks potentially linked to Brain Cipher, according to Moody. It is unclear how much the group may have collected in ransoms thus far.It's always really difficult to know when people have paid because, obviously, if they pay they [threat groups] shouldn't really add them to the data leak site, and obviously, companies are very reluctant to tell you if theyve paid a ransom because they think it leaves them open to future attack, says Moody.Ransomware Attacks on GovernmentGovernment remains a popular target for threat actors. They are vulnerable because they are a key service for people, and they can't afford downtime, says Moody. It is one of the sectors that we've seen a consistently high number of attacks.Between 2018 and December 2023, a total of 423 ransomware attacks on US government entities resulted in an estimated $860.3 million in downtime, according to Comparitech. For 2024, Comparitech tracked 82 ransomware attacks on US government agencies, up from 79 last year.Related:Of the 270 respondents in the state and local government sector included in The State of Ransomware in State and Local Government 2024 report from Sophos, just 20% paid the initial ransom demand. States such as Florida, North Carolina, and Tennessee, have legislation limiting or even prohibiting public entities from paying ransom demands.That doesnt necessarily mean threat actors will avoid targeting government entities. Even if a threat group cannot successfully extort a victim, it can still sell stolen data to the highest bidder. Ransoms are probably higher than what they would get for leaking the data. It depends on how much data is stolen though and the value of that data, says Moody.Regardless of whether a government agency pays when hit with ransomware, it still must deal with the disruption and fallout.While cybersecurity threats to local and state governments are highly publicized, funding continues to be a stumbling block. Just 36% of local IT executives report that they have adequate budget to support cybersecurity initiatives, according to the 2023 Local Government Cybersecurity National Survey from Public Technology Institute.While budgets may be limited, cybersecurity cannot be ignored, Kain argues.I think its kind of an excuse for state and local governments to say, Oh, well we just don't have the budget. So, cybersecurity is an afterthought, he says. Things should really start from a cybersecurity perspective, especially when you're dealing with sensitive data like this.State and local government agencies can focus on cybersecurity basics, like enabling multi-factor authentication, regular security awareness training for staff, and vulnerability patching. It's those key things that don't necessarily cost a lot, says Moody. Also [be] prepared for the inevitable because no one's immune to them [attacks].
    0 Comments ·0 Shares ·78 Views
  • Tech Goes Nuclear
    www.informationweek.com
    Artificial intelligence is fueling faster and better organizational intelligence. Its helping business leaders navigate the complexities of the world in new and innovative ways. However, these gains arent without growing pains. AI is also straining the energy grid. Over the coming years, its role in consuming global energy will rise by 26% to 36% annually.As companies seek to boost energy availability, control costs and meet ambitious climate targets, the concerns -- and real-world problems -- multiply. Although renewables such as solar and wind now play a key role in supplying power, consumption continues to outstrip energy growth.The answer? Large enterprises -- including tech firms that require enormous amounts of energy to keep data centers running -- are turning to nuclear power. It can play an important role in supplying energy and supporting decarbonization, says Jennifer Gordon, director of the Nuclear Energy Policy Initiative at the Atlantic Council, a non-partisan think tank.Adds Martin Stansbury, US Power, Utilities & Renewables Risk & Financial Advisory Leader at Deloitte: As demand for energy grows and reliable clean energy becomes the focus, nuclear is an appealing option.Google, Microsoft, AWS, Meta and others have recently announced a spate of projects that incorporate nuclear power. This includes building or restarting conventional reactors, and developing energy systems based on advances in small modular reactors (SMRs) and microreactors that can operate at a site or facility.Related:There is an increased interest in pursuing a low-carbon grid thats resilient, reliable and affordable, states John F. Kotek, Senior Vice President of Policy Development at the Nuclear Energy Institute (NEI). This is leading people to take a fresh look at nuclear power. It can help companies build a more efficient energy infrastructure.Nuclear Charges ForwardThe enormous growth of data centers -- fueled by digitalization and AI -- is fundamentally changing the stakes for companies large and small. Consulting firm McKinsey & Company reports that data center operations will more than double their energy