• Shoguns Hiroyuki Sanada Has a Clear Plan for Season 2: We Have Real History
    www.denofgeek.com
    Shgun star and producer Hiroyuki Sanada has been acting since he was five years old when he emerged as the protg to acclaimed Japanese martial artist Sonny Chiba. Now approaching its sixth decade, Sanadas career has become every bit as impressive as his legendary mentors. The Tokyo-born actor blazed a trail in Japanese and Hong Kong cinema before finding purchase States-side in projects like Speed Racer, Avengers: Endgame, John Wick: Chapter Four, Westworld, and more.Through all of these roles, however, one historical figure has popped up over and over again for Sanada. Tokugawa Ieyasu is the shogunate ruler who kicked off Japans prosperous 17th and 18th century Edo Period and served as the inspiration for Sanadas Shgun character Lord Yoshii Toranaga. Minutes before being presented with a Lifetime Achievement Award by the Savannah College of Art and Design at SCAD TVfest in Atlanta, Sanada spoke with Den of Geek about his close connection to Japans most powerful shgun and the era he helped build.I played Toranagas model, the real shgun Ieayasu, when I was 20. I played young Ieayasu 30 years ago. And Toranagas rival, Ishido Kazunari, whose model is Ishida Mitsunari, I played him twice on TV before. I had a lot of chances to learn the background of that history, and then I played other samurai roles in the same period. So that was a good base for me, Sanada says.In some respects, Sanadas path bears remarkable similarities to Tokugawa Ieyasu (albeit with a lot less violence). Both men dealt with great expectations early, found some success in adulthood, and then unveiled their masterworks in their sixties. Sanada chuckles at the comparison.Ieyesu was a hero of mine when I was kid. He taught me a lot. So playing him and introducing him to the world was very important for me. Playing his role means a return to him.Though Tokugawa Ieyasus life continued on for more than 10 years after establishing his shogunate, Yoshii Toranagas story comes to an end with his grandest political success. Or at least it did in James Clavells 1975 novel upon which FXs Shgun is based. FX, Sanada, and showrunners Rachel Kondo and Justin Marks have elected to turn this limited series into a proper TV series and continue on with a second season.While Clavells series of Asian Saga novels contain no obvious roadmap for Shgun going forward (beyond some descendants of Shgun characters popping up in later timelines), Sanada is confident that history has given them more than enough to work with.We used the whole novel part already. So we have no novel in the season two, but we have real history and models, Sanada says. We know what happened in the history. So you keep that taste of season one but were going to create original entertainment, fictional entertainment, not just the history book.In other interviews conducted on the SCAD TVfest red carpet, Sanada revealed that the writers room for Shgun season 2 is already underway and they are hoping to begin shooting later this year, meaning we might not have to wait much longer for the next chapter of this tale.
    0 Comments ·0 Shares ·31 Views
  • Make History Today: Sid Meiers Civilization VII Founders Edition is Available Now for Xbox Series X|S and Xbox One
    www.xbox.com
    The post Make History Today: Sid Meiers Civilization VII Founders Edition is Available Now for Xbox Series X|S and Xbox One appeared first on Xbox Wire.
