• Street Fighter Movie Adds Dan And Balrog Actors, Confirms Akuma Casting - Report

    The new Street Fighter movie has added a few more names to the cast. Earlier this week, rapper-turned-actor Curtis "50 Cent" Jackson teased that he will play Balrog in the film. That rumor now appears to be confirmed, and another performer has signed up to play Dan Hibiki, one of the weakest fighters in the Street Fighter universe.According to Deadline, comedian Andrew Schulz will play Dan in the film. That's appropriate, since Dan is largely a comic relief character who gets played for laughs. This will mark Dan's first-ever appearance in live-action media. Schulz has previously appeared in The Underdoggs and the remake of White Men Can’t Jump, as well as the second season of Netflix's sitcom Tires. He is also the host of Flagrant Pod, a popular comedy podcast, and his most recent comedy special was streamed on Netflix.Jackson's casting as Balrog was confirmed in a subsequent report by The Hollywood Reporter. THR went a step further by confirming the roles of a few previously cast actors including Andrew Koji as Ryu, Noah Centineo as Ken, Jason Momoa as Blanka, and Orville Peck as Vega. Additionally, the outlet notes that Joe "Roman Reigns" Anoa’i, a longtime WWE superstar and former World Champion, will play Akuma, one of the film's primary villains.Continue Reading at GameSpot
    #street #fighter #movie #adds #dan
    Street Fighter Movie Adds Dan And Balrog Actors, Confirms Akuma Casting - Report
    The new Street Fighter movie has added a few more names to the cast. Earlier this week, rapper-turned-actor Curtis "50 Cent" Jackson teased that he will play Balrog in the film. That rumor now appears to be confirmed, and another performer has signed up to play Dan Hibiki, one of the weakest fighters in the Street Fighter universe.According to Deadline, comedian Andrew Schulz will play Dan in the film. That's appropriate, since Dan is largely a comic relief character who gets played for laughs. This will mark Dan's first-ever appearance in live-action media. Schulz has previously appeared in The Underdoggs and the remake of White Men Can’t Jump, as well as the second season of Netflix's sitcom Tires. He is also the host of Flagrant Pod, a popular comedy podcast, and his most recent comedy special was streamed on Netflix.Jackson's casting as Balrog was confirmed in a subsequent report by The Hollywood Reporter. THR went a step further by confirming the roles of a few previously cast actors including Andrew Koji as Ryu, Noah Centineo as Ken, Jason Momoa as Blanka, and Orville Peck as Vega. Additionally, the outlet notes that Joe "Roman Reigns" Anoa’i, a longtime WWE superstar and former World Champion, will play Akuma, one of the film's primary villains.Continue Reading at GameSpot #street #fighter #movie #adds #dan
    WWW.GAMESPOT.COM
    Street Fighter Movie Adds Dan And Balrog Actors, Confirms Akuma Casting - Report
    The new Street Fighter movie has added a few more names to the cast. Earlier this week, rapper-turned-actor Curtis "50 Cent" Jackson teased that he will play Balrog in the film. That rumor now appears to be confirmed, and another performer has signed up to play Dan Hibiki, one of the weakest fighters in the Street Fighter universe.According to Deadline, comedian Andrew Schulz will play Dan in the film. That's appropriate, since Dan is largely a comic relief character who gets played for laughs. This will mark Dan's first-ever appearance in live-action media. Schulz has previously appeared in The Underdoggs and the remake of White Men Can’t Jump, as well as the second season of Netflix's sitcom Tires. He is also the host of Flagrant Pod, a popular comedy podcast, and his most recent comedy special was streamed on Netflix.Jackson's casting as Balrog was confirmed in a subsequent report by The Hollywood Reporter. THR went a step further by confirming the roles of a few previously cast actors including Andrew Koji as Ryu, Noah Centineo as Ken, Jason Momoa as Blanka, and Orville Peck as Vega. Additionally, the outlet notes that Joe "Roman Reigns" Anoa’i, a longtime WWE superstar and former World Champion, will play Akuma, one of the film's primary villains.Continue Reading at GameSpot
    0 Kommentare 0 Anteile
  • It’s absolutely infuriating how the creative industry is still drowning in mediocrity when it comes to job opportunities for Blender artists. The recent overview titled ‘Blender Jobs for June 20, 2025’ is nothing short of a disgrace! What are we doing here? Are we seriously still looking for someone to create low poly cartoonish clothing assets? This is 2025, people! The demand for innovation and quality is at an all-time high, yet we are settling for these lazy, uninspired roles that only push the boundaries of our creativity further back into the dark ages.

    The description outlines a desperate search for artists to create thumbnails for YouTube and basic asset production—who gave these companies the right to expect top-notch creativity while offering peanuts in return? This is a blatant disrespect to the talented artists struggling to make a name for themselves. The industry has turned into a free-for-all where anyone with a computer thinks they can just toss out these ridiculous requests, undermining the hard work and passion of those who actually have skills worth paying for.

    “Stealth Startup” and “Pizza Party Productions”? Really? Is this some kind of joke? These names scream lack of professionalism and vision. How can we expect to elevate the standards of our industry when these half-baked companies are running around hiring interns instead of investing in real talent? It’s ludicrous! What’s next? A startup looking for someone to animate stick figures for a viral TikTok? Come on!

    Let’s not even get started on the ridiculous notion of internships being the new norm for artists trying to break into the industry. The term “3D Artist Intern” is a euphemism for “overworked and underpaid.” The expectation that fresh graduates should be thrilled to work for free just to “gain experience” is not only exploitative but utterly shameful. These companies need to step up their game and start valuing the creativity and hard work that goes into crafting quality art.

    Every time I scroll through these job postings, I feel my blood boil. Are we going to continue to allow this cycle of mediocrity to persist? It’s time for artists to take a stand and demand better. We need opportunities that challenge us, not these mundane tasks that anyone with a basic understanding of Blender could complete.

    We deserve to work in an environment that fosters creativity, innovation, and respect for our craft. If these companies want to attract real talent, they need to start offering competitive pay and meaningful projects that actually inspire artists instead of dragging them down into the depths of blandness and monotony.

    Wake up, industry! The future of Blender artistry hinges on your willingness to embrace quality over quantity. Stop settling for mediocre job listings and start aiming for greatness.

    #BlenderJobs #3DArtist #CreativityMatters #ArtIndustry #DemandBetter
    It’s absolutely infuriating how the creative industry is still drowning in mediocrity when it comes to job opportunities for Blender artists. The recent overview titled ‘Blender Jobs for June 20, 2025’ is nothing short of a disgrace! What are we doing here? Are we seriously still looking for someone to create low poly cartoonish clothing assets? This is 2025, people! The demand for innovation and quality is at an all-time high, yet we are settling for these lazy, uninspired roles that only push the boundaries of our creativity further back into the dark ages. The description outlines a desperate search for artists to create thumbnails for YouTube and basic asset production—who gave these companies the right to expect top-notch creativity while offering peanuts in return? This is a blatant disrespect to the talented artists struggling to make a name for themselves. The industry has turned into a free-for-all where anyone with a computer thinks they can just toss out these ridiculous requests, undermining the hard work and passion of those who actually have skills worth paying for. “Stealth Startup” and “Pizza Party Productions”? Really? Is this some kind of joke? These names scream lack of professionalism and vision. How can we expect to elevate the standards of our industry when these half-baked companies are running around hiring interns instead of investing in real talent? It’s ludicrous! What’s next? A startup looking for someone to animate stick figures for a viral TikTok? Come on! Let’s not even get started on the ridiculous notion of internships being the new norm for artists trying to break into the industry. The term “3D Artist Intern” is a euphemism for “overworked and underpaid.” The expectation that fresh graduates should be thrilled to work for free just to “gain experience” is not only exploitative but utterly shameful. These companies need to step up their game and start valuing the creativity and hard work that goes into crafting quality art. Every time I scroll through these job postings, I feel my blood boil. Are we going to continue to allow this cycle of mediocrity to persist? It’s time for artists to take a stand and demand better. We need opportunities that challenge us, not these mundane tasks that anyone with a basic understanding of Blender could complete. We deserve to work in an environment that fosters creativity, innovation, and respect for our craft. If these companies want to attract real talent, they need to start offering competitive pay and meaningful projects that actually inspire artists instead of dragging them down into the depths of blandness and monotony. Wake up, industry! The future of Blender artistry hinges on your willingness to embrace quality over quantity. Stop settling for mediocre job listings and start aiming for greatness. #BlenderJobs #3DArtist #CreativityMatters #ArtIndustry #DemandBetter
    Blender Jobs for June 20, 2025
    Here's an overview of the most recent Blender jobs on Blender Artists, ArtStation and 3djobs.xyz: Looking for someone to create some low poly cartoonish clothing asset for my character I'm looking for an artist to make me a Thumbnail for YouTube Vert
    Like
    Love
    Wow
    Angry
    Sad
    219
    1 Kommentare 0 Anteile
  • In a world where smartphones have become extensions of our very beings, it seems only fitting that the latest buzz is about none other than the Trump Mobile and its dazzling Gold T1 smartphone. Yes, you heard that right – a phone that’s as golden as its namesake’s aspirations and, arguably, just as inflated!

    Let’s dive into the nine *urgent* questions we all have about this technological marvel. First on the list: Is it true that the Trump Mobile can only connect to social media platforms that feature a certain orange-tinted filter? Because if it doesn’t, what’s the point, really? We all know that a phone’s worth is measured by its ability to curate the perfect image, preferably one that makes the user look like a billion bucks—just like the former president himself.

    And while we’re on the topic of money, can we talk about the Gold T1’s price tag? Rumor has it that it’s priced like a luxury yacht, but comes with the battery life of a damp sponge. A perfect combo for those who wish to flaunt their wealth while simultaneously being unable to scroll through their Twitter feed without a panic attack when the battery drops to 1%.