requirements to 35 gigawatts from 2022 to 2035. The US Department of Energy notes that overall electricity demand could double by 2050.Unlike wind and solar, nuclear delivers a consistent source of carbon-free energy. In fact, it has the highest capacity factor of any energy source, at 92%, according to the US Department of Energy. Thats about double natural gas and coal, and about three times more reliable than wind and solar. Nuclear facilities also require relatively little land and fuel, and advances in storage have made it safer to handle radioactive waste.Related:At present, 94 licensed reactors operate in the US. They produce about 20% of US electrical output. Yet, in recent months, Google, Microsoft, Amazon and others have pivoted to nuclear. Microsoft, for example, is reopening the former Three Mile Island facility in Pennsylvania. Renamed as the Crane Clean Energy Center and costing about $1.6 billion, it is slated to go back online in 2028. It will deliver 835 megawatts (MW) of continuous electricity to operate its data centers and cloud computing infrastructure.Meanwhile, Google signed a deal with startup Kairos Power in October 2024 to build a series of small modular reactors (SMRs) for data centers and other facilities. Google aims to have these systems fully operational by 2030. The same month, Amazon announced that it is investing in SMRs. It is working with a company called X-Energy as well as public utilities Energy Northwest and Dominion Energy to boost capacity by 2030.Positive ReactionsThis isnt your grandfathers nuclear power technology. SMRs can deliver up to 300 megawatts of continuous power, which is ideal for a data center or manufacturing facility that relies on robotics and other energy-intensive equipment. Different companies tap different technologies to power the reactors, which include Light Water Reactors (LWRs), Molten Salt Reactors (MSRs), High-temperature Gas-Cooled Reactors (HTGRs) and Lead-Cooled Fast Reactors (LFRs).Related:In fact, SMRs deliver a level of flexibility that conventional energy sources cannot. You can position a system inside or close to a data center and not only have a major source of carbon-free power but also greater resiliency, says Gillian Crossan, Advisory Principal and Global Technology Leader at Deloitte. In the event of a weather-related disruption or other event you can continue to operate.Another thing that makes SMRs attractive is an array of enhanced safety features. This includes a smaller core size that reduces heat and radiation, lower operating pressures, and a simplified design that uses fewer pumps and valves. These systems also offer passive cooling that requires no human intervention in the event of an accident or emergency. Automated safety is built into these systems, Stansbury says.Another type of nuclear power system, ultra-compact microreactors can generate up to 20 megawatts of continuous power. Its possible to transport these systems by train or truck to a temporary site or facility, such as a mine or remote construction site. The technology can also dial up power for a data center or manufacturing site that would otherwise go offline during a hurricane, earthquake or other emergency.Fueling ProgressAt present, about 150 small modular reactors are in development around the world, according to Deloitte. Most wont be fully operational for the next five to seven years. This isnt a wait-and-see proposition. Companies need to start planning for their future energy requirements and capacity, Stansbury says. You have to determine whether or not you want to dip your toes into the SMR space.Nuclear energy wont displace or replace renewables, it merely complements them, Kotek says. Nuclear power unlocks a lot of opportunities. One of the biggest advantages for companies that use small modular reactors and micro reactors is that you dont have to build a single large reactor. You can use dozens of these systems in a very flexible way and assemble them at sites as needed.Of course, nuclear power isnt without challenges. SMRs could increase nuclear waste output. Theyre also expensive to build and subject to frequent cost overruns, partly due to complex and inconsistent regulations, the US Department of Energy notes. Finally, there are concerns about how SMRs and other onsite energy sources could impact the overall grid. Nuclear power could help bring stability to the grid but theres still going to be the need for regulation, Stansbury says.For companies considering a nuclear future, Kotek recommends studying the different types of SMRs and microreactors and understanding whats the best fit. Theres a learning curve associated with these technologies, he says. Organizations that build internal expertise are able to scale up the technology over time and generate more dependable energy and better returns.Concludes Gordon: As companies seek out always-on energy thats fully decarbonized, nuclear stands out. It alone cant solve the energy problem but its emerging as a key part of a balanced energy framework.