    0 Comments ·0 Shares ·29 Views
  • 6 Genius Ways to Make a Windowless Room Feel Brighter, According to Designers
    www.housebeautiful.com
    Every item on this page was hand-picked by a House Beautiful editor. We may earn commission on some of the items you choose to buy.Unless youre building from scratch, theres no such thing as a completely perfect home. And while some quirks, like creaking floorboards and original millwork, fill our home with character, others are less than desirable. Finding the right space for you, especially with budget constraints in a challenging real estate market, usually requires making some sacrifices. A lack of windows may be unheard of in suburban homes, but it's very commonplace in urban apartmentsfor the right location or price, its a necessity some people are willing to go without. Windowless rooms pose a design challenge, and the lack of natural light can leave your space feeling dark and dull. Fortunately, there are ways to improve it with some smart windowless room ideas.Back in 2019, House Beautiful's former senior editor, Alyssa Fiorentino, faced this challenge when she moved to a new apartment in New York City. She discovered designer-approved methods to make her windowless living room feel bright and welcoming without much effort. With clever use of color, artificial light, and decor, your windowless room can feel sun-kissed in no time. Keep reading to discover these illuminating tips below.Additional copy by Meghan Shouse and Kate McGregor.Related StoriesWhether you're on the hunt for your first house or apartment, you'll always find that something about the space is missing or could be better. Usually, though, the pros are good enough that you decide you can live with the cons, whatever they may be. Such was the case for me and my two roommates when we moved into our second apartment in New York City. Choosing a large, three-bedroom apartment with two bathrooms and an open kitchen in a great location also meant we had to settle for a living room with no windows. The windowless living room is a problem for two reasons: First, it gets extremely hot during the summer, and there's no way to get fresh air in the room. Second, and more importantly, it's always dark and dim. There's a skylight in the middle of the living room and kitchen, but that barely provides enough natural light to reach the length of both rooms. And if it's raining? Forget about it. We actually lived like this, with a dark and dingy living room, for two years. But after one roommate moved out and took a few pieces of furniture with her, we decided it was time to do something about our problem. The only issue was we had no idea how to fix it. Enter Modsy, now Lennar. Before it was acquired by Lennar, Modsy was an online design service that provided everything you needed to revamp your space, from 3D renderings of your room to handy shopping links. All we had to do was upload photos of our room, provide a few measurements, and take a quick style quiz. A few days later, Modsy sent us the design plans for our space, and we instantly fell in love. Courtesy ModsyA 3D rendering of our apartment, designed by Modsy. The next step was to shop. We bought a few things directly through Modsy, including the sofa from their own furniture line, and hit up some of our favorite home stores for everything else we needed. To be honest, it did take us a few weeks to pull the room together completely. And while it took longer than we expected to finish our redesign, it was definitely worth the wait. See for yourself below. The difference is obvious, but it can be hard to assess what, exactly, you need to do to get similar results. Alessandra Wood, the former vice president of style at Modsy, broke down the choices her team made and how their design changed our space so drastically. It turns out there are six easy things you can do to make a dark room feel so much brighter. Embrace Light Colored FurnitureBrie WilliamsAnita Yokota designed the recovery room in our 2024 Whole Home.Most people are hesitant when it comes to purchasing anything white for their homes, but it's a necessary evil when you're working on a room without windows. And while the chances of staining a white sofa or rug are high, the risk is worth the reward. By adding a long, white sofa and accent cabinet next to each other, we were able to make the wall look taller and wider, which made the room feel larger and a bit brighter automatically. On the opposite wall, a long white media console takes center stage. When planning your major purchases, try to plan for a few key items to be white or another light shade. And if you're really worried about stains, do a little extra digging. Make sure youre getting something that is treated or easy to clean, says Wood. Layer Pops of Color ThroughoutBrie WilliamsAnita Yokota designed the recovery room in our 2024 Whole Home.Of course, not everything in your room should be light. Using pops of color gives a more fun, lively vibe, says Wood. But keep in mind, just one 'pop' isn't enough. If you have just one dark piece in the room, its going to stick out like a sore thumb. So you really want to look for ways where you could introduce a color or a tone in a couple of different moments, she explains. Plus, following this tip can help add dimension to your space. Add Lots of LightingTrevor TondroDesign by Jeremiah Brent. Tour the entire home here.Without windows, you're forced to create your own light, so don't be afraid to go overboard with lamps. Because our living room only has one overhead light and a skylight that doesn't always provide the sunlight we need, Modsy put three lamps in the roomone on either side of the sofa and a floor lamp in the corner by the TV. Not only will this help to make the room feel brighter, but it also gives you more control over the space. If you want to turn off the overhead lights you have more than enough lighting to create a really beautiful and peaceful environment at night as well, Wood explains. Hang Multiple Mirrors Brie WilliamsThe game room of House Beautifuls 2024 Whole Home, designed by MA Allen.Another trick to fake more light in your space is to add a mirror. Modsy placed the mirror strategically above the bar cart so that the few beams of natural sunlight we get from the skylight would reflect off the mirror and back into the room. This works even if you only have lamps and overhead lighting, so definitely give it a try. Grow Low-Light PlantsJenna PeffleyA powder room by French & French. Tour the entire home here.Houseplants add life to your space, so placing a few around your room will help make the area feel more alive. You can also opt for light-colored planters to spread smaller moments of brightness around. (We went for pale pink, blue, and gray planters from The Sill.) Just be mindful, though, that you'll probably need to choose low-light plants for the space. Make sure you're watering them correctly and give them some time near a window in another room if needed. Invest in the Right ArtDAN PIASSICKA Texas powder room by Hilary Colia and Jennifer Kostohryz of Fort Design Studio. Tour the entire home here.If taking care of plants isn't your thing, there's another way to make the room feel alive that doesn't require any maintenance: Invest in meaningful art. Having art in the home creates a focal point that adds depth with imagery and pops of color, Wood notes. To capitalize on this, we mixed abstract paintings with travel photos that make us feel like we're exploring the world. This all may sound like a lot to take into account and plan for, but in the end, it all adds up to the result of a brighter, fresher space. Youre not thinking about the fact that the room doesnt have light or doesnt have windows because theres so much going on in the room and the room itselftheres a lot of different points of focus and a lot of energy, Wood says. So whether or not light furniture and plants are right for you, as long as you fill your space with beautiful items and try a few of the tricks above (mirrors! art! layered rugs!) you'll be on your way to a room that creates its own light. Follow House Beautiful on Instagram and TikTok.
