• The New Ransomware Groups Shaking Up 2025
    thehackernews.com
    Mar 03, 2025The Hacker NewsThreat Intelligence / Incident ResponseIn 2024, global ransomware attacks hit 5,414, an 11% increase from 2023. After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year's total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95 in 2024.New Ransomware Groups to WatchIn 2023 there were just 27 new groups. 2024 saw a dramatic rise with 46 new groups detected. As the year went on the number of groups accelerated with Q4 2024 having 48 groups active. Of the 46 new ransomware groups in 2024, RansomHub became dominant, exceeding LockBit's activity. At Cyberint, now a Check Point Company, the research team is constantly researching the latest ransomware groups and analyzing them for potential impact. This blog will look at 3 new players, the aforementioned RansomHub, Fog and Lynx and examine their impact in 2024 and delve into their origins and TTPs.To learn about other new players download the 2024 Ransomware Report here.RansomhubRansomHub has emerged as the leading ransomware group in 2024, claiming 531 attacks on its Data Leak Site since commencing operations in Feb 2024. Following the FBI's disruption of ALPHV, RansomHub is perceived as its 'spiritual successor,' potentially involving former affiliates. Operating as a Ransomware-as-a-Service (RaaS), RansomHub enforces strict affiliate agreements, and RansomHub enforces strict adherence to affiliate agreements, with non-compliance resulting in bans and termination of partnerships. It offers a 90/10 ransom split, Affiliates/Core Group.While claiming a global hacker community, RansomHub avoids targeting CIS nations, Cuba, North Korea, China, and non-profits, exhibiting characteristics of a traditional Russian ransomware setup. Their avoidance of Russian-affiliated nations and overlap with other Russian ransomware groups in targeted companies further highlight their likely connections to Russia's cybercrime ecosystem.Cyberint's August 2024 findings indicate a low payment rate: only 11.2% of victims paid (20 of 190), with negotiations often reducing demands. RansomHub prioritizes attack volume over payment rates, leveraging affiliate expansion to ensure profitability, with the goal of generating substantial revenue over time despite low individual payment success.Malware, Toolset & TTPSRansomHub's ransomware, developed in Golang and C++, targets Windows, Linux, and ESXi, distinguished by its fast encryption. Similarities to GhostSec's ransomware suggest a trend. RansomHub guarantees free decryption if affiliates fail to provide it post-payment or target prohibited organizations. Their ransomware encrypts data before exfiltration. Potential ties to ALPHV are suggested by attack patterns, indicating similar tools and TTPs could be used. Sophos research highlights parallels with Knight Ransomware, including Go-language payloads obfuscated with GoObfuscate and identical command-line menus.Fog RansomwareFog ransomware appeared in early April 2024, targeting U.S. educational networks by exploiting stolen VPN credentials. They use a double-extortion strategy, publishing data on a TOR-based leak site if victims don't pay. In 2024, they attacked 87 organizations globally. An Arctic Wolf report from November 2024 showed Fog initiated at least 30 intrusions, all via compromised SonicWall VPN accounts. Notably, 75% of these intrusions were linked to Akira, with the rest attributed to Fog, suggesting shared infrastructure and collaboration. Fog primarily targets education, business services, travel, and manufacturing, with a focus on the U.S. Interestingly, Fog is one of the few ransomware groups that prioritize the education sector as their primary target.Fog ransomware has demonstrated alarming speed, with the shortest observed time from initial access to encryption being just two hours. Its attacks follow a typical ransomware kill chain, encompassing network enumeration, lateral movement, encryption, and data exfiltration. Versions of the ransomware exist for both Windows and Linux platforms.IOCsTypeValueLast Observation DateIPv4-Addr107.161.50.26Nov 28, 2024SHA-1507b26054319ff31f275ba44ddc9d2b5037bd295Nov 28, 2024SHA-1e1fb7d15408988df39a80b8939972f7843f0e785Nov 28, 2024SHA-183f00af43df650fda2c5b4a04a7b31790a8ad4cfNov 28, 2024SHA-144a76b9546427627a8d88a650c1bed3f1cc0278cNov 28, 2024SHA-1eeafa71946e81d8fe5ebf6be53e83a84dcca50baNov 28, 2024SHA-1763499b37aacd317e7d2f512872f9ed719aacae1Nov 28, 2024SHA-13477a173e2c1005a81d042802ab0f22cc12a4d55Feb 02, 2025SHA-190be89524b72f330e49017a11e7b8a257f975e9aNov 28, 2024Domain-Namegfs302n515.userstorage.mega.co.nzNov 28, 2024SHA-256e67260804526323484f564eebeb6c99ed021b960b899ff788aed85bb7a9d75c3Aug 20, 2024LynxLynx is a double-extortion ransomware group that has been very active lately, displaying many victimized companies on their website. They state that they