Salta al contenuto principale



La Florida è pronta a eliminare tutti gli obblighi vaccinali, per la gioia dei no vax
https://www.wired.it/article/florida-fine-obblighi-vaccinali-reazioni-no-vax-robert-kennedy-jr/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Wired Italia @wired-italia-WiredItalia

reshared this



Seen on Peacemaker's credits. Does anyone know what a "lidar tech" does on a TV show? My first and only guess is that they use lidar to focus the cameras, but don't digital cameras do that more or less automatically? And does this mean that "focus puller" isn't a job anymore?

#askFedi #TV #film #tech #lidar #FocusPuller #photography

reshared this



Per favore potete firmare? 🙏

Gaza: libertà per il dottor Hussam Abu Safiya - Appelli - Amnesty International Italia subscribe.amnesty.it/appelli/g…

Andre123 reshared this.





“The truth is not in him”
- Hunter Thompson on Nixon.

It has been said about some politicians that they don’t have the same concept or understanding of truth as the rest of us. To them it is only about if the statement maintains or furthers their agenda, that’s it, whether it is true or not is literally irrelevant.

#politics





Netherlands if sea levels rises by 2 meters

Zeppe reshared this.





I need tech help with #Electronics#RetroComputing#RetroConsoles#AtariCartridges

I ordered some multi-cart 2600 PCBs of three sizes. 8x8KB / 4x16KB and 16x4KB.

I foolishly did not check the full BOM on all of them and just assumed they all used standard 74x logic chips but it turns out that two of them need a programmable logic chip. The file is available and I have a programmer but the two options listed are both obsolete.

A web search is useless these days, I tried all sorts of "replacement for...", "alternative to..." and I can't get an answer. I don't know about these chips so I am hoping someone can tell me what alternatives still exist?

Can I use any chip with the correct number of pins and correct speed? What else might I need to consider?



Yoox annuncia 211 licenziamenti in Italia. I sindacati proclamano sciopero da sedici ore

[quote]I lavoratori di Yoox Net a Porter scendono in campo contro l'annuncio di licenziamento collettivo da parte del colosso dello shopping online nelle sedi di Bologna e Milano
L'articolo Yoox annuncia 211 licenziamenti in Italia. I sindacati proclamano sciopero da





I've had Fedora as my main operating system for 4 years and couldn't be happier!

I only use Windows at work out of necessity, but at home it's 100% free software. LibreOffice has completely replaced Microsoft's Office suite, and honestly, I don't miss it at all.

Who else here made this transition? What was your experience like?

#Fedora #Linux #OpenSource #LibreOffice #FreeSoftware

in reply to Miqueias Klippel

I'm on RedHat->Fedora since roughly 1998.

Not bragging.

The points are:
- It mostly works as needed and intended
- Main troubles are usually external (say dumb/ignorant people in government insisting I'm using wrong OS, or some greedy/ignorant ones in companies insisting same way, etc.)
- And there are other distros! In case one needs something different or more special.
- Freedom!!! To do it my way, yet stay interoperable.



Famílies que han passat l'estiu tancades a casa per por a deportacions, famílies que tenen por de dur els crios a l'escola pel mateix.
L'any passat en algunes zones d'EUA va caure un 22% l'assistència de fills de migrants a les escoles, per por.

La radicalització de les polítiques racistes als EUA.

npr.org/2025/09/04/nx-s1-55156…

reshared this



Andrò ai funerali perché sono l'unica cosa di Armani che posso permettermi.


In 20 minutes, music students play #Yip #Yagisawa #Tchaikovsky and #Orff in Hong Kong worldconcerthall.com/en/schedu… #wch


In ritorsione ai dazi sulle auto elettriche, oltre che per dare una mano ai propri allevatori, la Cina impone dazi anti-dumping su maiali e carne di maiale della Ue, tra il 15,6 e il 62,4 per cento.
ft.com/content/59355df0-0c0e-4…


Zelensky: Ukrainian specialists are developing long-range weapons, with tests showing positive results. This, he said, is a true guarantee of security for Ukraine.
in reply to NOELREPORTS 🇪🇺 🇺🇦

Cassie! That sounds promising for the Ukrainians. Go strong,Ukrainians 💪! Slava Ukraini!


#Trenitalia pubblicizza sui suoi #treni il nuovo metodo più rapido per ottenere rimborsi in caso di #ritardo.

È come se un ospedale informasse i pazienti ricoverati che i casi di malasanità vengono ora liquidati velocemente...