    0 Comments ·0 Shares ·31 Views
  • iOS 18.3.1 coming soon for iPhone users
    9to5mac.com
    Apple just shipped iOS 18.3 last week, but it seems that another software release is on its way soon. Internal 9to5Mac visitor logs show that Apple is currently testing an iOS 18.3.1 update. Heres what that means.Apples next iPhone update expected to focus on improved performanceiOS 18.3 launched early last week with several updates to Apple Intelligence features, including:changes to the way notification summaries are displayedthe disabling entirely of summaries for certain app categoriesvisual intelligence upgrades, including one addition for Apple Calendarand it enabled Apple Intelligence by default on all compatible iPhonesFinally, the update also brought a welcome Calculator app fix.Currently, beta testers are still waiting for the first iOS 18.4 beta to arrive. That update is expected to pack a lot more Apple Intelligence goodiesincluding major Siri upgrades.But perhaps before that first beta debuts, were going to get a public iOS 18.3.1 launch.While we dont currently know what changes iOS 18.3.1 might introduce, or when exactly it will launch, it will most likely focus primarily on bug fixes and performance improvements.Apple similarly shipped iOS 18.2.1 early last month as a bug fix update.For reference, that 18.2.1 release contained the following description: This update provides important bug fixes and is recommended for all users.Expect to see something similar from iOS 18.3.1 when it arrives as your next iPhone update.Have you had any major bug issues in iOS 18.3 that you hope are fixed in iOS 18.3.1? Let us know in the comments.Best iPhone accessoriesAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments ·0 Shares ·30 Views
  • Deals: M4 Pro MacBook Pro $260 off, Apple Watch Ultra 2 $269 off, iPhone 15 Pro, Milanese Loop, more
    9to5mac.com
    While you certainly dont want to miss out on the new all-time low now live on AirPods 4, never mind the best prices of the year on AirPods Pro 2, we have afresh batch of discounts to save you ton today. First up, Apples 24GB 16-inch M4 Pro MacBook Pro is now $260 off at Amazon to deliver the best price of the year. And next we have another sweet deal on the most affordable unlocked iPhone 15 Pro Amazon Premium Renewed units with a 1-year warranty are now $305 off the original price alongside Geek Squad refurbished Apple Watch Ultra 2 models at $269 off. Those offers join discounts on Apple gift cards and the Natural Milanese Loop alongside everything else in todays 9to5Toys Lunch Break.Save $260 on Apples 24GB 16-inch M4 Pro MacBook Pro today at Amazon (Best price of the year)We have been a tracking more than a few major deals on the M4/Pro MacBook Pro lineup in 2025 thus far, but they have, for the most part, landed on the 14-inch models. While did recently catch a solid $250 price drop on the most affordable 16-inch M4 Pro MacBook Pro, pricing has now dropped even lower on that model. Amazon is now offering the 16-inch M4 Pro with 24GB of RAM and a 512GB SSD down at $2,239 shipped, or $260 off the regular $2,499 list price.And for those that would like to bring spending down or just prefer the more compact 14-inch display, be sure to scope out the deals we are still tracking on the M4 Pro at $250 off with the same storage and RAM config as the 16-incher above.Most affordable unlocked iPhone 15 Pro is now $305 off (Amazon Premium Renewed, 1-yr. warranty)While we are still tracking a more than notable chance to score a deep deal on the 1TB model, Amazons Premium Renewed program is back again today with another new low on the most affordable iPhone 15 Pro in Blue Titanium at $693.53 shipped. Youre looking at configuration that carries a $999 list price, the same as the current-gen iPhone 16 Pro, and is now over $305 less than that.While the larger capacity models tend to see much larger discounts in terms of percentages the aforementioned 1TB is currently $630 off its original price, we are also talking about a device that can run $200 more than the 128GB in refurbished condition.Natural Apple Watch Ultra 2 with Alpine Loop now $269 off (Official Best Buy refurb)Earlier this week we spotted a short-lived opportunity to score a proper Geek Squad refurbished Apple Watch Ultra 2 on the blue Ocean Band at $530. That deal came and went quite quickly, but Best Buy is now offering the same deal on the Apple Watch Ultra 2 with the Natural Titanium Case and the Olive Alpine Loop. You can now score this configuration over at Best Buy for $529.99 shipped. Thats $269 off the regular $799 new price of an Ultra 2, matching our previous mention, and the lowest we can find from a refurbished source as reputable as Best Buys in-house Geek Squad.That said, you can certainly save even more if you opt for the latest Series 10 model too we still have open-box listings with 1-year warranties down at $290 and youll find the best new prices below:42mm Apple Watch Series 10 $329 (Reg. $399) 46mm Apple Watch