avoid targeting government organizations, hospitals, non-profit groups, and other essential social sectors. Once they gain access to a system, Lynx encrypts files, appending the ".LYNX" extension. They then place a ransom note named "README.txt" in multiple directories. In 2024 alone, Lynx claimed more than 70 victims, demonstrating their continued activity and significant presence in the ransomware landscape.IOCsTypeValueLast Observation DateMD5e488d51793fec752a64b0834defb9d1dSep 08, 2024Domain-Namelynxback.proSep 08, 2024Domain-Namelynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd.onionSep 08, 2024Domain-Namelynxblog.netSep 08, 2024IPv4-Addr185.68.93.122Sep 08, 2024IPv4-Addr185.68.93.233Sep 08, 2024MD57e851829ee37bc0cf65a268d1d1baa7aFeb 17, 2025What's to Come in 2025?Due to the crackdown on ransomware groups, the most new groups on record have appeared, seeking to make a name for themselves. In 2025, Cyberint anticipates several of these newer groups to enhance their capabilities and emerge as dominant players, not just RansomHub.Read Cyberint, now a Check Point Company's 2024 Ransomware Report for the top targeted industries and countries, a breakdown of the top 3 ransomware groups, ransomware families worth noting, newcomers to the industry, arrests and news, and 2025 forecasts.Read the 2024 Ransomware Report to Gain Detailed Insights and More.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments ·0 Shares ·14 Views
  • What To Expect From the Intersection of AI and Biometrics
    www.informationweek.com
    You press your finger to your phone screen to access your bank account. You present your face to the camera to pass through security at the airport. Biometric authentication is a regular part of life and AI has been working behind the scenes in our lives for decades, too. And now, generative AIs increasing capabilities have thrust it to the forefront of nearly every conversation about technology. The seeming ubiquity of AI and biometrics suggests an inevitable convergence and we can already see this happening.As biometrics and AI are in use today, defining these technologies and their relationship to one another is not exactly cut and dry. The Biometrics Institute, which promotes ethical use of biometrics, asked its members about the relationship between the two technologies. The answers were conflicting.The organization published a paper, Members Viewpoints: The Relationship between Biometrics and Artificial Intelligence, sharing how some people view AI and biometrics as inextricably linked. Some say that biometrics are an adjunct to AI technology and as a consequence are always an integral part of it, according to the paper.On the other side of the debate, members argue that while the two technologies can be used together in many ways, some biometric applications exist quite separately from AI.Related:However you define AI and biometrics -- separately and together -- there are big questions for companies, governments, and individuals about the benefits, the risks, and responsible application.AI and More Powerful BiometricsWith AI tools readily available, threat actors are upping their game.AI-based attacks that we're seeing are right now primarily focused on how to compromise authentication systems through traditional mechanisms but made better by AI, Chace Hatcher, senior vice president of technology and strategy at cybersecurity company Telos, tells InformationWeek.It is harder to replicate a biometric marker than it is to compromise a password. Multi-modal biometric systems can enhance security in a time when attackers are always on the prowl for vulnerabilities and attack vectors.We can have a risk-based authentication system by layering the multiple biometric modalities accordingly, Geeta Gupta, head of AI and data science at Wink, a biometric authentication technology company, explains.The onslaught of AI-based attacks could drive more adoption of biometric security; the convenience of it is certainly another factor. And AI is in many ways powering stronger biometric capabilities.Related:AIs ability to analyze complex patterns is a clear boon in the biometrics space. It can pinpoint anomalies and recognize trends in vast swaths of biometric data. Perhaps humans could do the same but not nearly as quickly. Plus, AI systems can learn and improve over time. Fraud detection and prevention is made better.The underlying performance of the systems will get better, says Hatcher. The actual matching algorithms; they [will] work better: lower false rejections, lower false acceptance rates, less inherent bias in systems.Privacy and Security ConcernsBiometrics comes with obvious privacy concerns. When you hand over biometric data, you hand over immutable information unique to you. You cannot change your fingerprint or iris like you could a password. And as more biometric data is gathered -- and AI models have an