    Now, let’s not forget about the *data plan*. Is it true that the plan includes unlimited access to news outlets that only cover “the best” headlines? Because if I can’t get my daily dose of “Trump is the best” articles, then what’s the point of having a phone that’s practically a golden trophy? I can just see the commercials now: “Get your Trump Mobile and never miss an opportunity to revel in your own glory!”

    Furthermore, what about the customer service? One can only imagine calling for assistance and getting a voicemail that says, “We’re busy making America great again, please leave a message after the beep.” If you’re lucky, you might get a callback… in a week, or perhaps never. After all, who needs help when you have a phone that’s practically an icon of success?

    Let’s also discuss the design. Is it true that the Gold T1 comes with a built-in mirror so you can admire yourself while pretending to check your messages? Because nothing screams “I’m important” like a smartphone that encourages narcissism at every glance.

    And what about the camera? Will it have a special feature that automatically enhances your selfies to ensure you look as good as the carefully curated versions of yourself? I mean, we can’t have anything less than perfection when it comes to our online personas, can we?

    In conclusion, while the Trump Mobile and Gold T1 smartphone might promise a new era of connectivity and self-admiration, one can only wonder if it’s all a glittery façade hiding a less-than-stellar user experience. But hey, for those who’ve always dreamt of owning a piece of tech that’s as bold and brash as its namesake, this might just be the device for you!

    #TrumpMobile #GoldT1 #SmartphoneHumor #TechSatire #DigitalNarcissism
    In a world where smartphones have become extensions of our very beings, it seems only fitting that the latest buzz is about none other than the Trump Mobile and its dazzling Gold T1 smartphone. Yes, you heard that right – a phone that’s as golden as its namesake’s aspirations and, arguably, just as inflated! Let’s dive into the nine *urgent* questions we all have about this technological marvel. First on the list: Is it true that the Trump Mobile can only connect to social media platforms that feature a certain orange-tinted filter? Because if it doesn’t, what’s the point, really? We all know that a phone’s worth is measured by its ability to curate the perfect image, preferably one that makes the user look like a billion bucks—just like the former president himself. And while we’re on the topic of money, can we talk about the Gold T1’s price tag? Rumor has it that it’s priced like a luxury yacht, but comes with the battery life of a damp sponge. A perfect combo for those who wish to flaunt their wealth while simultaneously being unable to scroll through their Twitter feed without a panic attack when the battery drops to 1%. Now, let’s not forget about the *data plan*. Is it true that the plan includes unlimited access to news outlets that only cover “the best” headlines? Because if I can’t get my daily dose of “Trump is the best” articles, then what’s the point of having a phone that’s practically a golden trophy? I can just see the commercials now: “Get your Trump Mobile and never miss an opportunity to revel in your own glory!” Furthermore, what about the customer service? One can only imagine calling for assistance and getting a voicemail that says, “We’re busy making America great again, please leave a message after the beep.” If you’re lucky, you might get a callback… in a week, or perhaps never. After all, who needs help when you have a phone that’s practically an icon of success? Let’s also discuss the design. Is it true that the Gold T1 comes with a built-in mirror so you can admire yourself while pretending to check your messages? Because nothing screams “I’m important” like a smartphone that encourages narcissism at every glance. And what about the camera? Will it have a special feature that automatically enhances your selfies to ensure you look as good as the carefully curated versions of yourself? I mean, we can’t have anything less than perfection when it comes to our online personas, can we? In conclusion, while the Trump Mobile and Gold T1 smartphone might promise a new era of connectivity and self-admiration, one can only wonder if it’s all a glittery façade hiding a less-than-stellar user experience. But hey, for those who’ve always dreamt of owning a piece of tech that’s as bold and brash as its namesake, this might just be the device for you! #TrumpMobile #GoldT1 #SmartphoneHumor #TechSatire #DigitalNarcissism
    9 Urgent Questions About Trump Mobile and the Gold T1 Smartphone
    We don’t know much about the new Trump Mobile phone or the company’s data plan, but we sure do have a lot of questions.
    Like
    Love
    Wow
    Angry
    Sad
    244
    1 Kommentare 0 Anteile
  • In a world where AI is revolutionizing everything from coffee-making to car-driving, it was only a matter of time before our digital mischief-makers decided to hop on the bandwagon. Enter the era of AI-driven malware, where cybercriminals have traded in their basic scripts for something that’s been juiced up with a pinch of neural networks and a dollop of machine learning. Who knew that the future of cibercrimen would be so... sophisticated?

    Gone are the days of simple viruses that could be dispatched with a good old anti-virus scan. Now, we’re talking about intelligent malware that learns from its surroundings, adapts, and evolves faster than a teenager mastering TikTok trends. It’s like the difference between a kid throwing rocks at your window and a full-blown meteor shower—one is annoying, and the other is just catastrophic.

    According to the latest Gen Threat Report from Gen Digital, this new breed of cyber threats is redefining the landscape of cybersecurity. Oh, joy! Just what we needed—cybercriminals with PhDs in deviousness. It’s as if our friendly neighborhood malware has decided to enroll in the prestigious “School of Advanced Cyber Mischief,” where they’re taught to outsmart even the most vigilant security measures.

    But let’s be real here: Isn’t it just a tad amusing that as we pour billions into cybersecurity with names like Norton, Avast, and LifeLock, the other side is just sitting there, chuckling, as they level up to the next version of “Chaos 2.0”? You have to admire their resourcefulness. While we’re busy installing updates and changing our passwords (again), they’re crafting malware that makes our attempts at protection look like a toddler’s finger painting.

    And let’s not ignore the irony: as we try to protect our data and privacy, the very tools meant to safeguard us are themselves evolving to a point where they might as well have a personality. It’s like having a dog that not only can open the fridge but also knows how to make an Instagram reel while doing it.

    So, what can we do in the face of this digital dilemma? Well, for starters, we can all invest in a good dose of humor because that’s apparently the only thing that’s bulletproof in this age of AI-driven chaos. Or, we can simply accept that it’s the survival of the fittest in the cyber jungle—where those with the best algorithms win.

    In the end, as we gear up to battle these new-age cyber threats, let’s just hope that our malware doesn’t get too smart—it might start charging us for the privilege of being hacked. After all, who doesn’t love a little subscription model in their life?

    #Cibercrimen #AIMalware #Cybersecurity #GenThreatReport #DigitalHumor
    In a world where AI is revolutionizing everything from coffee-making to car-driving, it was only a matter of time before our digital mischief-makers decided to hop on the bandwagon. Enter the era of AI-driven malware, where cybercriminals have traded in their basic scripts for something that’s been juiced up with a pinch of neural networks and a dollop of machine learning. Who knew that the future of cibercrimen would be so... sophisticated? Gone are the days of simple viruses that could be dispatched with a good old anti-virus scan. Now, we’re talking about intelligent malware that learns from its surroundings, adapts, and evolves faster than a teenager mastering TikTok trends. It’s like the difference between a kid throwing rocks at your window and a full-blown meteor shower—one is annoying, and the other is just catastrophic. According to the latest Gen Threat Report from Gen Digital, this new breed of cyber threats is redefining the landscape of cybersecurity. Oh, joy! Just what we needed—cybercriminals with PhDs in deviousness. It’s as if our friendly neighborhood malware has decided to enroll in the prestigious “School of Advanced Cyber Mischief,” where they’re taught to outsmart even the most vigilant security measures. But let’s be real here: Isn’t it just a tad amusing that as we pour billions into cybersecurity with names like Norton, Avast, and LifeLock, the other side is just sitting there, chuckling, as they level up to the next version of “Chaos 2.0”? You have to admire their resourcefulness. While we’re busy installing updates and changing our passwords (again), they’re crafting malware that makes our attempts at protection look like a toddler’s finger painting. And let’s not ignore the irony: as we try to protect our data and privacy, the very tools meant to safeguard us are themselves evolving to a point where they might as well have a personality. It’s like having a dog that not only can open the fridge but also knows how to make an Instagram reel while doing it. So, what can we do in the face of this digital dilemma? Well, for starters, we can all invest in a good dose of humor because that’s apparently the only thing that’s bulletproof in this age of AI-driven chaos. Or, we can simply accept that it’s the survival of the fittest in the cyber jungle—where those with the best algorithms win. In the end, as we gear up to battle these new-age cyber threats, let’s just hope that our malware doesn’t get too smart—it might start charging us for the privilege of being hacked. After all, who doesn’t love a little subscription model in their life? #Cibercrimen #AIMalware #Cybersecurity #GenThreatReport #DigitalHumor
    El malware por IA está redefiniendo el cibercrimen
    Gen Digital, el grupo especializado en ciberseguridad con marcas como Norton, Avast, LifeLock, Avira, AVG, ReputationDefender y CCleaner, ha publicado su informe Gen Threat Report correspondiente al primer trimestre de 2025, mostrando los cambios má
    Like
    Love
    Wow
    Angry
    Sad
    606
    1 Kommentare 0 Anteile
  • NYT Connections Sports Edition today: Hints and answers for June 16, 2025

    Credit: Image Credit: Ian Moore / James Martin / Viva Tung / Mashable Composite

    Connections: Sports Edition is a new version of the popular New York Times word game that seeks to test the knowledge of sports fans. Like the original Connections, the game is all about finding the "common threads between words." And just like Wordle, Connections resets after midnight and each new set of words gets trickier and trickier—so we've served up some hints and tips to get you over the hurdle.If you just want to be told today's puzzle, you can jump to the end of this article for the latest Connections solution. But if you'd rather solve it yourself, keep reading for some clues, tips, and strategies to assist you.What is Connections Sports Edition?The NYT's latest daily word game has launched in association with The Athletic, the New York Times property that provides the publication's sports coverage. Connections can be played on both web browsers and mobile devices and require players to group four words that share something in common.Each puzzle features 16 words and each grouping of words is split into four categories. These sets could comprise of anything from book titles, software, country names, etc. Even though multiple words will seem like they fit together, there's only one correct answer.If a player gets all four words in a set correct, those words are removed from the board. Guess wrong and it counts as a mistake—players get up to four mistakes until the game ends.Players can also rearrange and shuffle the board to make spotting connections easier. Additionally, each group is color-coded with yellow being the easiest, followed by green, blue, and purple. Like Wordle, you can share the results with your friends on social media.