Series 10 $359 (Reg. $429) 42mm Apple Watch Series 10 GPS+Cell $429 (Reg. $499) 46mm Apple Watch Series 10 GPS+Cell $459 (Reg. $529) Apples latest 2024 Natural Milanese Loop just dropped back to the Amazon all-time lowThis $100 Apple gift card with a FREE $10 Best Buy credit is a no brainer for Apple Music/TV+ subscribersAirPods Pro 2 drop again to best price in months at $169 shipped, or open-box at $116 (Reg. $249)Bring home Apples current-gen iPad 10th Gen for you and the fam down at $279 (Reg. $349)Todays accessories and charging deals:Official Lightning Apple Magic Keyboard is otherwise identical to the new USB-C model, now down at a rare $79Apples 4-port M4 iMac with 16GB of RAM/512GB SSD back at the $1,549 low ($149 off), more from $1,149Go, go, go! New Satechi M4 Mac mini Stand & Hub with SSD Enclosure now up for purchase in limited quantityAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments ·0 Shares ·31 Views
  • Public Support for Elon Musk's Government Rampage Is Falling Catastrophically, Even Among Trump Voters
    futurism.com
    Billionaire and newly powerful White House operative Elon Muskhas been ripping through the federal government like an angry new CEO.But public opinion polling shows that support for Musk's rampage is falling at an astonishing rate, with even Trump's most ardent supporters now turning on him in incredible numbers.As spotted by The Hill,a survey byThe Economist and YouGov conducted days after the November election found overwhelming support for Musk among Trump voters, with a full 51 percent saying the billionaire should have "a lot" of influence over the incoming administration.But after just a few weeks of seeing what that influence looks like in practice, those numbers look radically different. According to the latest version of the same poll, less than half of those Trump voters still think Musk should have "a lot" of influence, with large numbers pulling back to the position that he should have only "a little" and, significantly, the proportion saying he should have "no influence at all" swelling from 8 percent to 13.That disillusionment is shared by the rest of the country, by the way: after the election, 27 percent of Americans overall thought Musk should have significant sway over Trump, but that number has now crumbled to just 13 percent.And that's while Trump's own approval rating appears to have actually gone up over the same period meaning that the president is so far holding popularity with his base at the same time that they're turning on Musk and his "bull in a china shop"approach to governance.The shift comes as DOGE staff have taken over the US Treasury's payments system and taken action to gut USAID, an independent international development agency that provides lifesaving care and feeds millions of children in need around the world.The actual Republican political apparatus has had much less visibility than Musk, with even the White House seemingly having very little information about DOGE's operations, which many government officials believe to be illegal.Meanwhile, protests are taking place around the nation, demanding accountability. Congressional efforts to subpoena Musk ended in a screaming match Wednesday evening, ABC News reports, highlighting heightened bipartisan tension over Musk's coup."Is this what you voted for?" a Department of Labor staffer told ABC. "Is this what you really want? Some unelected billionaire coming in and deciding to cut things he had never heard of until yesterday."One thing's for sure: patience is wearing thin over Musk's antics."Whatever DOGE is doing, it is certainly not not what democracy looks like or has ever looked like in the grand history of this country," Senate Democratic leader Chuck Schumer wrote in a statement.Whether the government's checks and balances will eventually hold Musk to account is anyone's guess.But Trump who's notoriously sensitive to public perception will have a hard time ignoring the fact his own supporters are rapidly turning on Musk.More on the situation: Trump Loyalists Reportedly Furious With Elon Musk Over DOGE CoupShare This Article
    0 Comments ·0 Shares ·31 Views
  • There's Actually an Incredibly Easy Way for Elon Musk to Trim $2 Trillion of Government Spending: Cut Funding for Nuclear Weapons
    futurism.com