insatiable need for data -- the risk of its compromise grows.If the data exists, and there's more of it, de facto it's more likely to be stolen, says Hatcher. Thats effectively true of any piece of data relevant to anything in the digital world.Threat actors can use AI-based attacks to go after biometric data with the goal of profiting from its sale. And then there is the concern that AI can be used to manipulate and mimic genuine biometric data.Related:Biometrics makes it harder to commit fraud, but the battle between cyber attackers and cyber defenders is never done. We have already seen examples of successful deepfake attacks. AI spoofing attacks aim to fool biometric systems into a false match and even use fake biometric data to pass security system checks, according to Biometric Update.You could make a sophisticated AI-based model of a known real human being now and fool some biometric systems out there with it, says Hatcher. I think anybody in the industry particularly in facial recognition and voice recognition is very concerned about it.Of course, enterprises are well aware of these threats, and there are ways to address them. Unsurprisingly, a fight-fire-with-fire approach is at the forefront. AI can be used to detect AI-based attacks on biometrics systems.As an example, AI models can undergo adversarial training, Gupta shares. Feed the model data that would be used in attacks against it to make it more resilient to real-life attempts.Anti-spoofing techniques can help thwart attempts to trick biometrics systems with manipulated or fake data.Most of the advanced systems [are] using infrared sensors to map the 3D contours of the face ensuring that the subject being scanned has a physical depth, unlike a flat photograph, Gupta shares as an example.And the more advanced systems have multiple mechanisms to verify identity and catch threat actors.In real time, we assess the variables and parameters like the geolocation of the person or the age of the person or any changes to the features of the person in real time, and we can enhance AI algorithms to learn from those changes, says Gupta.As organizations contemplate the risks that come with using AI and biometrics, data governance is essential. What data do organizations actually need to collect? How are they using it? How are they storing it?Organizations shouldnt collect data they don't need because you are creating a honey pot, says Hatcher. Hatcher also advocates for giving individuals more control over their identity information that is being stored. He hopes to see more tools that are cryptographically secure and embrace zero-knowledge proof; individuals can prove their identity without actually handing over their information.Ethical OutlookTogether, biometrics and AI can be a powerful way to combat fraud and verify identities. Over the course of its long history, which predates the technologys sophisticated digital iterations by centuries, it has been used in identity verification, citizenship registration, and criminology. But the capacity to categorize people has troubling possibilities.As a historian of biometrics and postdoctoral scholar in the social and ethical responsibilities of Computing at MIT's College of Computing, Michelle Spektor examines that history and its social impact.The same biometric data used to just simply identify someone, verify that they are who they say they are, has always had the capacity to be used to classify them or to single out people for discrimination, to make inferences about their personality, about their states of mind, to classify based on race, gender age, disability, to infer criminality, says Spektor.The question of bias is certainly a prominent one in the AI space. What happens when AI interprets biometric data and makes predictions about humans? The risk for bias and discriminatory outcomes are apparent.It is hard to imagine a world without biometrics and AI in it; the technologies are deeply ingrained in our day-to-day activities. But Spektor argues for a more mindful approach over simply assuming the use of this technology is always inevitable.Sometimes the question is also: Should we create or implement this technology at all? Is this the right context in which to use it? says Spektor.When AI and biometrics are used, enterprises and governments have a responsibility to do so securely and ethically. Many industry organizations have frameworks and principles to guide secure development and maintenance of systems that deploy AI and biometrics, but as those technologies evolve, these frameworks will have to as well.We don't know what kinds of capabilities will exist in the future. The kinds of things that can be done with that data, says Spektor. Having your, let's say, facial data stored somewhere, the realm of possibilities of what that could be used for has changed a lot over the last 10 years, 15 years, and will continue to change.