    Mashable Top Stories

    Stay connected with the hottest stories of the day and the latest entertainment news.
    Sign up for Mashable's Top Stories newsletter

    By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

    Thanks for signing up!

    Here's a hint for today's Connections Sports Edition categoriesWant a hint about the categories without being told the categories? Then give these a try:Yellow: ScorelessGreen: Midwest college townsBlue: GolfPurple: Major names behind the plate

    Featured Video For You

    Connections: How to play and how to win

    Here are today's Connections Sports Edition categoriesNeed a little extra help? Today's connections fall into the following categories:Yellow: Slang for ZeroGreen: Big Ten CitiesBlue: Sites of This Year's Men's Golf MajorsPurple: MLB CatchersLooking for Wordle today? Here's the answer to today's Wordle.Ready for the answers? This is your last chance to turn back and solve today's puzzle before we reveal the solutions.Drumroll, please!The solution to today's Connections Sports Edition #266 is...What is the answer to Connections Sports Edition todaySlang for Zero - BAGEL, DONUT, GOOSE EGG, NILBig Ten Cities - COLLEGE PARK, COLUMBUS, EAST LANSING, MADISONSites of This Year's Men's Golf Majors - AUGUSTA, OAKMONT, QUAIL HOLLOW, ROYAL PORTRUSHMLB Catchers - PEREZ, RALEIGH, REALMUTO, RUTSCHMANDon't feel down if you didn't manage to guess it this time. There will be new Connections for you to stretch your brain with tomorrow, and we'll be back again to guide you with more helpful hints.Are you also playing NYT Strands? See hints and answers for today's Strands.If you're looking for more puzzles, Mashable's got games now! Check out our games hub for Mahjong, Sudoku, free crossword, and more.Not the day you're after? Here's the solution to yesterday's Connections.

    Topics
    Connections
    #nyt #connections #sports #edition #today
    NYT Connections Sports Edition today: Hints and answers for June 16, 2025
    Credit: Image Credit: Ian Moore / James Martin / Viva Tung / Mashable Composite Connections: Sports Edition is a new version of the popular New York Times word game that seeks to test the knowledge of sports fans. Like the original Connections, the game is all about finding the "common threads between words." And just like Wordle, Connections resets after midnight and each new set of words gets trickier and trickier—so we've served up some hints and tips to get you over the hurdle.If you just want to be told today's puzzle, you can jump to the end of this article for the latest Connections solution. But if you'd rather solve it yourself, keep reading for some clues, tips, and strategies to assist you.What is Connections Sports Edition?The NYT's latest daily word game has launched in association with The Athletic, the New York Times property that provides the publication's sports coverage. Connections can be played on both web browsers and mobile devices and require players to group four words that share something in common.Each puzzle features 16 words and each grouping of words is split into four categories. These sets could comprise of anything from book titles, software, country names, etc. Even though multiple words will seem like they fit together, there's only one correct answer.If a player gets all four words in a set correct, those words are removed from the board. Guess wrong and it counts as a mistake—players get up to four mistakes until the game ends.Players can also rearrange and shuffle the board to make spotting connections easier. Additionally, each group is color-coded with yellow being the easiest, followed by green, blue, and purple. Like Wordle, you can share the results with your friends on social media. Mashable Top Stories Stay connected with the hottest stories of the day and the latest entertainment news. Sign up for Mashable's Top Stories newsletter By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up! Here's a hint for today's Connections Sports Edition categoriesWant a hint about the categories without being told the categories? Then give these a try:Yellow: ScorelessGreen: Midwest college townsBlue: GolfPurple: Major names behind the plate Featured Video For You Connections: How to play and how to win Here are today's Connections Sports Edition categoriesNeed a little extra help? Today's connections fall into the following categories:Yellow: Slang for ZeroGreen: Big Ten CitiesBlue: Sites of This Year's Men's Golf MajorsPurple: MLB CatchersLooking for Wordle today? Here's the answer to today's Wordle.Ready for the answers? This is your last chance to turn back and solve today's puzzle before we reveal the solutions.Drumroll, please!The solution to today's Connections Sports Edition #266 is...What is the answer to Connections Sports Edition todaySlang for Zero - BAGEL, DONUT, GOOSE EGG, NILBig Ten Cities - COLLEGE PARK, COLUMBUS, EAST LANSING, MADISONSites of This Year's Men's Golf Majors - AUGUSTA, OAKMONT, QUAIL HOLLOW, ROYAL PORTRUSHMLB Catchers - PEREZ, RALEIGH, REALMUTO, RUTSCHMANDon't feel down if you didn't manage to guess it this time. There will be new Connections for you to stretch your brain with tomorrow, and we'll be back again to guide you with more helpful hints.Are you also playing NYT Strands? See hints and answers for today's Strands.If you're looking for more puzzles, Mashable's got games now! Check out our games hub for Mahjong, Sudoku, free crossword, and more.Not the day you're after? Here's the solution to yesterday's Connections. Topics Connections #nyt #connections #sports #edition #today
    MASHABLE.COM
    NYT Connections Sports Edition today: Hints and answers for June 16, 2025
    Credit: Image Credit: Ian Moore / James Martin / Viva Tung / Mashable Composite Connections: Sports Edition is a new version of the popular New York Times word game that seeks to test the knowledge of sports fans. Like the original Connections, the game is all about finding the "common threads between words." And just like Wordle, Connections resets after midnight and each new set of words gets trickier and trickier—so we've served up some hints and tips to get you over the hurdle.If you just want to be told today's puzzle, you can jump to the end of this article for the latest Connections solution. But if you'd rather solve it yourself, keep reading for some clues, tips, and strategies to assist you.What is Connections Sports Edition?The NYT's latest daily word game has launched in association with The Athletic, the New York Times property that provides the publication's sports coverage. Connections can be played on both web browsers and mobile devices and require players to group four words that share something in common.Each puzzle features 16 words and each grouping of words is split into four categories. These sets could comprise of anything from book titles, software, country names, etc. Even though multiple words will seem like they fit together, there's only one correct answer.If a player gets all four words in a set correct, those words are removed from the board. Guess wrong and it counts as a mistake—players get up to four mistakes until the game ends.Players can also rearrange and shuffle the board to make spotting connections easier. Additionally, each group is color-coded with yellow being the easiest, followed by green, blue, and purple. Like Wordle, you can share the results with your friends on social media. Mashable Top Stories Stay connected with the hottest stories of the day and the latest entertainment news. Sign up for Mashable's Top Stories newsletter By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up! Here's a hint for today's Connections Sports Edition categoriesWant a hint about the categories without being told the categories? Then give these a try:Yellow: ScorelessGreen: Midwest college townsBlue: GolfPurple: Major names behind the plate Featured Video For You Connections: How to play and how to win Here are today's Connections Sports Edition categoriesNeed a little extra help? Today's connections fall into the following categories:Yellow: Slang for ZeroGreen: Big Ten CitiesBlue: Sites of This Year's Men's Golf MajorsPurple: MLB CatchersLooking for Wordle today? Here's the answer to today's Wordle.Ready for the answers? This is your last chance to turn back and solve today's puzzle before we reveal the solutions.Drumroll, please!The solution to today's Connections Sports Edition #266 is...What is the answer to Connections Sports Edition todaySlang for Zero - BAGEL, DONUT, GOOSE EGG, NILBig Ten Cities - COLLEGE PARK, COLUMBUS, EAST LANSING, MADISONSites of This Year's Men's Golf Majors - AUGUSTA, OAKMONT, QUAIL HOLLOW, ROYAL PORTRUSHMLB Catchers - PEREZ, RALEIGH, REALMUTO, RUTSCHMANDon't feel down if you didn't manage to guess it this time. There will be new Connections for you to stretch your brain with tomorrow, and we'll be back again to guide you with more helpful hints.Are you also playing NYT Strands? See hints and answers for today's Strands.If you're looking for more puzzles, Mashable's got games now! Check out our games hub for Mahjong, Sudoku, free crossword, and more.Not the day you're after? Here's the solution to yesterday's Connections. Topics Connections
    Like
    Love
    Wow
    Sad
    Angry
    527
    2 Kommentare 0 Anteile
  • Tell us your favourite video game of 2025 so far