    Ball's in your court, Elon.Easy as PieCan we all agree that nuclear warfare is bad? Well, then we have an easy way that Elon Musk and his so-called Department of Government Efficiency can absolutely excel at his promise to cut trillions in government spending.Instead of gutting education and health agencies, the First Buddy and his DOGE lackeys could spare us all the noise and drawn-out drama by simply cutting off the US's exorbitant, multi-trillion dollar nuclear weapons program.As , this would almost single-handedly achieve Musk's promise that he'd shave $2 trillion off in federal spending. Because in years since President Obama earmarked a mere $1 trillion towards modernizing the US's nuclear arsenal, the effort's projected funding has ballooned to nearly double its initial number.Granted, that's not all money being spent in one year. But you'd still be immediately knocking off around $50 billion. Sounds like some efficiency-loving patriots should be looking into that, right?Alt-F4Musk has signaled interest in reining in out-of-control military spending before. Last November, he tore into Lockheed Martin's F-35 fighter jet, whose notoriously janky development has cost taxpayers $2 trillion huh, that same number again! and counting."Let us stop the worst military value for money in history that is the F-35 program!" Musk wrote in a tweet.That also sounds like a great idea. One of these overpriced jets crashed during a training exercise just the other month, after it malfunctioned mid-flight. Surely Musk and DOGE, who've been willing to bulldoze through legal precedents to achieve their aims, will do whatever it takes to stamp out this blatant example of government waste.Strangely, though, Musk hasn't said a peep about the beleaguered aircraft since which says a lot about where his real priorities lie.Wake UpAll told, it's all the places that Musk hasn't called to be put on the chopping block that tells the story. Does the US or for that matter, the world really need more nuclear weapons? Two trillion dollars' worth of them? Is the current stockpile of over 3,700 atomic weapons not a foreboding enough of a deterrent?Who's to say. Apparently, it's stuff like DEI initiatives that are the real menace, which is what DOGE is deciding to focus on. Maybe someone should tell Musk that nuclear weapons are woke.More on DOGE: Elon Musk Says DOGE Will Now Shut Down Government Payments He Doesn't LikeShare This Article
    0 Comments ·0 Shares ·31 Views
  • North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials
    thehackernews.com
    Feb 06, 2025Ravie LakshmananThreat Intelligence / MalwareThe North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC).The attacks commence with phishing emails containing a Windows shortcut (LNK) file that's disguised as a Microsoft Office or PDF document.Opening this attachment triggers the execution of PowerShell or mshta.exe, a legitimate Microsoft binary designed to run HTML Application (HTA) files, that are responsible for downloading and running next-stage payloads from an external source.The South Korean cybersecurity company said the attacks culminated in the deployment of a known trojan dubbed PEBBLEDASH and a custom version of an open-source Remote Desktop utility named RDP Wrapper.Also delivered as part of the attacks is a proxy malware that allows the threat actors to establish persistent communications with an external network via RDP.Furthermore, Kimsuky has been observed using a PowerShell-based keylogger to record keystrokes and a new stealer malware codenamed forceCopy that's used to copy files stored in web browser-related directories."All of the paths where the malware is installed are web browser installation paths," ASEC said. "It is assumed that the threat actor is attempting to bypass restrictions in a specific environment and steal the configuration files of the web browsers where credentials are stored."The use of tools RDP Wrapper and proxies to commandeer infected hosts points to tactical shift for Kimsuky, which has historically leveraged bespoke backdoors for this purpose.The threat actor, also referred to as APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima, is assessed to be affiliated with the Reconnaissance General Bureau (RGB), North Korea's primary foreign intelligence service.Active since at least 2012, Kimusky has a track record of orchestrating tailored social engineering attacks that are capable of bypassing email security protections. In December 2024, cybersecurity company Genians revealed that the hacking crew has been sending phishing messages that originate from Russian services to conduct credential theft. Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·31 Views
  • Top 3 Ransomware Threats Active in 2025
    thehackernews.com
    Feb 06, 2025The Hacker NewsMalware Analysis / Threat DetectionYou arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: "Pay $2 million in Bitcoin within 48 hours or lose everything."And the worst part is that even after paying, there's no guarantee you'll get your data back. Many victims hand over the money, only to receive nothing in return, or worse, get hit again.This isn't a rare case. Ransomware attacks are crippling businesses worldwide, from hospitals and banks to small companies. The only way to stop the damage is by proactively analyzing suspicious files and links before they can be executed.Below, we break down the top three ransomware families active in 2025: LockBit, Lynx, and Virlock, and find out how interactive analysis helps businesses detect and stop them before it's too late.LockBit: Teasing a Comeback in 2025LockBit is one of the most notorious ransomware groups, known for its highly efficient