    0 Comments ·0 Shares ·16 Views
  • When to Watch the 'Paradise' Finale on Hulu
    www.cnet.com
    Emmy-winning actor Sterling K. Brownis back in a starring TV role. He's partnered with his former boss (and creator of This Is Us), Dan Fogelman, on the new political murder mysteryParadise.Brown plays Xavier Collins, the leader of the security team for former president Cal Bradford (played by Emmy nominee James Marsden). After discovering his boss' dead body, he launches a murder investigation, which opens his eyes to a deeper conspiracy that forces him to reconsider everything he knows.In addition to Brown and Marsden, the Paradise cast includes Krys Marshall, Julianne Nicholson, Sarah Shahi, Nicole Brydon Bloom, Charlie Evans, Rafael Cabrera, Richard Robichaux, Darin Toonder and Eddie Diaz.The political thriller has been a hit for Hulu; the streamer renewed the show for a second season. Read on to find out when the season 1 finale of Paradise will drop.Read more: Hulu Review: Strong Library of Network TV and Exciting Originals at a Competitive Price Sterling K. Brown stars as Xavier Collins, the head of the security detail assigned to former president Cal Bradford (James Marsden), in the political thriller Paradise on Hulu. DisneyWhen to watch Paradise on HuluThe eight-episode series premiered its first three episodes on Tuesday, Jan. 28, on Hulu -- with a surprise drop, a day early, of the first episode to Hulu and Disney Plus. Since then, the program has gained substantial buzz, making this a must-watch for Hulu subscribers.There is one episode remaining this season:Episode 8: The Man Who Kept the Secrets -- Tuesday, March 4You can choose from two Hulu plans, with the ad-supported version priced at $10 a month or $100 a year. If you prefer to skip the commercials, you can sign up for the ad-free version at $19 monthly, with no annual payment option. James Martin/CNET Looking for a deal on Hulu? Bundles ofHulu, Disney Plus and Maxor Hulu, Disney Plus and ESPN Plus offer savings over getting the services separately. You may also be able to score a Hulu free trial,student discountor get the streamer as a perk with a specific T-Mobile plan. See at Hulu
    0 Comments ·0 Shares ·14 Views
  • Spring Equinox Is Almost Here: Have You Heard the Egg-Balancing Myth?
    www.cnet.com
    Here in New Mexico, the roadrunners are frolicking, trees are budding and I'm sowing lettuce seeds in my raised beds. Spring is so close, I can feel it. I can even mark it on my calendar. The vernal equinox happens on March 20 when we welcome the astronomical start of spring in the northern hemisphere.Equinoxes might not get the same attention as solstices, but they're a lovely way to observe the shifting of the seasons. Let's get to know the vernal equinox and why it happens.What is the spring equinox?You've no doubt noticed the lengthening of daylight as winter winds down. Vernal equinox marks the tipping point into longer days.The word "equinox" comes from the Latin words for equal and night. Daylight and night are roughly equal during the equinox. We experience two each year -- the vernal equinox in the spring and the autumnal equinox in the fall. The word "vernal" also traces to Latin and references spring. Enlarge Image This National Weather Service graphic shows Earth's tilt, how it orbits the sun and when the equinoxes and solstices occur in the northern hemisphere. NWS/NOAAThe Earth spins on an axis (think of it like a line running from pole to pole) with a 23.5-degree tilt. Some parts of the planet get more direct sun than others. That's how we get our seasons, and how it can be summer in the northern hemisphere while it's winter in the southern hemisphere."The spring equinox is when the northern hemisphere transitions from being pointed away from the sun (during winter) to being pointed toward the sun (during summer)," says Emily Rice, associate professor of astrophysics at the Macaulay Honors College of the City University of New York. "The tilt is lined up with Earth's orbit for just a moment." That's when we get nearly equal amounts of daylight and night.When is the spring equinox?Spring equinox has a specific time. That's 2:01 a.m. PT on March 20. No need to set an alarm. You can celebrate the equinox all day on March 20.How is the solstice different from the equinox?Solstices are the extremes for days and nights. Summer solstice is the longest day while winter solstice is the shortest. Summer solstice for the northern hemisphere hits on June 20 while winter solstice occurs on Dec. 21 this year.Solstices get more love than equinoxes."The extremes are easier to mark and to visualize than the inflection points, which are more subtle changes, so the solstices get all the attention," says Rice. All of them are related to the sun and Earth's tilt, so think of solstices and equinoxes as siblings that each have their own seasonal connection.What equinoxes look like from spaceIt can be challenging to visualize the Earth's tilt and what happens during equinox from down on the ground. NASA put together a video showing the Earth as seen by a satellite. It tracks our planet through its seasons. Watch how night and daylight shift over time.How to celebrate the March equinoxPerhaps you've heard that you can balance a raw egg on its end only on the equinox. This legend might be accompanied by some vague discussion points about Earth's gravity and alignment and the sun. Enlarge Image I balanced this egg on its end on a day that wasn't the equinox. Amanda Kooser/CNETOne of Rice's annual equinox duties is debunking the egg-balancing myth."Astronomers are usually on the internet telling people that no, they can't actually balance an egg on its end only on an equinox," she says. You can go ahead and try it, but be sure to also test it out on a day that's not the equinox. I pulled it off on Feb. 27, in case you're wondering.Equinox is a subtle phenomenon. There are no showy celestial events to mark the day. Don't let that deter you. The vernal equinox is what you make of it."Considering that the Earth's orbit doesn't have a beginning or an end, a year could really be started any time, and the equinox is more astronomically meaningful than Jan. 1," says Rice.You can come up with your own way to celebrate the occasion. Tell your friends and co-workers it's the start of astronomical spring. Plant some seeds. Clean your house. Spend time outside. Make spring break plans. And take a moment to toast the sun, the Earth's tilt and our place in space that brings us the vernal equinox.