    0 Comments ·0 Shares ·75 Views
  • Dune: Prophecy Renewed For Season 2 on Max and HBO
    screencrush.com
    The prophecy has been fulfilled. At least for one more season.HBO and Max confirmed today that they have ordered a second season of theirDune prequel TV series,Dune: Prophecy.The shows five-episode first season is currentlywinding downon cable and streaming.The series takes place 10,000 years before the events of Frank Herberts originalDune novel (as well as Denis Villeneuves two-part movie adaptation of that book) and follows the Bene Gesserit sisterhood (including characters played by Emily Watson and Olivia Williams) as they set in motion the prophecythat ultimately pays off centuries later inDune.The series also stars Travis Fimmel, Jodhi May, Sarah-Sofie Boussnina, and Mark Strong as the current Emperor. Although none of the characters from theDunefilms appear (this is thousands of years prior to the movies) there are members of House Harkonnen and House Atreides, plus members of the Fremen, as well as plenty of drama around control of the universe as well as Arrakis and its all-important spice.HBOHBOloading...Initially announced asDune: The Sisterhood, withDune film writer Jon Spaihts involved as producer and showrunner, the series was eventually tweaked and Spaihts was replaced by Alison Schapker.Its still unclear whether Villeneuve will return to direct a thirdDune movie based on Herberts novelDune Messiah.The fact that HBO is continuingDune: Prophecy, and thus WBD is continuing to expand this fictional universe,can only be see as a good sign that the thirdDune movie may actually happen down the line.The Season 1 finale ofDune: Prophecy premieres this Sunday night on HBO and Max.Get our free mobile appThe Dad Movie Canon: 25 Films All Dads LoveNo dad can resist these 25 movie classics.
    0 Comments ·0 Shares ·91 Views
  • Everything New on Max in January 2025
    screencrush.com
    Max introduces a new hospital drama in January, and it hails from one of the longtime producers ofER, John Wells, and one of its longtime stars, with Noah Wyle starring inThe Pitt.Each episode follows one hour of one shift of Wyles character job working in a Pittsburgh hospital.That sounds interesting, but personally I am most excited about the arrival of All Elite Wrestling on streaming. Previously exclusive to TBS and TNT, the companys two weekly TV series,AEW Dynamite andAEW Collision will begin a streaming simulcast on Max starting in January. Max is also adding a bunch of older AEW programming to its library as well; to start, much of it comes from the federations first year of existence.Heres everything coming to Max in January 2025...January 15 Things with Kate Bolduan (CNN) A Star is Born (1937) Act of Valor (2012)TNTTNTloading...All Elite Wrestling: 2019 PPV Events (5 Episodes) (2024) All Elite Wrestling: Collision 2024 (5 Episodes), Season 2 All Elite Wrestling: Dynamite 2019 (12 Episodes), Season 1 All Elite Wrestling: Dynamite 2024 (7 Episodes), Season 6 All Elite Wrestling: Rampage 12/13/2024, Season 4 Annabelle Comes Home (2019) Annabelle: Creation (2017) Balls Out (2015) Batkid Begins: The Wish Heard Around the World (2015) Batman: Mask of the Phantasm (1993) Batman: The Killing Joke (2016) Best Of Enemies (2015) Bitter Creek (1954) Black Gold (1947) Blue Velvet (1986) Buffaloed (2020) Calamity Jane (1953) Call Me by Your Name (2017) Charlie and the Chocolate Factory (2005) Cow Country (1953) Crazy Rich Asians (2018) Desperately Seeking Susan (1985) Destination Tokyo (1943) Diggers (2007) Dirty Rotten Scoundrels (1988) Each Dawn I Die (1939) Eat Pray Love (2010) Fast & Furious (2009) Floyd Norman: An Animated Life (2016) Free Birds (2013)Warner Bros.Warner Bros.loading...Green Lantern (2011) Heaven