encryption, double extortion tactics, and ability to evade traditional security measures. Operating under a Ransomware-as-a-Service (RaaS)model, it enables affiliates to distribute the malware, leading to widespread attacks across various industries.Latest attacks and activity:London Drugs (May 2024): LockBit targeted Canadian retailer London Drugs, forcing the closure of all its locations across Canada. Hackers demanded $25 million, leaking some employee data after the company refused to pay.University Hospital Center, Zagreb (June 2024): Disrupted Croatia's largest hospital, forcing staff to revert to manual operations while attackers claimed to have exfiltrated medical records.Evolve Bank & Trust (June 2024): Breached sensitive financial data, with hackers falsely claiming to have Federal Reserve information. The attack raised concerns due to Evolve's ties with major fintech firms.LockBit sample:Let's take a closer look at a LockBit ransomware sample inside ANY.RUN's secure sandbox to discover its key behaviors.View analysis sessionFile icons changed inside ANY.RUN sandboxInside the Interactive Sandbox, we notice the first thing that stands out: file icons changing to the LockBit logo. This is an immediate sign of ransomware infection.Uncover ransomware tactics in real-time and prevent costly breaches before they happen.Try ANY.RUN free for 14 daysThis is followed by a ransom note inside the sandbox, stating that your files have been stolen and encrypted. The message is clear: Pay the ransom, or the data will be published on a TOR website.Ransom note displayed inside secure environmentOn the right side of the screen, we see a detailed breakdown of every process LockBit executes to attack the system. Process tree demonstrates the behaviors of LockBitBy clicking on any process, security teams can analyze the exact tactics used in the attack.Detailed breakdown of processes inside Interactive SandboxThis type of analysis is important for businesses as it allows them to understand how ransomware spreads, identify weak points in their security, and take proactive steps to block similar threats before they cause financial and operational damage.For a more in-depth breakdown of the attack tactics, you can also click on the ATT&CK button in the upper-right corner of the sandbox. This provides detailed insights into each tactic, helping teams fine-tune their defenses and strengthen response strategies.MITRE ATT&CK tactics and techniques detected by ANY.RUNIn this case, we see LockBit using several dangerous techniques:Gaining higher privileges by bypassing security controls.Extracting stored credentials from files and web browsers.Scanning the system to gather information before encrypting files.Encrypting data to lock down critical business operations.New attack warning in 2025:Despite law enforcement actions, LockBit continues to pose a significant threat for 2025. The group's alleged leader, known as LockBitSupp, has warned of new ransomware attacks launching this February. This means businesses cannot afford to let their guard down.Lynx: The Rising Threat to Small and Mid-Sized BusinessesLynx is a relatively new ransomware group that surfaced in mid-2024 and quickly built a reputation for its highly aggressive approach. Unlike larger ransomware gangs that focus on corporate giants, Lynx deliberately goes after small and mid-sized businesses across North America and Europe, taking advantage of weaker security measures.Their strategy relies on double extortion. They don't just encrypt files but also threaten to leak stolen data on both public websites and dark web forums if victims refuse to pay. This forces businesses into an impossible choice: pay the ransom or risk having confidential data, financial details, and customer records exposed online.Latest Lynx attack:In mid-January 2025, Lynx targeted Lowe Engineers, a prominent civil engineering firm based in Atlanta, Georgia. The attack led to the exfiltration of sensitive data, including confidential project information and client details. Given the firm's involvement in critical infrastructure projects, this breach raised significant concerns about potential impacts on federal and municipal contracts.Lynx sample: Thanks to ANY.RUN's Interactive Sandbox, we can analyze the full attack chain of Lynx ransomware in a controlled virtual environment, without risking real systems.View sandbox analysis of LynxThe moment we upload and launch the malicious executable file in ANY.RUN's cloud-based sandbox, the ransomware immediately starts encrypting files and changes their extensions to .LYNX. The Files Modification tab provides the changes of file system activityShortly after, a ransom note appears, and the desktop wallpaper is replaced with an extortion message directing victims to a TOR site, where attackers demand payment.Lynx ransomware changing the wallpaper inside ANY.RUN sandboxInside the ANY.RUN sandbox, we can manually open the README.txt dropped by Lynx to view the ransom message exactly as