    0 Comments ·0 Shares ·14 Views
  • First Measles Death, Outbreaks of Mysterious Illness in DRC and Microbes in Space
    www.scientificamerican.com
    March 2, 2025The Latest on Measles in the U.S, a Mystery Illness in the DRC and the Flu VaccinesIn this news roundup, we cover outbreak updates, microbes in space and a brain turned to glass. Anaissa Ruiz Tejada/Scientific AmericanSUBSCRIBE TO Science QuicklyRachel Feltman: Happy Monday, listeners! And happy March. For Scientific Americans Science Quickly, Im Rachel Feltman. Lets get this month off to a good start with a quick roundup of some of the science and tech stories you might have missed last week.First, an unfortunate public health update. Last Wednesday health officials confirmed a death from measles in West Texas. That marks the first fatality in the regions ongoing outbreak, which has now infected more than 120 people across nine counties. It also marks the first death from measles within the U.S. since 2015. According to a news release from the Texas Department of State Health Services, the death was a school-aged child who was not vaccinated.The measles virus can survive in the air for up to two hours and is highly contagious. The best way to protect yourself and your kids is to make sure everyones vaccinations are up to date. The rarity of measles-related deaths in the U.S. doesnt mean the virus isnt dangerous; weve just done a very good job of vaccinating kids against it over the past few decades. Now those vaccination rates are slipping, and were facing the consequences. For more context on how falling vaccination rates have contributed to the severity of this outbreak, check out last weeks news roundup episode.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.Speaking of vaccines: federal health officials have apparently canceled a meeting critical to the flu shot development process. At the meeting, which was set for March 13, the U.S. Food and Drug Administrations Vaccines and Related Biological Products Advisory Committee was meant to discuss which strains of the flu virus should be used in next years vaccines. According to the Centers for Disease Control and Preventions website, this committee makes the final call on which viral strains go into our vaccines. The CDCs website states the following, Information about the circulation of influenza viruses and available vaccine viruses is summarized and presented to VRBPAC in February or March of each year for the U.S. decision about which viruses to include in the upcoming season's flu vaccine. Because flu viruses are always mutating and changing, having an updated assessment of which strains pose the biggest threat is crucial for rolling out an effective vaccine.Members of the committee received an email canceling the meeting last Wednesday. On Thursday a spokesperson for the U.S. Department of Health and Human Services told The Hill pharmaceutical manufacturers would still receive recommendations in time to create updated vaccines for next flu season. The World Health Organization met last week to do its own review of the flu data, and its findings often inform the FDA committees recommendationsso fortunately, its not like the FDA will be taking a shot in the dark.Meanwhile, last week the World Health Organization reported two clusters of illness and death from an unknown disease in the northwest Democratic Republic of Congo. As of February 15 there had been 431 cases and 53 deaths in total between both outbreaks, according to WHO. The first outbreak, reported in January, involved 12 cases and eight deaths, with symptoms progressing from fever to hemorrhagic illness. That outbreak was traced back to three children under the age of 5 who reportedly consumed bat meat before becoming ill. Samples from infected individuals have all tested negative for Ebola and Marburg.A second, larger cluster has since been reported in another village in the DRC. As of February 15 there had been 45 deaths out of 419 reported cases, with individuals experiencing symptoms like fever, pain, vomiting and diarrhea. Almost half of the fatalities occurred within 48 hours of a person presenting symptoms. While theres no known connection between these outbreaks as of yet, samples from individuals in the second cluster have also turned up negative for Ebola and Marburg. WHO reports that health teams are investigating other potential causes and that the villages where these outbreaks are taking place have limited testing and surveillance infrastructure. Its possible that these deaths can be explained by an existing illness or that