    The Guardian’s writers have compiled their favourite new games of the year so far – and we’d like to hear about yours, too.Have you come across a new release that you can’t stop playing? Or one you’d recommend? Tell us your nomination and why you like it below.Share your favouriteYou can tell us your favourite game of the year so far using this form.Please share your story if you are 18 or over, anonymously if you wish. For more information please see our terms of service and privacy policy.Your responses, which can be anonymous, are secure as the form is encrypted and only the Guardian has access to your contributions. We will only use the data you provide us for the purpose of the feature and we will delete any personal data when we no longer require it for this purpose. For true anonymity please use our SecureDrop service instead.Name Where do you live? Tell us a bit about yourselfOptionalTell us about your favourite game of 2025 so far and why it's your favourite Please include as much detail as possible. If you are happy to, please upload a photo of yourself here OptionalPlease note, the maximum file size is 5.7 MB.Choose fileCan we publish your response? Yes, entirelyYes, but contact me firstYes, but please keep me anonymousNo, this is information onlyPhone number OptionalYour contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.Email address Your contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.You can add more information here OptionalIf you include other people's names please ask them first.Would you be interested in speaking to our audio and/or video teams? Audio onlyVideo onlyAudio and videoNo, I'm not interestedBy submitting your response, you are agreeing to share your details with us for this feature.If you’re having trouble using the form, click here. Read terms of service here and privacy policy here.
    #tell #your #favourite #video #game
    Tell us your favourite video game of 2025 so far
    The Guardian’s writers have compiled their favourite new games of the year so far – and we’d like to hear about yours, too.Have you come across a new release that you can’t stop playing? Or one you’d recommend? Tell us your nomination and why you like it below.Share your favouriteYou can tell us your favourite game of the year so far using this form.Please share your story if you are 18 or over, anonymously if you wish. For more information please see our terms of service and privacy policy.Your responses, which can be anonymous, are secure as the form is encrypted and only the Guardian has access to your contributions. We will only use the data you provide us for the purpose of the feature and we will delete any personal data when we no longer require it for this purpose. For true anonymity please use our SecureDrop service instead.Name Where do you live? Tell us a bit about yourselfOptionalTell us about your favourite game of 2025 so far and why it's your favourite Please include as much detail as possible. If you are happy to, please upload a photo of yourself here OptionalPlease note, the maximum file size is 5.7 MB.Choose fileCan we publish your response? Yes, entirelyYes, but contact me firstYes, but please keep me anonymousNo, this is information onlyPhone number OptionalYour contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.Email address Your contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.You can add more information here OptionalIf you include other people's names please ask them first.Would you be interested in speaking to our audio and/or video teams? Audio onlyVideo onlyAudio and videoNo, I'm not interestedBy submitting your response, you are agreeing to share your details with us for this feature.If you’re having trouble using the form, click here. Read terms of service here and privacy policy here. #tell #your #favourite #video #game
    WWW.THEGUARDIAN.COM
    Tell us your favourite video game of 2025 so far
    The Guardian’s writers have compiled their favourite new games of the year so far – and we’d like to hear about yours, too.Have you come across a new release that you can’t stop playing? Or one you’d recommend? Tell us your nomination and why you like it below.Share your favouriteYou can tell us your favourite game of the year so far using this form.Please share your story if you are 18 or over, anonymously if you wish. For more information please see our terms of service and privacy policy.Your responses, which can be anonymous, are secure as the form is encrypted and only the Guardian has access to your contributions. We will only use the data you provide us for the purpose of the feature and we will delete any personal data when we no longer require it for this purpose. For true anonymity please use our SecureDrop service instead.Name Where do you live? Tell us a bit about yourself (e.g. age and what you do for a living) OptionalTell us about your favourite game of 2025 so far and why it's your favourite Please include as much detail as possible. If you are happy to, please upload a photo of yourself here OptionalPlease note, the maximum file size is 5.7 MB.Choose fileCan we publish your response? Yes, entirelyYes, but contact me firstYes, but please keep me anonymousNo, this is information onlyPhone number OptionalYour contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.Email address Your contact details are helpful so we can contact you for more information. They will only be seen by the Guardian.You can add more information here OptionalIf you include other people's names please ask them first.Would you be interested in speaking to our audio and/or video teams? Audio onlyVideo onlyAudio and videoNo, I'm not interestedBy submitting your response, you are agreeing to share your details with us for this feature.If you’re having trouble using the form, click here. Read terms of service here and privacy policy here.
    Like
    Love
    Wow
    Sad
    Angry
    412
    0 Kommentare 0 Anteile
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Kommentare 0 Anteile
  • MillerKnoll opens new design archive showcasing over one million objects from the company’s history

    In a 12,000-square-foot warehouse in Zeeland, Michigan, hundreds of chairs, sofas, and loveseats rest on open storage racks. Their bold colors and elegant forms stand in striking contrast to the industrial setting. A plush recliner, seemingly made for sinking into, sits beside a mesh desk chair like those found in generic office cubicles. Nearby, a rare prototype of the Knoll Womb® Chair, gifted by Eero Saarinen to his mother, blooms open like a flower–inviting someone to sit. There’s also mahogany furniture designed by Gilbert Rohde for Herman Miller, originally unveiled at the 1933 World’s Fair; early office pieces by Florence Knoll; and a sculptural paper lamp by Isamu Noguchi. This is the newly unveiled MillerKnoll Archive, a space that honors the distinct legacies of its formerly rival brands. In collaboration with New York–based design firm Standard Issue, MillerKnoll has created a permanent display of its most iconic designs at the company’s Michigan Design Yard headquarters.

    In the early 1920s, Dutch-born businessman Herman Miller became the majority stakeholder in a Zeeland, Michigan, company where his son-in-law served as president. Following the acquisition, Star Furniture Co. was renamed the Herman Miller Furniture Company. Meanwhile, across the Atlantic in Stuttgart, Germany, Walter Knoll joined his family’s furniture business and formed close ties with modernist pioneers Ludwig Mies van der Rohe and Walter Gropius, immersing himself in the Bauhaus movement as Germany edged toward war. 
    Just before the outbreak of World War II, Walter Knoll relocated to the United States and established his own furniture company in New York City. Around the same time, Michigan native Florence Schust was studying at the Cranbrook Academy of Art under Eliel Saarinen. There, she met Eero Saarinen and Charles Eames. Schust, who later married Walter Knoll, and Saarinen would go on to become key designers for the company, while Eames would play a similarly pivotal role at Herman Miller—setting both firms on parallel paths in the world of modern design.
    The facility was designed in collaboration with New York-based design firm Standard Issue. The archive, located in MillerKnoll’s Design Yard Headquarters, is 12,000 square feet and holds over one million objects.Formerly seen as competitors, Herman Miller acquired Knoll four years ago in a billion merger that formed MillerKnoll. The deal united two of the most influential names in American furniture, merging their storied design legacies and the iconic pieces that helped define modern design. Now, MillerKnoll is honoring the distinct histories of each brand through this new archive. The archive is a permanent home for the brands’ archival collections and also exhibits the evolution of modern design. The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room. 