Help Us (1985) HGTV Dream Home 2025 Home Again (2017) Hot Tub Time Machine (2010) Hot Tub Time Machine 2 (2015) House at the End of the Street (2012) I Am Love (2009) Injustice (2021) Iris (2015) It Follows (2015) It: Chapter Two (2019) Jason Bourne (2016) Johnny Angel (1946) Justice League vs. Teen Titans (2016) Justice League: Doom (2012) Justice League: Throne of Atlantis (2015) Justice League: War (2014) Keeping Up with the Joneses (2016) Kept Husbands (1931) Kicks (2016) Lemon (2017) Mad Max (1980) Matilda (1986)FoxFoxloading...Miss Peregrines Home for Peculiar Children (2016) Morgan (2016) Mortdecai (2015) Mrs. Doubtfire (1993) My Favorite Wife (1940) Mystic Pizza (1988) Neighbors 2: Sorority Rising (2016) Night and Day (1946) Nocturne (1946) Once Were Brothers: Robbie Robertson and the Band (2020) Paddington (2014) Rebel Without a Cause (1955) Red Light (1949) Reframed: Next Gen Narratives, Season 1 (2025) Room for One More (1952) School Life (2017) Sex and the City 2 (2010) Shining Vale, Season 1 Shining Vale, Season 2 Showing Up (2023) Silver Linings Playbook (2012) St. Vincent (2014) Steel Magnolias (1989) Stephen King's It (1990) Steve Jobs: The Man in the Machine (2015) Sully (2016)Warner Bros.Warner Bros.loading...Supergirl (1984) Superman & Lois, Season 4 Tangerine (2015) Task Force (1949) Teen Wolf (1985) Tennessee Johnson (1942) The Accountant (2016) The Addams Family 2 (2016) The Adventures of Robin Hood (1938) The Big Year (2011) The Birth of a Nation (2016) The Boondock Saints (1999)The Cable GuyColumbialoading...The Cable Guy (1996) The Conjuring 2 (2016) The Craft (1996) The Curse of La Llorona (2019) The Imitation Game (2014) The Leopard Man (1943) The Miracle of Our Lady of Fatima (1952) The Mouthpiece (1932) The Narrow Margin (1952) The Prince and the Pauper (1937) The Prisoner of Zenda (1952) The Purge: Election Year (2016) The Red Badge of Courage (1951) The Student Prince (1954) The Usual Suspects (1995) The Whistlers (2020) The Wrong Man (1957) Volunteers (1985) Warcraft (2016) Watchmen: The Complete Motion Comic (2008) Whitey: United States of America V. James J. Bulger (2014) Wild Boys of the Road (1993)Warner Bros.Warner Bros.loading...Willy Wonka & the Chocolate Factory (1971) Woman in Gold (2015) World Without End (1956)January 2Expedition Files, Season 1 (Discovery) Isadora Moon, Season 1A (Max Original) My 600-lb Life, Season 13 (TLC) The Deep 3, Episode 227 (TNT)January 3Beachfront Bargain Hunt Renovation, Season 10 (Magnolia Network) Diners, Drive-Ins, and Dives, Season 49 (Food Network) The Front Room (A24)January 4Belle Collective, Season 5 (OWN)January 5Craig of the Creek, Season 6B (Cartoon Network) Mecum Top 10, Season 10 Totally Spies, Season 7AJanuary 6Worst Cooks in America Celebrity Edition: Heroes vs. Villains (Food Network)January 7Cleats & Convos with Deebo Samuel, Episode 111 (B/R) How It Really Happened, Season 8 (CNN Original Series) Kids Baking Championship, Season 14 (Food Network) The Curious Case of Natalia Grace: The Final Chapter, Season 3 (ID) The Edge with Micah Parsons, Episode 219 (B/R)January 87 Little Johnstons, Season 15 (TLC) CNN Heroes: An All-Star Tribute (2024) Fixer to Fabulous, Season 6 (HGTV) Wildcard Kitchen, Season 2 (Food Network)EP 101 SC 3Maxloading...READ MORE: The Most Dated Seinfeld EpisodesJanuary 9Aaron Hernandez and the Untold Murders of Bristol (ID) Sons of Ecstasy (Max Original) The Pitt, Season 1 (Max Original)January 10Bill Maher: Is Anyone Else Seeing This? (HBO Original) Black Butterfly (2017) Holla (2006) Look Into My Eyes (A24) Vinnie Jones: In the Country, Season 1-2 (discovery+)January 11Road to NHL Winter Classic, Episode 204 The Steam Room with Ej and Chuck 125 (TNT)January 12Naked and Afraid Spain (Aventura En Pelotas