theyre due to some kind of toxic-substance exposure. Late last year another unknown disease responsible for an outbreak in the DRC turned out to be severe malaria.Now lets head into space formore health news, actually.Youve probably seen or read at least one piece of science fiction about mysterious space microbes infecting humankind. But in a study published last Thursday in the journal Cell, researchers suggest that the International Space Station might actually be too clean. After testing more than 800 samples swabbed from different surfaces of the space station, scientists found that microbial diversity on the ISS is quite low. They compared it to the sterility of a hospital, with lots of disinfectant use.That might be great for avoiding infections in people recovering from surgeries, but most of us on Earth benefit from regular exposure to a variety of microbes. And unlike a hospital here on the ground, where lots of people come and go, bringing their own microbial passengers with themand where air circulates in from the microbial melting pot that is the outside worldthe ISS gets most of its microbes from the skin of astronauts. The researchers noted in the study that astronauts often complain of persistent rashes, atypical allergies, immune dysfunction and fungal or bacterial infections. The study says previous research has tied those sorts of issues in the general population to a lack of microbial diversity, so paying more attention to the tiny critters living on the ISS could help.Speaking of space: is anyone up for a beach trip on Mars? Apparently all youll need is a time machine. And a spaceship, of course. And, like, some kind of space suit you can also swim in. Anyway, the point is that Mars apparently once had sandy beaches, at least according to a study published last Monday in the Proceedings of the National Academy of Sciences. Chinas Zhurong rover used ground-penetrating radar to peek below the Martian surface, and it measured layers of sand some 30 to 115 feet down. The authors of the new study say this sand forms smooth, sloped layers similar to those that would accumulate on the shore of a beach on Earth. The researchers say their findings strengthen the case for the existence of a true ocean on Mars in its distant past.Weve also got a quick update on asteroid 2024 YR4. Great news! It no longer poses a statistically significant threat to our planet. Well have to find something else to look forward to in the 2030s. For more info on why the story about this asteroid developed and fizzled out so quickly, check out our episode from February 12.And now for something completely different! Lets wrap things up by talking about how a human brain can turn to glass.Back in 2020 researchers described some unique remains from a victim of the eruption of Mount Vesuvius in whats now Italy. The researchers determined that glassy black fragments extracted from the unfortunate Vesuvians skull were likely brain matter. The team speculated that the brain went through a process called vitrification, where extremely high heat followed by rapid cooling can turn material into glass. Glass can only form when the liquid within a material cools fast enough to avoid crystallization as it hardens.A study published last Thursday in Scientific Reports concludes that a very hot, short-lived ash cloud did the deed.Scientists analyzed the chunks of supposed brain glass and concluded that a brief temperature spike above 950 degrees Fahrenheit [510 degrees Celsius], followed by a swift cooldown, would be sufficient to vitrify a human brain. That ruled out the pyroclastic flow of the eruption, a.k.a. the stereotypical rush of gas, ash and rock you see coming out of an erupting volcano, which wouldnt be quite hot enough or dissipate quickly enough. But a sudden burst of super-heated ash could reach the requisite temperatures before vanishing. The researchers say the victims skull potentially played another important role in this unusual preservation. The braincase may have provided just enough protection to keep the ash cloud from completely destroying the soft tissue inside.Thats all for this weeks science news roundup. Well be back on Wednesday.Science Quickly is produced by me, Rachel Feltman, along with Fonda Mwangi, Kelso Harper, Naeem Amarsy and Jeff DelViscio. This episode was edited by Alex Sugiura. Shayna Posses and Aaron Shattuck fact-check our show. Our theme music was composed by Dominic Smith. Subscribe to Scientific American for more up-to-date and in-depth science news.For Scientific American, this is Rachel Feltman. Have a great week!