    The facility’s first exhibition, Manufacturing Modern, explores the intertwined histories of Knoll and Herman Miller. It showcases designs from the individuals who helped shape each company. The open storage area displays over 300 pieces of modern furniture, featuring both original works from Knoll and Herman Miller as well as contemporary designs. In addition to viewing the furniture pieces, visitors can kick back in the reading room, which offers access to a collection of archival materials, including correspondence, photography, drawings, and textiles.
    The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room and will be open for tours in partnership with the Cranbrook Art Academy this summer.“The debut of the MillerKnoll Archives invites our communities to experience design history – and imagine its future– in one dynamic space,” said MillerKnoll’s chief creative and product officer Ben Watson. “The ability to not only understand how iconic designs came to be, but how design solutions evolved over time, is a never-ending source of inspiration.”
    Exclusive tours of the archive will be available in July and August in partnership with the Cranbrook Art Museum and in October in partnership with Docomomo.
    #millerknoll #opens #new #design #archive
    MillerKnoll opens new design archive showcasing over one million objects from the company’s history
    In a 12,000-square-foot warehouse in Zeeland, Michigan, hundreds of chairs, sofas, and loveseats rest on open storage racks. Their bold colors and elegant forms stand in striking contrast to the industrial setting. A plush recliner, seemingly made for sinking into, sits beside a mesh desk chair like those found in generic office cubicles. Nearby, a rare prototype of the Knoll Womb® Chair, gifted by Eero Saarinen to his mother, blooms open like a flower–inviting someone to sit. There’s also mahogany furniture designed by Gilbert Rohde for Herman Miller, originally unveiled at the 1933 World’s Fair; early office pieces by Florence Knoll; and a sculptural paper lamp by Isamu Noguchi. This is the newly unveiled MillerKnoll Archive, a space that honors the distinct legacies of its formerly rival brands. In collaboration with New York–based design firm Standard Issue, MillerKnoll has created a permanent display of its most iconic designs at the company’s Michigan Design Yard headquarters. In the early 1920s, Dutch-born businessman Herman Miller became the majority stakeholder in a Zeeland, Michigan, company where his son-in-law served as president. Following the acquisition, Star Furniture Co. was renamed the Herman Miller Furniture Company. Meanwhile, across the Atlantic in Stuttgart, Germany, Walter Knoll joined his family’s furniture business and formed close ties with modernist pioneers Ludwig Mies van der Rohe and Walter Gropius, immersing himself in the Bauhaus movement as Germany edged toward war.  Just before the outbreak of World War II, Walter Knoll relocated to the United States and established his own furniture company in New York City. Around the same time, Michigan native Florence Schust was studying at the Cranbrook Academy of Art under Eliel Saarinen. There, she met Eero Saarinen and Charles Eames. Schust, who later married Walter Knoll, and Saarinen would go on to become key designers for the company, while Eames would play a similarly pivotal role at Herman Miller—setting both firms on parallel paths in the world of modern design. The facility was designed in collaboration with New York-based design firm Standard Issue. The archive, located in MillerKnoll’s Design Yard Headquarters, is 12,000 square feet and holds over one million objects.Formerly seen as competitors, Herman Miller acquired Knoll four years ago in a billion merger that formed MillerKnoll. The deal united two of the most influential names in American furniture, merging their storied design legacies and the iconic pieces that helped define modern design. Now, MillerKnoll is honoring the distinct histories of each brand through this new archive. The archive is a permanent home for the brands’ archival collections and also exhibits the evolution of modern design. The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room.  The facility’s first exhibition, Manufacturing Modern, explores the intertwined histories of Knoll and Herman Miller. It showcases designs from the individuals who helped shape each company. The open storage area displays over 300 pieces of modern furniture, featuring both original works from Knoll and Herman Miller as well as contemporary designs. In addition to viewing the furniture pieces, visitors can kick back in the reading room, which offers access to a collection of archival materials, including correspondence, photography, drawings, and textiles. The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room and will be open for tours in partnership with the Cranbrook Art Academy this summer.“The debut of the MillerKnoll Archives invites our communities to experience design history – and imagine its future– in one dynamic space,” said MillerKnoll’s chief creative and product officer Ben Watson. “The ability to not only understand how iconic designs came to be, but how design solutions evolved over time, is a never-ending source of inspiration.” Exclusive tours of the archive will be available in July and August in partnership with the Cranbrook Art Museum and in October in partnership with Docomomo. #millerknoll #opens #new #design #archive
    WWW.ARCHPAPER.COM
    MillerKnoll opens new design archive showcasing over one million objects from the company’s history
    In a 12,000-square-foot warehouse in Zeeland, Michigan, hundreds of chairs, sofas, and loveseats rest on open storage racks. Their bold colors and elegant forms stand in striking contrast to the industrial setting. A plush recliner, seemingly made for sinking into, sits beside a mesh desk chair like those found in generic office cubicles. Nearby, a rare prototype of the Knoll Womb® Chair, gifted by Eero Saarinen to his mother, blooms open like a flower–inviting someone to sit. There’s also mahogany furniture designed by Gilbert Rohde for Herman Miller, originally unveiled at the 1933 World’s Fair; early office pieces by Florence Knoll; and a sculptural paper lamp by Isamu Noguchi. This is the newly unveiled MillerKnoll Archive, a space that honors the distinct legacies of its formerly rival brands. In collaboration with New York–based design firm Standard Issue, MillerKnoll has created a permanent display of its most iconic designs at the company’s Michigan Design Yard headquarters. In the early 1920s, Dutch-born businessman Herman Miller became the majority stakeholder in a Zeeland, Michigan, company where his son-in-law served as president. Following the acquisition, Star Furniture Co. was renamed the Herman Miller Furniture Company. Meanwhile, across the Atlantic in Stuttgart, Germany, Walter Knoll joined his family’s furniture business and formed close ties with modernist pioneers Ludwig Mies van der Rohe and Walter Gropius, immersing himself in the Bauhaus movement as Germany edged toward war.  Just before the outbreak of World War II, Walter Knoll relocated to the United States and established his own furniture company in New York City. Around the same time, Michigan native Florence Schust was studying at the Cranbrook Academy of Art under Eliel Saarinen. There, she met Eero Saarinen and Charles Eames. Schust, who later married Walter Knoll, and Saarinen would go on to become key designers for the company, while Eames would play a similarly pivotal role at Herman Miller—setting both firms on parallel paths in the world of modern design. The facility was designed in collaboration with New York-based design firm Standard Issue. The archive, located in MillerKnoll’s Design Yard Headquarters, is 12,000 square feet and holds over one million objects. (Nicholas Calcott/Courtesy MillerKnoll) Formerly seen as competitors, Herman Miller acquired Knoll four years ago in a $1.8 billion merger that formed MillerKnoll. The deal united two of the most influential names in American furniture, merging their storied design legacies and the iconic pieces that helped define modern design. Now, MillerKnoll is honoring the distinct histories of each brand through this new archive. The archive is a permanent home for the brands’ archival collections and also exhibits the evolution of modern design. The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room.  The facility’s first exhibition, Manufacturing Modern, explores the intertwined histories of Knoll and Herman Miller. It showcases designs from the individuals who helped shape each company. The open storage area displays over 300 pieces of modern furniture, featuring both original works from Knoll and Herman Miller as well as contemporary designs. In addition to viewing the furniture pieces, visitors can kick back in the reading room, which offers access to a collection of archival materials, including correspondence, photography, drawings, and textiles. The facility is organized into three distinct areas: an exhibition space, open storage, and a reading room and will be open for tours in partnership with the Cranbrook Art Academy this summer. (Nicholas Calcott/Courtesy MillerKnoll) “The debut of the MillerKnoll Archives invites our communities to experience design history – and imagine its future– in one dynamic space,” said MillerKnoll’s chief creative and product officer Ben Watson. “The ability to not only understand how iconic designs came to be, but how design solutions evolved over time, is a never-ending source of inspiration.” Exclusive tours of the archive will be available in July and August in partnership with the Cranbrook Art Museum and in October in partnership with Docomomo.
    Like
    Love
    Wow
    Sad
    Angry
    490
    0 Kommentare 0 Anteile
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Kommentare 0 Anteile
  • The Best Hidden-Gem Etsy Shops for Fans of Farmhouse Style