Espana), Season 1 (Discovery International)January 13Barney's World, Season 1BJanuary 14Baylen Out Loud, Season 1 (TLC) Death by Fame, Season 3 (ID) The Curious Case of..., Season 1 (ID) The Last Party: Death on Tresco, Season 1 (discovery+)Sony Pictures ReleasingSony Pictures Releasingloading...January 15An Update On Our Family (HBO Original) Cult of Fear: The Asaram Bapu Story (discovery+) Marshall (2017) Uncharted (2022)January 16Becoming Hitchcock: The Legacy of Blackmail (2024) Divided By Design, Season 1B (HGTV) Harley Quinn, Season 5 (Max Original) Murder Under the Friday Night Lights, Season 4 (ID) My Sesame Street Friends, Season 15 (Max Original) Sesame Street, Season 55 (Max Original)A24A24loading...January 17A Different Man (A24) Better Off Dead (1985) Real Time with Bill Maher, Season 23 (HBO Original) Valerian and the City of a Thousand Planets (2017)January 21Contraband: Seized at the Airport, Season 1 (Discovery)January 22Expedition X, Season 8 (Discovery)January 23C.B. Strike: The Ink Black Heart (HBO Original)January 24Harpoon Hunters, Season 1 (Discovery)January 25Bugs Bunny Builders, Season 2B (Cartoon Network)January 27Scars of Beauty (Beleza Fatal), Season 1 (Max Original, Brazil)January 28Chopped, Season 60 (Food Network)January 29The Flip Off, Season 1 (HGTV)January 30Mermicorno: Starfall, Season 1A (Max Original) The Other Side (Del Otro Lado Del Jardn) (Max Original, Colombia)January 31Guy's Ultimate Family Cruise (Food Network) The Eastern Gate (Przesmyk), Season 1 (Max Original, Poland)Get our free mobile app10 TV Shows People Love That Are Actually BadSometimes we have to admit to ourselves that our faves are not that great.
    0 Comments ·0 Shares ·80 Views
  • The Most Dated Seinfeld Episodes Thatd Never Get Made Today
    screencrush.com
    Seinfeld has held up remarkably well for over a quarter of a century. Somehow,viewers have continued to find things that relate totheir livesin theself-described show about nothing despite the fact that its been decades sinceJerry Seinfelddecided to bring his iconic 90s sitcom to an end while it was still the top-rated show in all of television.At the time,Seinfeldwas hailed for its unique ability to capture the mundane joys and frustrations of modern life. But heres the thing: Modern life looks so much different than it did in the age of Seinfeld.Sure, some of the minor irritations of getting through the day-to-day are universal. Nobody likes waiting for a table at a restaurant. It will always be easy to forget where you left your car in a massive, crowded parking lot.Other episodes are much more specific to their original time and place. Some of the technology relied on by Jerry, George, Elaine, and Kramer is hopelessly archaic. (When was the last timeyouused a phone to find out what time a movie was playing at your local theater?)And sometimes the shows values are too at least by todays standards.WithSeinfeldnow availablein an impressively restored 4K set, it felt like a good moment to look back at this classic show and to findthe 15 episodes that dont hold up quite as well, the ones that would surely never get made today, at least without someheavy rewrites.The Most Dated Seinfeld EpisodesSeinfeld remains one of the greatest sitcoms in TV history. But like any show from decades ago, not all of of the episodes hold up as well as others.READ MORE: EverySeinfeldEpisode Ranked From Worst to BestTV Shows With the Longest Gaps Between SeasonsThese shows took their sweet time going from one season to the next, but dont hold that against them.Gallery Credit: Emma StefanskyGet our free mobile appFiled Under: Jerry Seinfeld, Larry David, Nostalgia, SeinfeldCategories: Lists, Original Features, Special Features, TV News
    0 Comments ·0 Shares ·93 Views