    0 Comments ·0 Shares ·9 Views
  • Visions of Mana co-director Kenji Ozawa opens new studio following NetEase departure
    www.eurogamer.net
    Visions of Mana co-director Kenji Ozawa has opened a new studio known as Sasanqua. Read more
    0 Comments ·0 Shares ·8 Views
  • Sonic Unleashed available for PC at last, thanks to fan-made port with uncapped framerate
    www.eurogamer.net
    Sonic Unleashed is finally available on PC thanks to a fan-made port with modern quality of life features. Read more
    0 Comments ·0 Shares ·8 Views
  • Monster Hunter Wilds free character edit mod destroys Capcoms gross microtransactions
    www.videogamer.com
    You can trust VideoGamer. Our team of gaming experts spend hours testing and reviewing the latest games, to ensure you're reading the most comprehensive guide possible. Rest assured, all imagery and advice is unique and original. Check out how we test and review games hereA new Monster Hunter Wilds mod has been released that allows players to completely bypass the games disgusting microtransactions. Following methods to quickly add new DLSS 4 features into the extremely popular new entry in Capcoms long-running action series, players can now free themselves with unlimited character edits.Edit your Monster Hunter Wilds character for freeReleased on Nexus Mods, Monster Hunter Wilds free character edits can be quickly added to the game for both the player character and their adorable feline Palico. Created by Ridog8, players can now edit their characters an unlimited number of times without a fee.The new PC mod technically still uses the games Edit Vouchers system. However, the number of vouchers is always set to zero, allowing players to edit their characters to their hearts content instead of being forced to pay for minor cosmetic alterations.To use the free character edit mod in Monster Hunter Wilds, you also need to have Re Framework installed, a modding tool that allows additional lua scripts to be executed in the game. Once this mod is installed, the character edit mod can be added to the title and you can be freed from gross microtransactions that, for some reason, still exist.Unfortunately, there is no way of freeing yourself from the paid character edit feature on console. However, there is hope that Capcom could rip the whole paid editing system out, or introduce an easy way to earn edit vouchers in game. If online complaining could change anything in a video game, this would be a good one.With Monster Hunter Wilds currently decimating Steam player numbers to become one of the most popular games to ever release on the platform, a great deal of post-launch support is bound to be on its way. An expansion or even two could arrive in the future but, right now, paid character edits need to be removed.Monster Hunter WildsPlatform(s):PC, PlayStation 5, Xbox Series S, Xbox Series S/X, Xbox Series XGenre(s):Action RPGSubscribe to our newsletters!By subscribing, you agree to our Privacy Policy and may receive occasional deal communications; you can unsubscribe anytime.Share
    0 Comments ·0 Shares ·13 Views
  • Valorant Agent 28 Waylay abilities disappoint with fans all saying the same thing
    www.videogamer.com
    You can trust VideoGamer. Our team of gaming experts spend hours testing and reviewing the latest games, to ensure you're reading the most comprehensive guide possible. Rest assured, all imagery and advice is unique and original. Check out how we test and review games hereThere was a lot of hype for the reveal of Valorant Agent 28. Tejo was released at the beginning of 2025, and fans were anxious to know who was joining him next after claims from pros that the new playable character is OP and better than Jett, Yoru, and Reyna combined. Riot Games has now pulled the curtain aside, and, while the new character is by no means bad, some fans are disappointed with the abilities for Valorant Agent 28, Waylay.Valorant fans disappointed with Agent 28 Waylay abilitiesThe official abilities for Valorant Agent 28, Waylay, are as follows:RefractInstantly create a beacon of light on the floor. Reactivate to speed back to your beacon as a mote of pure light. You are invulnerable as you travel.Light SpeedEquip to prepare for a burst of speed. Fire to dash forward twice. Alt fire to dash once. Only your first dash can send you upward.SaturateInstantly throw a cluster of light that explodes upon contact with the ground, hindering nearby players with a powerful movement and weapon slow.Convergent PathsEquip to focus your prismatic power. Fire to create an afterimage of yourself that projects a beam of light inValorant. After a brief delay, you gain a powerful speed boost and the beam expands, hindering other players in the area.Reacting to these abilities on Reddit, there is some disappointment within the community. The overwhelming complaint is that creativity is really dead. Fans are not impressed with how Riot Games created a new agent [just] to