    Becky Luigart-Stayner for Country LivingCountry Living editors select each product featured. If you buy from a link, we may earn a commission. Why Trust Us?Like a well-made quilt, a classic farmhouse aesthetic comes together gradually—a little bit of this, a touch of that. Each addition is purposeful and personal—and isn’t that what home is all about, really? If this type of slowed-down style speaks to you, you're probably already well aware that Etsy is a treasure trove of finds both new and old to fit your timeless farmhouse aesthetic. But with more than eight million active sellers on its marketplace, sometimes the possibilities—vintage feed sacks! primitive pie safes! galvanized grain scoops!—can quickly go from enticing to overwhelming.To better guide your search for the finest farmhouse furnishings, we’ve gathered a go-to list of editor-and designer-beloved Etsy shops which, time and again, turn out hardworking, homespun pieces of heirloom quality. From beautiful antique bureaus to hand-block-printed table linens, the character-rich wares from these sellers will help you design the farmhouse of your dreams, piece by precious piece. Related Stories For Antique AmericanaAcorn and Alice Every good old-fashioned farmhouse could use some traditional Americana to set the tone, and this Pennsylvania salvage shop offers rustic touches loaded with authentic antique allure. Aged wooden wares abound, as well as a grab bag of cotton and burlap feed sacks, perfect for framing as sets or crafting into footstool covers or throw pillows. For French Country TextilesForest and LinenThere’s nothing quite like breezy natural fabrics to make you want to throw open all the windows and let that country air in while the pie cools. Unfussy and lightweight, the hand-crafted curtains, bedding, and table linens from these Lithuanian textile experts have a classic understated quality that would be right at home in the coziest guest room or most bustling kitchen. Warm, welcoming hues range from marigold yellow to cornflower blue, but soft gingham checkers and timeless French ticking feel especially farm-fresh. Our current favorite? These cherry-striped country cafe curtains. Becky Luigart-Stayner for Country LivingVintage red torchons feel right at home in a farmhouse kitchenFor Rustic RugsOld New HouseWhether or not you’re lucky enough to have gorgeous wide-plank floors, an antique area rug or runner can work wonders for giving a room instant character and warmth. This fifth-generation family-run retailer specializes in importing heirloom hand-knotted carpets dating back to the 1800s, with a focus on traditional designs from the masters in Turkey, India, Persia, and more. Their vast variety of sizes and styles offers something for every aesthetic, with one-of-a-kind patterns ranging from distressed neutrals to chain-stitched florals to ornate arabesques. For Pillows and ProvisionsHabitation BohemeIn true farmhouse fashion, this Indiana shop has curated an enticing blend of handcrafted and vintage homewares that work effortlessly well together. A line of cozy hand-stitched linen pillow coverssits prettily alongside a mix of found objects, from patinated brass candlesticks and etched cloisonné vases to sturdy stoneware crockery and woven wicker baskets. For Elegant Everyday DishwareConvivial ProductionSimple, yet undeniably stunning, the handcrafted dinnerware from this Missouri-based ceramist is designed with durability in mind. Produced in a single, time-tested shade of ivory white glaze, these practical stoneware cups, bowls, and plates make the perfect place settings for lively farm-to-table feasts with friends and family. Beautifully balancing softness and heft, each dish is meant to feel comfortable when being held and passed, but also to look attractive when stacked upon open shelving. For English Country Antiques1100 West Co.This Illinois antiques shop is stocked with all manner of versatile vintage vessels culled from the English countryside, from massive stoneware crocks to charming little escargot pots. Their collection of neutral containers can be adapted for nearly any provincial purpose, but we especially love their assortment of old advertising—from toothpaste pots to marmalade jars and ginger beer bottles galore—for a nice little nod to the quintessential country practice of repurposing what you’ve got. Brian Woodcock/Country LivingPretty English ironstone will always have our heart.For a Cozy GlowOlde Brick LightingConstructed by hand from cord to shade, the vintage-inspired lighting produced by this Pennsylvania retailer is a tribute to the iconic quality and character of old American fixtures. Nostalgic design elements include hand-blown glassand finishes ranging from matte black to brushed nickel and antique brass. To create an authentic farmhouse ambiance, check out their gooseneck sconces, enameled red and blue barn lights, and milky white striped schoolhouse flush mounts. For Enduring ArtifactsThrough the PortholeThe weathered, artisan-made wares curated by this California husband-and-wife duo have been hand-selected from around the globe for their time-etched character. From gorgeous gray-black terracotta vases and rust-colored Turkish clay pots to patinated brass cow bells and rustic reclaimed elm stools, each item is a testament to the lasting beauty of classic materials, with storied sun-bleaching and scratches befitting the most beloved, lived-in rooms. For Winsome Wall ArtEugenia Ciotola ArtThrough graceful brushstrokes and textural swirls of paint, Maryland-based artist Eugenia Ciotola has captured the natural joy of a life that’s simple and sweet. Her pieces celebrate quiet scenes of bucolic beauty, from billowing bouquets of peonies to stoic red barns sitting in fields of wavy green. For a parlor gallery or gathering space, we gravitate toward her original oils on canvas—an impasto still life, perhaps, or a plainly frocked maiden carrying a bountiful bowl of lemons—while her stately farm animal portraitswould look lovely in a child’s nursery.For Time-Tested Storage SolutionsMaterials DivisionFunction is forefront for this farmhouse supplier operating out of New York, whose specialized selection of vintage provisions have lived out dutiful lives of purpose. Standouts include a curated offering of trusty antique tool boxes and sturdy steel-clad trunks whose rugged patina tells the story of many-a household project. Meanwhile, a hardworking mix of industrial wire and woven wood gathering baskets sits handsomely alongside heavy-duty galvanized garbage bins and antique fireplace andirons.For Pastoral PrimitivesComfort Work RoomFull of history and heritage, the old, hand-fabricated furnishings and primitive wooden tools in this unique Ukrainian antique shop are rural remnants of simpler times gone by. Quaint kitchen staples like chippy chiseled spoons, scoops, and cutting boards make an accessible entry point for the casual collector, while scuffed up dough troughs, butter churns, washboards, and barrels are highly desirable conversation pieces for any antique enthusiast who’s dedicated to authentic detail. Becky Luigart-Stayner for Country LivingAntique washboards make for on-theme wall art in a laundry roomFor Heirloom-Quality CoverletsBluegrass QuiltsNo layered farmhouse look would be complete without the homey, tactile touch of a hand-pieced quilt or two draped intentionally about the room. From harvest-hued sawtooth stars to playful patchwork pinwheels, each exquisite blanket from this Kentucky-based artisan is slow-crafted in traditional fashion from 100% cotton materials, and can even be custom stitched from scratch to match your personal color palette and decorative purpose. For a classic country aesthetic, try a log cabin, double diamond, or star patch pattern. For Hand-Crafted GiftsSelselaFeaturing a busy barnyard’s worth of plucky chickens, cuddly sheep, and happy little Holstein cows, this Illinois woodworker’s whimsical line of farm figurines and other giftable goodiesis chock-full of hand-carved charm. Crafted from 100% recycled birch and painted in loving detail, each creature has a deliberately rough-hewn look and feel worthy of any cozy and collected home. For Open-Concept CabinetryFolkhausA hallmark of many modern farmhouses, open-concept shelving has become a stylish way to show that the practical wares you use everyday are the same ones you’re proud to put on display. With their signature line of bracketed wall shelves, Shaker-style peg shelves, and raw steel kitchen rails, the team at Folkhaus has created a range of open storage solutions that beautifully balances elevated design and rustic utility. Rounding out their collection is a selection of open-shelved accent pieces like bookcases, benches, and console tables—each crafted from character-rich kiln-dried timber and finished in your choice of stain.Related StoryFor Antique Farmhouse FurnitureCottage Treasures LVThe foundation of a well-furnished farmhouse often begins with a single prized piece. Whether it’s a slant-front desk, a primitive jelly cabinet, or a punched-tin pie safe, this established New York-based dealer has a knack for sourcing vintage treasures with the personality and presence to anchor an entire space. Distressed cupboards and cabinets may be their bread and butterbut you’ll also find a robust roundup of weathered farm tables, Windsor chairs, and blanket chests—and currently, even a rare 1500s English bench. For Lively Table LinensMoontea StudioAs any devotee of slow decorating knows, sometimes it’s the little details that really bring a look home. For a spot of cheer along with your afternoon tea, we love the hand-stamped table linens from this Washington-based printmaker, which put a peppy, modern spin on farm-fresh produce. Patterned with lush illustrations of bright red tomatoes, crisp green apples, and golden sunflowers—then neatly finished with a color-coordinated hand-stitched trim—each tea towel, placemat, and napkin pays homage to the hours we spend doting over our gardens. For Traditional TransferwarePrior TimeThere’s lots to love about this Massachusetts antiques shop, which admittedly skews slightly cottagecorebut the standout, for us, is the seller’s superior selection of dinner and serving ware. In addition to a lovely lot of mottled white ironstone platters and pitchers, you’ll find a curated mix of Ridgeway and Wedgwood transferware dishes in not only classic cobalt blue, but beautiful browns, greens, and purples, too.Becky Luigart-Stayner for Country LivingPretty brown transferware could be yours with one quick "add to cart."For Folk Art for Your FloorsKinFolk ArtworkDesigned by a West Virginia watercolor and oils artist with a penchant for painting the past, these silky chenille floor mats feature an original cast of colonial characters and folksy scenes modeled after heirloom textiles from the 18th and 19th centuries. Expect lots of early American and patriotic motifs, including old-fashioned flags, Pennsylvania Dutch fraktur, equestrian vignettes, and colonial house samplers—each made to mimic a vintage hooked rug for that cozy, homespun feeling.For Historical ReproductionsSchooner Bay Co.Even in the most painstakingly appointed interior, buying antique originals isn’t always an option. And that’s where this trusted Pennsylvania-based retailer for historical reproductions comes in. Offering a colossal collection of framed art prints, decorative trays, and brass objects, these connoisseurs of the classics have decor for every old-timey aesthetic, whether it’s fox hunt prints for your cabin, Dutch landscapes for your cottage, or primitive animal portraits for your farmstead.For General Store StaplesFarmhouse EclecticsHand-plucked from New England antique shops, estate sales, and auctions, the salvaged sundries from this Massachusetts-based supplierare the type you might spy in an old country store—wooden crates emblazoned with the names of local dairies, antique apple baskets, seed displays, signs, and scales. Whether you’re setting up your farmstand or styling your entryway, you’ll have plenty of storage options and authentic accents to pick from here. Becky Luigart-Stayner for Country LivingSo many food scales, so little time.Related StoriesJackie BuddieJackie Buddie is a freelance writer with more than a decade of editorial experience covering lifestyle topics including home decor how-tos, fashion trend deep dives, seasonal gift guides, and in-depth profiles of artists and creatives around the globe. She holds a degree in journalism from the University of North Carolina at Chapel Hill and received her M.F.A. in creative writing from Boston University. Jackie is, among other things, a collector of curiosities, Catskills land caretaker, dabbling DIYer, day hiker, and mom. She lives in the hills of Bovina, New York, with her family and her sweet-as-pie rescue dog.
    #best #hiddengem #etsy #shops #fans
    The Best Hidden-Gem Etsy Shops for Fans of Farmhouse Style