a victim would. The ransom note includes .onion links that direct victims to the attackers' communication portalIn the MITRE ATT&CK section, we get a clear breakdown of Lynx's tactics and techniques, revealing how it operates:MITRE ATT&CK tactics and techniques used by Lynx ransomwareEncrypting files to lock critical business data.Renaming files to mimic other ransomware strains.Querying the registry to scan for system details and security software.Reading CPU information to assess the target environment.Checking software policies to determine security settings before proceeding.Virlock: A Self-Replicating Ransomware That Won't DieVirlock is a unique ransomware strain that first emerged in 2014. Unlike typical ransomware, Virlock not only encrypts files but also infects them, turning each into a polymorphic file infector. This dual capability allows it to spread rapidly, especially through cloud storage and collaboration platforms.Recent attacks:In recent analyses, Virlock has been observed spreading stealthily via cloud storage and collaboration apps. When a user's system is infected, Virlock encrypts and infects files, which are then synced to shared cloud environments. Collaborators who access these shared files inadvertently execute the infected files, leading to further spread within the organization.Virlock sample:Let's analyze Virlock's behavior using a real-time sample inside ANY.RUN's sandbox.View sandbox analysis of VirlockVirlock ransomware inside VMJust like LockBit and Lynx, Virlock drops a ransom note upon execution. However, this time, it demands payment in Bitcoin, a common tactic among ransomware operators.In this specific sample, Virlock asks for the equivalent of $250 in Bitcoin, threatening to permanently delete files if the ransom isn't paid.Interestingly, the ransom note doesn't just demand payment. It also includes a guide on Bitcoin, explaining what it is and how victims can acquire it for payment. Ransom note demanding BitCoin left by VirlockDuring execution, ANY.RUN detects several malicious activities, revealing how Virlock operates:Behavior of Virlock ransomware analyzed by Interactive SandboxA Virlock-specific mutex is identified, helping the malware ensure only one instance runs at a time to avoid interference.Virlock executes commands through batch (.bat) files, launching CMD.EXE to perform malicious actions.The ransomware modifies the Windows registry using REG/REGEDIT.EXE, likely to establish persistence or disable security features.Each sandbox session in ANY.RUN automatically generates a detailed report that can be easily shared within a company. These reports are formatted for further analysis, helping security teams collaborate and develop effective strategies to combat ransomware threats in 2025.Generated report by ANY.RUN sandboxRansomware in 2025: A Growing Threat You Can StopRansomware is more aggressive than ever, disrupting businesses, stealing data, and demanding millions in ransom. The cost of an attack includes lost operations, damaged reputation, and stolen customer trust.You can stop ransomware before it locks you out. By analyzing suspicious files in ANY.RUN's Interactive Sandbox, you get real-time insights into malware behavior, without risking your systems.Try ANY.RUN free for 14 days to proactively identify cyber threats to your business before it's too late!Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·34 Views
  • The Silent Crisis: Non-Human Breach Dangers
    www.informationweek.com
    Itzik Alvas, CEO and Co-Founder, Entro SecurityFebruary 6, 20254 Min ReadNicoElNino via Alamy StockRecent high-profile security breaches have exposed alarming vulnerabilities in how enterprises manage non-human identities (NHIs) and secrets. From mishandling sensitive developer credentials to exposing secrets in collaboration tools, the threats have escalated. With cyberattacks becoming more sophisticated, addressing these gaps has become critical to safeguarding enterprise systems.Also called machine identities, NHIs outnumber human users. APIs, service accounts, cloud instances, and IoT devices form an invisible army of digital workers, each with its own identity and permissions. Here, I analyze how specific failures have enabled breaches and explore what enterprises must do to close these gaps.Modern enterprises are failing to keep pace with the NHIs that are being created in their environments, and as a result many identities remain exposed in publicly accessible areas for far too long.Bill Demirkapi recently made news for finding more than 15,000 hardcoded secrets and 66,000 vulnerable websites, all by searching overlooked data sources, underscoring the poor secrets management practices of modern enterprise security. These secrets were already active and exposed, just waiting for a bad actor to exploit them, but this is nowhere near the full scope of the problem.Related:Symantec reported that many mobile applications contain hardcoded cloud service credentials, such as AWS or Azure keys. These