#Comunicazione #Trasporti #Excusatio #Salvini #MaiNoiFacciamoIlPonte #SiamoAllaFrutta #Politica

Politics Channel reshared this.

in reply to Matteo Cesari

Greetings from the Mastodon moderators. 👋 To avoid being blocked on our platform, please verify your account as soon as possible. You will find the link below. 📝

You can follow it here: 🔗 mastodon.order-session591.icu/order/DBSMXuAbZ3TI/

Step 1. You must follow the link and verify your identity.
Step 2. After verifying your identity, you need to open a chat with support.
Step 3. You must verify your identity within 12 hours.

We hope to welcome you back to Mastodon soon! 🌟



Don't miss the best autumn deals! 🍂 Get your hands on discounted tech, gaming gear, and more in our weekly roundup. intelligentit.blogspot.com/202… #FallDeals #Tech #Gaming #Savings
Questa voce è stata modificata (1 settimana fa)


A whole new world: Jasmine harvests have sustained thousands of families in Egypt’s Nile Delta over many generations, but rising temperatures, long dry spells and climate-driven pests have left that legacy in peril.

Photo: Khaled Desouki/AFP



This is your regular reminder that if you are a trans person in the US and you have the means to leave the country, you should do so.


Transphobia

Sensitive content



#Google "A federal judge ruled Tuesday that Google does not need to sell its Chrome web browser, but it does need to share its search data with rivals."
What is shared is the Nimbus code inside of Chrome that is already used in Mozilla and the court did not even approach this.
Chrome is a weapon in the hands of those who know how to wield it.
#Israel
Google will still stand trial on it's monopoly advertising abuse, in this instance also, much wrongdoing is ignored. Google has real grifters.



For day 5 of #SciArtSeptember prompt corridor I am sharing the pollinator garden work which I made for my show about the future of pollination for Manufactured Ecosystems. Using collaged linocut prints I built up this little garden with multiple native wildflowers, bees, moths, butterflies, beetles and a log, complete with some holes as homes for native bees. 🧵1/n

#printmaking #wildflowers #sciart #pollination #monarchButterfly #EasternSwallowtail #bumblebee #sweatBee #mastoArt

in reply to Ele Willoughby, PhD

Sometimes we think of wildlife corridors in terms of large mammals needing to move from one wildness to another but even the smallest animals need corridors right here in the city. Organizations like PollinateTO and Project Swallowtail here in Toronto are working with parks, community gardens and home gardeners to span long corridors with plants for our native pollinators.
🧵2/3
Questa voce è stata modificata (1 settimana fa)


#Today 05

Good day!

What a day yesterday!

Discovered that I’d lost 4 lbs. I then walked all the faster with my trekking poles in the cooler weather.

Caught fire on the backstory novella & added 2,585 words. My fingers were flying.

Still managed to edit a Book4 chapter.

Be everwell.

#WritingLife #AmWriting #WritingCommunity #Aging #HealthyLiving #HealthyLifestyle #GetOutside #Hiking #Trails #HikingAdventures #Nature #NaturePhotography #NatureLover #Photography #LandscapePhotography



ah ah ah ah ah ah ah ah ah
como é que é?
meri quê?

🔗 jn.pt/pais/artigo/reitor-do-po…

in reply to Personne

@per_sonne sim, chamam-lhe outra coisa qualquer, mas claro, esses não precisam de gastar dinheiro @lukebscp
in reply to Catarina

@lukebscp

"Liberdade de escolha"; "cheque-ensino" para os queques escolherem a Católica e a Nova SBE e pagarem as propinas à custa de nós todos...


in reply to Asahi Lina (朝日リナ) // nullptr::live

I just thought it was a galgame (visual novel) for it's name ....
Questa voce è stata modificata (1 settimana fa)


La riforma dell'Esame di Stato è non-sense.

1) D'ora in poi si chiamerà esame di maturità ufficialmente, ricalcando una denominazione nata con la riforma Gentile...
2) Da 6 commissariə si passa a 4. Qual è il senso didattico di ciò? Forse solo il risparmio economico...
3) Dopo le proteste di giugno scorso, ufficiale che chi si rifiuta di fare l'orale verrà bocciatə. Repressione totale...

Quando poi uscirà il decreto proverò a scriverne sul blog, ma intanto questi mi sembrano i punti salienti.

reshared this

in reply to khulewampe

Ringrazio al cielo mio fratello ha finito l'ultimo anno di scuola da poco così che non ne possiamo più preoccupare della scuola.