    Becky Luigart-Stayner for Country LivingCountry Living editors select each product featured. If you buy from a link, we may earn a commission. Why Trust Us?Like a well-made quilt, a classic farmhouse aesthetic comes together gradually—a little bit of this, a touch of that. Each addition is purposeful and personal—and isn’t that what home is all about, really? If this type of slowed-down style speaks to you, you're probably already well aware that Etsy is a treasure trove of finds both new and old to fit your timeless farmhouse aesthetic. But with more than eight million active sellers on its marketplace, sometimes the possibilities—vintage feed sacks! primitive pie safes! galvanized grain scoops!—can quickly go from enticing to overwhelming.To better guide your search for the finest farmhouse furnishings, we’ve gathered a go-to list of editor-and designer-beloved Etsy shops which, time and again, turn out hardworking, homespun pieces of heirloom quality. From beautiful antique bureaus to hand-block-printed table linens, the character-rich wares from these sellers will help you design the farmhouse of your dreams, piece by precious piece. Related Stories For Antique AmericanaAcorn and Alice Every good old-fashioned farmhouse could use some traditional Americana to set the tone, and this Pennsylvania salvage shop offers rustic touches loaded with authentic antique allure. Aged wooden wares abound, as well as a grab bag of cotton and burlap feed sacks, perfect for framing as sets or crafting into footstool covers or throw pillows. For French Country TextilesForest and LinenThere’s nothing quite like breezy natural fabrics to make you want to throw open all the windows and let that country air in while the pie cools. Unfussy and lightweight, the hand-crafted curtains, bedding, and table linens from these Lithuanian textile experts have a classic understated quality that would be right at home in the coziest guest room or most bustling kitchen. Warm, welcoming hues range from marigold yellow to cornflower blue, but soft gingham checkers and timeless French ticking feel especially farm-fresh. Our current favorite? These cherry-striped country cafe curtains. Becky Luigart-Stayner for Country LivingVintage red torchons feel right at home in a farmhouse kitchenFor Rustic RugsOld New HouseWhether or not you’re lucky enough to have gorgeous wide-plank floors, an antique area rug or runner can work wonders for giving a room instant character and warmth. This fifth-generation family-run retailer specializes in importing heirloom hand-knotted carpets dating back to the 1800s, with a focus on traditional designs from the masters in Turkey, India, Persia, and more. Their vast variety of sizes and styles offers something for every aesthetic, with one-of-a-kind patterns ranging from distressed neutrals to chain-stitched florals to ornate arabesques. For Pillows and ProvisionsHabitation BohemeIn true farmhouse fashion, this Indiana shop has curated an enticing blend of handcrafted and vintage homewares that work effortlessly well together. A line of cozy hand-stitched linen pillow coverssits prettily alongside a mix of found objects, from patinated brass candlesticks and etched cloisonné vases to sturdy stoneware crockery and woven wicker baskets. For Elegant Everyday DishwareConvivial ProductionSimple, yet undeniably stunning, the handcrafted dinnerware from this Missouri-based ceramist is designed with durability in mind. Produced in a single, time-tested shade of ivory white glaze, these practical stoneware cups, bowls, and plates make the perfect place settings for lively farm-to-table feasts with friends and family. Beautifully balancing softness and heft, each dish is meant to feel comfortable when being held and passed, but also to look attractive when stacked upon open shelving. For English Country Antiques1100 West Co.This Illinois antiques shop is stocked with all manner of versatile vintage vessels culled from the English countryside, from massive stoneware crocks to charming little escargot pots. Their collection of neutral containers can be adapted for nearly any provincial purpose, but we especially love their assortment of old advertising—from toothpaste pots to marmalade jars and ginger beer bottles galore—for a nice little nod to the quintessential country practice of repurposing what you’ve got. Brian Woodcock/Country LivingPretty English ironstone will always have our heart.For a Cozy GlowOlde Brick LightingConstructed by hand from cord to shade, the vintage-inspired lighting produced by this Pennsylvania retailer is a tribute to the iconic quality and character of old American fixtures. Nostalgic design elements include hand-blown glassand finishes ranging from matte black to brushed nickel and antique brass. To create an authentic farmhouse ambiance, check out their gooseneck sconces, enameled red and blue barn lights, and milky white striped schoolhouse flush mounts. For Enduring ArtifactsThrough the PortholeThe weathered, artisan-made wares curated by this California husband-and-wife duo have been hand-selected from around the globe for their time-etched character. From gorgeous gray-black terracotta vases and rust-colored Turkish clay pots to patinated brass cow bells and rustic reclaimed elm stools, each item is a testament to the lasting beauty of classic materials, with storied sun-bleaching and scratches befitting the most beloved, lived-in rooms. For Winsome Wall ArtEugenia Ciotola ArtThrough graceful brushstrokes and textural swirls of paint, Maryland-based artist Eugenia Ciotola has captured the natural joy of a life that’s simple and sweet. Her pieces celebrate quiet scenes of bucolic beauty, from billowing bouquets of peonies to stoic red barns sitting in fields of wavy green. For a parlor gallery or gathering space, we gravitate toward her original oils on canvas—an impasto still life, perhaps, or a plainly frocked maiden carrying a bountiful bowl of lemons—while her stately farm animal portraitswould look lovely in a child’s nursery.For Time-Tested Storage SolutionsMaterials DivisionFunction is forefront for this farmhouse supplier operating out of New York, whose specialized selection of vintage provisions have lived out dutiful lives of purpose. Standouts include a curated offering of trusty antique tool boxes and sturdy steel-clad trunks whose rugged patina tells the story of many-a household project. Meanwhile, a hardworking mix of industrial wire and woven wood gathering baskets sits handsomely alongside heavy-duty galvanized garbage bins and antique fireplace andirons.For Pastoral PrimitivesComfort Work RoomFull of history and heritage, the old, hand-fabricated furnishings and primitive wooden tools in this unique Ukrainian antique shop are rural remnants of simpler times gone by. Quaint kitchen staples like chippy chiseled spoons, scoops, and cutting boards make an accessible entry point for the casual collector, while scuffed up dough troughs, butter churns, washboards, and barrels are highly desirable conversation pieces for any antique enthusiast who’s dedicated to authentic detail. Becky Luigart-Stayner for Country LivingAntique washboards make for on-theme wall art in a laundry roomFor Heirloom-Quality CoverletsBluegrass QuiltsNo layered farmhouse look would be complete without the homey, tactile touch of a hand-pieced quilt or two draped intentionally about the room. From harvest-hued sawtooth stars to playful patchwork pinwheels, each exquisite blanket from this Kentucky-based artisan is slow-crafted in traditional fashion from 100% cotton materials, and can even be custom stitched from scratch to match your personal color palette and decorative purpose. For a classic country aesthetic, try a log cabin, double diamond, or star patch pattern. For Hand-Crafted GiftsSelselaFeaturing a busy barnyard’s worth of plucky chickens, cuddly sheep, and happy little Holstein cows, this Illinois woodworker’s whimsical line of farm figurines and other giftable goodiesis chock-full of hand-carved charm. Crafted from 100% recycled birch and painted in loving detail, each creature has a deliberately rough-hewn look and feel worthy of any cozy and collected home. For Open-Concept CabinetryFolkhausA hallmark of many modern farmhouses, open-concept shelving has become a stylish way to show that the practical wares you use everyday are the same ones you’re proud to put on display. With their signature line of bracketed wall shelves, Shaker-style peg shelves, and raw steel kitchen rails, the team at Folkhaus has created a range of open storage solutions that beautifully balances elevated design and rustic utility. Rounding out their collection is a selection of open-shelved accent pieces like bookcases, benches, and console tables—each crafted from character-rich kiln-dried timber and finished in your choice of stain.Related StoryFor Antique Farmhouse FurnitureCottage Treasures LVThe foundation of a well-furnished farmhouse often begins with a single prized piece. Whether it’s a slant-front desk, a primitive jelly cabinet, or a punched-tin pie safe, this established New York-based dealer has a knack for sourcing vintage treasures with the personality and presence to anchor an entire space. Distressed cupboards and cabinets may be their bread and butterbut you’ll also find a robust roundup of weathered farm tables, Windsor chairs, and blanket chests—and currently, even a rare 1500s English bench. For Lively Table LinensMoontea StudioAs any devotee of slow decorating knows, sometimes it’s the little details that really bring a look home. For a spot of cheer along with your afternoon tea, we love the hand-stamped table linens from this Washington-based printmaker, which put a peppy, modern spin on farm-fresh produce. Patterned with lush illustrations of bright red tomatoes, crisp green apples, and golden sunflowers—then neatly finished with a color-coordinated hand-stitched trim—each tea towel, placemat, and napkin pays homage to the hours we spend doting over our gardens. For Traditional TransferwarePrior TimeThere’s lots to love about this Massachusetts antiques shop, which admittedly skews slightly cottagecorebut the standout, for us, is the seller’s superior selection of dinner and serving ware. In addition to a lovely lot of mottled white ironstone platters and pitchers, you’ll find a curated mix of Ridgeway and Wedgwood transferware dishes in not only classic cobalt blue, but beautiful browns, greens, and purples, too.Becky Luigart-Stayner for Country LivingPretty brown transferware could be yours with one quick "add to cart."For Folk Art for Your FloorsKinFolk ArtworkDesigned by a West Virginia watercolor and oils artist with a penchant for painting the past, these silky chenille floor mats feature an original cast of colonial characters and folksy scenes modeled after heirloom textiles from the 18th and 19th centuries. Expect lots of early American and patriotic motifs, including old-fashioned flags, Pennsylvania Dutch fraktur, equestrian vignettes, and colonial house samplers—each made to mimic a vintage hooked rug for that cozy, homespun feeling.For Historical ReproductionsSchooner Bay Co.Even in the most painstakingly appointed interior, buying antique originals isn’t always an option. And that’s where this trusted Pennsylvania-based retailer for historical reproductions comes in. Offering a colossal collection of framed art prints, decorative trays, and brass objects, these connoisseurs of the classics have decor for every old-timey aesthetic, whether it’s fox hunt prints for your cabin, Dutch landscapes for your cottage, or primitive animal portraits for your farmstead.For General Store StaplesFarmhouse EclecticsHand-plucked from New England antique shops, estate sales, and auctions, the salvaged sundries from this Massachusetts-based supplierare the type you might spy in an old country store—wooden crates emblazoned with the names of local dairies, antique apple baskets, seed displays, signs, and scales. Whether you’re setting up your farmstand or styling your entryway, you’ll have plenty of storage options and authentic accents to pick from here. Becky Luigart-Stayner for Country LivingSo many food scales, so little time.Related StoriesJackie BuddieJackie Buddie is a freelance writer with more than a decade of editorial experience covering lifestyle topics including home decor how-tos, fashion trend deep dives, seasonal gift guides, and in-depth profiles of artists and creatives around the globe. She holds a degree in journalism from the University of North Carolina at Chapel Hill and received her M.F.A. in creative writing from Boston University. Jackie is, among other things, a collector of curiosities, Catskills land caretaker, dabbling DIYer, day hiker, and mom. She lives in the hills of Bovina, New York, with her family and her sweet-as-pie rescue dog. #best #hiddengem #etsy #shops #fans
    WWW.COUNTRYLIVING.COM
    The Best Hidden-Gem Etsy Shops for Fans of Farmhouse Style