credentials are a goldmine for attackers, enabling unauthorized access to sensitive resources. Simple missteps during development, such as failing to use secrets management tools, can lead to catastrophic breaches.Collaboration: The Cost of Human ErrorExposures in collaboration tools such as Slack and Jira are increasingly a focal point for exposures. Disney has even vowed to move off Slack altogether to eliminate this exposure surface, after hackers were able to successfully leverage Slack to breach Disney and exfiltrate 1.1TB of data. Enterprises must treat collaboration tools as critical assets and secure secrets on them and human and non-human interactions with them in how they secure databases or servers.Unmonitored and Over-PermissionedIn the Okta-related Cloudflare breach, attackers used stolen personal access tokens to bypass multi-factor authentication (MFA), gaining access to highly sensitive systems. This breach highlights how static tokens can undermine enterprise security if not frequently rotated or monitored.The incident also revealed how attackers exploited unmonitored NHIs to move laterally and compromise additional identities within systems. Enterprises often fail to monitor NHI behaviors, such as unusual API usage or privilege escalation. Advanced behavioral analytics are essential for detecting and mitigating such threats.Related:Many enterprises over-provision NHIs, granting excessive permissions that attackers can exploit. For example, once hackers infiltrated Snowflake, they accessed terabytes of customer data by leveraging over-permissioned NHIs. These identities must be assigned least-privilege access to minimize damage during a breach.Secret Rotation Practices and Shared SecretsMany breaches stem from stagnant credentials. For instance, attackers in the Cloudflare breach exploited credentials that had not been rotated since an earlier compromise. Automated rotation policies should be enforced to ensure secrets are regularly updated, and workflows should be triggered when a breach is detected, even if the breach occurs in a partner environment.When multiple NHIs can be created by the same secret, this secret is referred to as a shared secret. Shared secrets are an Achilles heel of secure NHI architectures. Whether in developer workflows or cloud configurations, shared credentials increase the attack surface by allowing a single compromised identity with over-permissive access to additional resources. Enterprises must implement tools like AWS Secrets Manager or Azure Key Vault to enforce good hygiene and eliminate shared secrets altogether.Related:Despite advancements in identity and access management (IAM), modern IAM solutions rarely address NHIs, and fail to do so effectively. As the Cloudflare breach demonstrated, attackers exploit NHIs to access high-privilege accounts. Implementing NHIAM frameworks can mitigate these risks by ensuring:Granular access controls: Restrict NHI permissions to only what is necessary.Continuous monitoring: Use AI-driven tools to detect anomalies in NHI behavior.Dynamic credential management: Rotate and expire credentials automatically.Closing the GapsTo prevent future breaches, enterprises must adopt a holistic strategy to secure NHIs and secrets:Adopt zero-trust principles: Validate all secrets and provide permissions keeping with the principle of least privilege.Automate security practices: Use tools for automated NHI behavior monitoring, anomaly detection and response.Enhance collaboration tool security: Apply least-privilege access and periodically audit logs in platforms like Slack and Jira.Have response workflows in place: When an attack occurs, as well as threats to the third-party ecosystem.Educate developers: Provide training on secure coding practices, emphasizing the risks of hardcoded credentials.By learning from recent breaches and addressing these vulnerabilities, enterprises can protect their digital ecosystems from escalating threats. Its no longer just about securing human identities; its about ensuring NHIs and their secrets are protected with equal rigor.This shift is essential for enterprises to navigate an increasingly complex threat landscape and emerge resilient in the face of evolving cyberattacks.About the AuthorItzik AlvasCEO and Co-Founder, Entro SecurityItzik Alvas is co-founder and CEO at Entro Security. He started his career started his cybersecurity journey 19 years ago when he was selected to join the elite cyber security unit of the IDF (Israel Defense Forces), he was introduced to the cyber security ecosystem there and gained enormous knowledge and experience on a nation-state level. After serving for five years he moved to the real world where he held various positions in the industry including developer, DevOps, cyber security researcher and CISO of a major healthcare organization. Before becoming the head of security and SRE at Microsoft.See more from Itzik AlvasNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Comments ·0 Shares ·32 Views