add other agents abilities to them, and this is because their skillset is basically Breach ult + Jett dash + clove decay + clove ult but in reverse, or Chamber tp, Jett q+e Neon stun that dont screen shake.Most of the complaints are about Riot recycling/tweaking other agents abilities, and how this is a sign the developer is running out of ideas. Another comment says, This is underwhelming. Nothing new added, just past agents abilities rearranged into a new one, which is echoed by another comment saying, Why are we reskinning abilities? [They dont] have a single unique quality.While fans might be disappointed, reskinned abilities was to be expected as Valorant pros teased Agent 28 is a cocktail of previous Duelists. Hopefully this new character has enough about them to stand out when they release on March 5th, but right now fans are underwhelmed.For more Valorant, check out our18 tips on how to get betterat the game along with our guide forhow to appear offlineif you dont want certain friends knowing youre playing. We also have guides forhow to chat with the team, all, and private, along withhow to add friends.ValorantPlatform(s):PCGenre(s):Action, Shooter, StrategyRelated TopicsValorant Subscribe to our newsletters!By subscribing, you agree to our Privacy Policy and may receive occasional deal communications; you can unsubscribe anytime.Share
    0 Comments ·0 Shares ·14 Views
  • Trumps Defense Secretary Hegseth Orders Cyber Command to Stand Down on All Russia Operations | Russia is not a significant cyber threat to the U.S. anymore, Trump's new Defense Secretary says.
    gizmodo.com
    By Lucas Ropek Published March 2, 2025 | Comments (371) | DVIDS / DoD photo by U.S. Navy Petty Officer 1st Class Alexander Kubitza It appears that the U.S. no longer considers Russia a significant cyber threat, according to multiple new reports on a drastic policy reversal that has taken hold under the new Trump administration. The cybersecurity outlet The Record originally reported that under Trumps new Defense Secretary Pete Hegseth, U.S. Cyber Command has been ordered to stand down from all planning against Russia, including offensive digital actions. The outlet cites three anonymous sources who are familiar with the matter. The order reportedly does not apply to the National Security Agency. The policy shift represents a complete 180-degree turn from Americas posture over the past decade, which has consistently considered Russia one of the top cybersecurity threats. Credible reporting and government investigations have shown that Russia has hacked into U.S. systems countless times. The Guardian has reported that a memo recently circulated to staff at Americas Cybersecurity and Infrastructure Security Agency (CISA) established new priorities for the agency and, while mentioning the threat of digital incursions by China and other enemies, failed to mention Russia. Russia and China are our biggest adversaries. With all the cuts being made to different agencies, a lot of cyber security personnel have been fired. Our systems are not going to be protected and our adversaries know this, a source, who was familiar with the internal memo, told The Guardian. People are saying Russia is winning. Putin is on the inside now.Another anonymous source, who said that CISA staff had been verbally informed that they were not to follow or report on Russian threats, expressed concern for the shift: There are thousands of US government employees and military working daily on the massive threat Russia poses as possibly the most significant nation state threat actor. Not to diminish the significance of China, Iran, or North Korea, but Russia is at least on par with China as the most significant cyber threat, they said. The U.S.s new Director of National Intelligence, Tulsi Gabbard, recently fired about 100 National Security Agency employees after they were exposed for having sexually explicit chats on work computers. They were brazen in using an NSA platform intended for professional use to conduct this kind of really, really horrific behavior, Gabbard told Fox News.As far as layoffs go, the NSA purge is a drop in the bucket for Americas signals intelligence agency. One of the intel communitys biggest outfits is reputed to employ at least 20,000 employees but has been estimated to useas many as 50,000. In general, despite Trumps promise to smash the deep state, Americas dark and powerful national security state has remained largely untouched since he took office, with his administrations wrecking ball DOGE content to spend most of its time smashing agencies that dispense services to the public.Daily NewsletterYou May Also Like By Thomas Maxwell Published February 24, 2025 By AJ Dellinger Published February 21, 2025 By Thomas Maxwell Published February 21, 2025 By Matt Novak Published February 20, 2025 By Matthew Gault Published February 14, 2025 By Matt Novak Published February 7, 2025
    0 Comments ·0 Shares ·18 Views