    Becky Luigart-Stayner for Country LivingCountry Living editors select each product featured. If you buy from a link, we may earn a commission. Why Trust Us?Like a well-made quilt, a classic farmhouse aesthetic comes together gradually—a little bit of this, a touch of that. Each addition is purposeful and personal—and isn’t that what home is all about, really? If this type of slowed-down style speaks to you, you're probably already well aware that Etsy is a treasure trove of finds both new and old to fit your timeless farmhouse aesthetic. But with more than eight million active sellers on its marketplace, sometimes the possibilities—vintage feed sacks! primitive pie safes! galvanized grain scoops!—can quickly go from enticing to overwhelming.To better guide your search for the finest farmhouse furnishings, we’ve gathered a go-to list of editor-and designer-beloved Etsy shops which, time and again, turn out hardworking, homespun pieces of heirloom quality. From beautiful antique bureaus to hand-block-printed table linens, the character-rich wares from these sellers will help you design the farmhouse of your dreams, piece by precious piece. Related Stories For Antique AmericanaAcorn and Alice Every good old-fashioned farmhouse could use some traditional Americana to set the tone, and this Pennsylvania salvage shop offers rustic touches loaded with authentic antique allure. Aged wooden wares abound (think vintage milk crates, orchard fruit baskets, and berry boxes), as well as a grab bag of cotton and burlap feed sacks, perfect for framing as sets or crafting into footstool covers or throw pillows. For French Country TextilesForest and LinenThere’s nothing quite like breezy natural fabrics to make you want to throw open all the windows and let that country air in while the pie cools. Unfussy and lightweight, the hand-crafted curtains, bedding, and table linens from these Lithuanian textile experts have a classic understated quality that would be right at home in the coziest guest room or most bustling kitchen. Warm, welcoming hues range from marigold yellow to cornflower blue, but soft gingham checkers and timeless French ticking feel especially farm-fresh. Our current favorite? These cherry-striped country cafe curtains. Becky Luigart-Stayner for Country LivingVintage red torchons feel right at home in a farmhouse kitchenFor Rustic RugsOld New HouseWhether or not you’re lucky enough to have gorgeous wide-plank floors, an antique area rug or runner can work wonders for giving a room instant character and warmth. This fifth-generation family-run retailer specializes in importing heirloom hand-knotted carpets dating back to the 1800s, with a focus on traditional designs from the masters in Turkey, India, Persia, and more. Their vast variety of sizes and styles offers something for every aesthetic, with one-of-a-kind patterns ranging from distressed neutrals to chain-stitched florals to ornate arabesques. For Pillows and ProvisionsHabitation BohemeIn true farmhouse fashion, this Indiana shop has curated an enticing blend of handcrafted and vintage homewares that work effortlessly well together. A line of cozy hand-stitched linen pillow covers (patterned with everything from block-printed blossoms to provincial pinstripes) sits prettily alongside a mix of found objects, from patinated brass candlesticks and etched cloisonné vases to sturdy stoneware crockery and woven wicker baskets. For Elegant Everyday DishwareConvivial ProductionSimple, yet undeniably stunning, the handcrafted dinnerware from this Missouri-based ceramist is designed with durability in mind. Produced in a single, time-tested shade of ivory white glaze, these practical stoneware cups, bowls, and plates make the perfect place settings for lively farm-to-table feasts with friends and family. Beautifully balancing softness and heft, each dish is meant to feel comfortable when being held and passed, but also to look attractive when stacked upon open shelving. For English Country Antiques1100 West Co.This Illinois antiques shop is stocked with all manner of versatile vintage vessels culled from the English countryside, from massive stoneware crocks to charming little escargot pots. Their collection of neutral containers can be adapted for nearly any provincial purpose (envision white ironstone pitchers piled high with fresh-picked hyacinths, or glass canning jars holding your harvest grains), but we especially love their assortment of old advertising—from toothpaste pots to marmalade jars and ginger beer bottles galore—for a nice little nod to the quintessential country practice of repurposing what you’ve got. Brian Woodcock/Country LivingPretty English ironstone will always have our heart.For a Cozy GlowOlde Brick LightingConstructed by hand from cord to shade, the vintage-inspired lighting produced by this Pennsylvania retailer is a tribute to the iconic quality and character of old American fixtures. Nostalgic design elements include hand-blown glass (crafted using cast-iron molds from over 80 years ago) and finishes ranging from matte black to brushed nickel and antique brass. To create an authentic farmhouse ambiance, check out their gooseneck sconces, enameled red and blue barn lights, and milky white striped schoolhouse flush mounts. For Enduring ArtifactsThrough the PortholeThe weathered, artisan-made wares curated by this California husband-and-wife duo have been hand-selected from around the globe for their time-etched character. From gorgeous gray-black terracotta vases and rust-colored Turkish clay pots to patinated brass cow bells and rustic reclaimed elm stools, each item is a testament to the lasting beauty of classic materials, with storied sun-bleaching and scratches befitting the most beloved, lived-in rooms. For Winsome Wall ArtEugenia Ciotola ArtThrough graceful brushstrokes and textural swirls of paint, Maryland-based artist Eugenia Ciotola has captured the natural joy of a life that’s simple and sweet. Her pieces celebrate quiet scenes of bucolic beauty, from billowing bouquets of peonies to stoic red barns sitting in fields of wavy green. For a parlor gallery or gathering space, we gravitate toward her original oils on canvas—an impasto still life, perhaps, or a plainly frocked maiden carrying a bountiful bowl of lemons—while her stately farm animal portraits (regal roosters! ruff collared geese!) would look lovely in a child’s nursery.For Time-Tested Storage SolutionsMaterials DivisionFunction is forefront for this farmhouse supplier operating out of New York, whose specialized selection of vintage provisions have lived out dutiful lives of purpose. Standouts include a curated offering of trusty antique tool boxes and sturdy steel-clad trunks whose rugged patina tells the story of many-a household project. Meanwhile, a hardworking mix of industrial wire and woven wood gathering baskets sits handsomely alongside heavy-duty galvanized garbage bins and antique fireplace andirons.For Pastoral PrimitivesComfort Work RoomFull of history and heritage, the old, hand-fabricated furnishings and primitive wooden tools in this unique Ukrainian antique shop are rural remnants of simpler times gone by. Quaint kitchen staples like chippy chiseled spoons, scoops, and cutting boards make an accessible entry point for the casual collector, while scuffed up dough troughs, butter churns, washboards, and barrels are highly desirable conversation pieces for any antique enthusiast who’s dedicated to authentic detail. Becky Luigart-Stayner for Country LivingAntique washboards make for on-theme wall art in a laundry roomFor Heirloom-Quality CoverletsBluegrass QuiltsNo layered farmhouse look would be complete without the homey, tactile touch of a hand-pieced quilt or two draped intentionally about the room. From harvest-hued sawtooth stars to playful patchwork pinwheels, each exquisite blanket from this Kentucky-based artisan is slow-crafted in traditional fashion from 100% cotton materials, and can even be custom stitched from scratch to match your personal color palette and decorative purpose. For a classic country aesthetic, try a log cabin, double diamond, or star patch pattern. For Hand-Crafted GiftsSelselaFeaturing a busy barnyard’s worth of plucky chickens, cuddly sheep, and happy little Holstein cows, this Illinois woodworker’s whimsical line of farm figurines and other giftable goodies (think animal wine stoppers, keychains, fridge magnets, and cake toppers) is chock-full of hand-carved charm. Crafted from 100% recycled birch and painted in loving detail, each creature has a deliberately rough-hewn look and feel worthy of any cozy and collected home. For Open-Concept CabinetryFolkhausA hallmark of many modern farmhouses, open-concept shelving has become a stylish way to show that the practical wares you use everyday are the same ones you’re proud to put on display. With their signature line of bracketed wall shelves, Shaker-style peg shelves, and raw steel kitchen rails, the team at Folkhaus has created a range of open storage solutions that beautifully balances elevated design and rustic utility. Rounding out their collection is a selection of open-shelved accent pieces like bookcases, benches, and console tables—each crafted from character-rich kiln-dried timber and finished in your choice of stain.Related StoryFor Antique Farmhouse FurnitureCottage Treasures LVThe foundation of a well-furnished farmhouse often begins with a single prized piece. Whether it’s a slant-front desk, a primitive jelly cabinet, or a punched-tin pie safe, this established New York-based dealer has a knack for sourcing vintage treasures with the personality and presence to anchor an entire space. Distressed cupboards and cabinets may be their bread and butter (just look at this two-piece pine hutch!) but you’ll also find a robust roundup of weathered farm tables, Windsor chairs, and blanket chests—and currently, even a rare 1500s English bench. For Lively Table LinensMoontea StudioAs any devotee of slow decorating knows, sometimes it’s the little details that really bring a look home. For a spot of cheer along with your afternoon tea, we love the hand-stamped table linens from this Washington-based printmaker, which put a peppy, modern spin on farm-fresh produce. Patterned with lush illustrations of bright red tomatoes, crisp green apples, and golden sunflowers—then neatly finished with a color-coordinated hand-stitched trim—each tea towel, placemat, and napkin pays homage to the hours we spend doting over our gardens. For Traditional TransferwarePrior TimeThere’s lots to love about this Massachusetts antiques shop, which admittedly skews slightly cottagecore (the pink Baccarat perfume bottles! the hobnail milk glass vases! the huge primitive bread boards!) but the standout, for us, is the seller’s superior selection of dinner and serving ware. In addition to a lovely lot of mottled white ironstone platters and pitchers, you’ll find a curated mix of Ridgeway and Wedgwood transferware dishes in not only classic cobalt blue, but beautiful browns, greens, and purples, too.Becky Luigart-Stayner for Country LivingPretty brown transferware could be yours with one quick "add to cart."For Folk Art for Your FloorsKinFolk ArtworkDesigned by a West Virginia watercolor and oils artist with a penchant for painting the past, these silky chenille floor mats feature an original cast of colonial characters and folksy scenes modeled after heirloom textiles from the 18th and 19th centuries. Expect lots of early American and patriotic motifs, including old-fashioned flags, Pennsylvania Dutch fraktur, equestrian vignettes, and colonial house samplers—each made to mimic a vintage hooked rug for that cozy, homespun feeling. (We have to admit, the folk art-inspired cow and chicken is our favorite.)For Historical ReproductionsSchooner Bay Co.Even in the most painstakingly appointed interior, buying antique originals isn’t always an option (don’t ask how many times we’ve been outbid at an estate auction). And that’s where this trusted Pennsylvania-based retailer for historical reproductions comes in. Offering a colossal collection of framed art prints, decorative trays, and brass objects (think magnifying glasses, compasses, paperweights, and letter openers), these connoisseurs of the classics have decor for every old-timey aesthetic, whether it’s fox hunt prints for your cabin, Dutch landscapes for your cottage, or primitive animal portraits for your farmstead.For General Store StaplesFarmhouse EclecticsHand-plucked from New England antique shops, estate sales, and auctions, the salvaged sundries from this Massachusetts-based supplier (who grew up in an 1850s farmhouse himself) are the type you might spy in an old country store—wooden crates emblazoned with the names of local dairies, antique apple baskets, seed displays, signs, and scales. Whether you’re setting up your farmstand or styling your entryway, you’ll have plenty of storage options and authentic accents to pick from here. Becky Luigart-Stayner for Country LivingSo many food scales, so little time.Related StoriesJackie BuddieJackie Buddie is a freelance writer with more than a decade of editorial experience covering lifestyle topics including home decor how-tos, fashion trend deep dives, seasonal gift guides, and in-depth profiles of artists and creatives around the globe. She holds a degree in journalism from the University of North Carolina at Chapel Hill and received her M.F.A. in creative writing from Boston University. Jackie is, among other things, a collector of curiosities, Catskills land caretaker, dabbling DIYer, day hiker, and mom. She lives in the hills of Bovina, New York, with her family and her sweet-as-pie rescue dog.
    Like
    Love
    Wow
    Sad
    Angry
    603
    0 Kommentare 0 Anteile
Suchergebnis