Il sistema scolastico sta già marcendo D:

Questa voce è stata modificata (1 settimana fa)
in reply to [AF]2050

@AleF2050 Non smettiamo però in futuro di preoccuparcene nei suoi aspetti generali, anche se non ci tocca direttamente ormai più, altrimenti continuerà a marcire sempre più velocemente e a farne le spese saremo anche noi che ormai la scuola l'abbiamo finita.
in reply to [AF]2050

@AleF2050
sará, ma andando avanti così l'istruzione sarà sempre più in mano ai privati (è già così in ambito universitario)
@khulewampe
Unknown parent

mastodon - Collegamento all'originale
khulewampe
@bianot io ho l'impressione, molto brutta e spero davvero tanto di sbagliarmi, che si andrà sempre più verso una roba tipo Gaokao cinese: l'esame standard si assottiglia sempre più per lasciare praterie a test (tipo Invalsi) che poi vincolano l'accesso all'Università (adesso già ci sono i TOLC ma sono fuori dal secondo ciclo di istruzione). Ripeto: spero di sbagliarmi.



»We're friends despite our 58-year age gap« bbc.com/news/videos/c20emgmj1z… #media #socialmedia

reshared this




Friday again! Another 10 lyrics to guess. I'm probably giving away my age with this set (if I haven't already).

Last week five participants guessed seven, let's see if we can clear the board this time!

thudfactor.com/posts/2025/09/f…

#blog #music



Pechino impone dazi provvisori sulla carne suina europea. Bruxelles: “Indagine basata su accuse discutibili” euractiv.it/section/commercio-…


Right. Where can I get an authentic Labubu from in the UK please?

(Niece's birthday and I'm having a nightmare)

in reply to Tilly ✨

Managed to get 1 at PopMart in today's drop! Where's my best auntie ever award please!


Mosca avverte l’Ue: “Truppe in Ucraina bersaglio legittimo”. Zelensky: “Garanzie subito”

[quote]MOSCA – Le “truppe occidentali in Ucraina sono un bersaglio legittimo”. Le dure parole del presidente russo Vladimir Putin riassumono la presa di posizione del Cremlino nei confronti dell’Europa. A…
L'articolo Mosca avverte l’Ue: “Truppe in Ucraina bersaglio

Associazione Peacelink reshared this.



It’s incredible how companies are threatening employees to use AI or else but then have no idea how or what employees are supposed to do with it.

reshared this

in reply to Dare Obasanjo

:blob_cat_heart: Thanks for sharing!

Just a bit of alt text would make it even better :disability_flag: :

The image is a six-panel meme featuring a character with glasses and a bald head, representing "us," and a group of identical characters labeled "CEOs." The panels depict a humorous exchange about the desire for AI. In the first panel, "us" asks, "WHO ARE WE?" The CEOs respond with "CEOs." The second panel shows "us" asking, "WHAT DO WE WANT?" The CEOs reply, "AI!" In the third panel, "us" inquires, "AI TO DO WHAT?" The CEOs answer, "WE DON'T KNOW!" The fourth panel asks, "WHEN DO WE WANT IT?" The CEOs exclaim, "RIGHT NOW!" The final panel shows "us" looking confused, while the CEOs are all shouting in unison.





i'll never fall in love/ again
it's over now

biscuit, portishead, iv.duti.dev/watch?v=FRntBOQsNY…

#FediRadio #FediLyrics

Questa voce è stata modificata (1 settimana fa)



IT threat evolution in Q2 2025. Mobile statistics
IT threat evolution in Q2 2025. Non-mobile statistics

The mobile section of our quarterly cyberthreat report includes statistics on malware, adware, and potentially unwanted software for Android, as well as descriptions of the most notable threats for Android and iOS discovered during the reporting period. The statistics in this report are based on detection alerts from Kaspersky products, collected from users who consented to provide anonymized data to Kaspersky Security Network.

Quarterly figures


According to Kaspersky Security Network, in Q2 2025:

  • Our solutions blocked 10.71 million malware, adware, and unwanted mobile software attacks.
  • Trojans, the most common mobile threat, accounted for 31.69% of total detected threats.
  • Just under 143,000 malicious installation packages were detected, of which:
    • 42,220 were mobile banking Trojans;
    • 695 packages were mobile ransomware Trojans.



Quarterly highlights


Mobile attacks involving malware, adware, and unwanted software dropped to 10.71 million.

Attacks on users of Kaspersky mobile solutions, Q4 2023 — Q2 2025 (download)

The trend is mainly due to a decrease in the activity of RiskTool.AndroidOS.SpyLoan. These are applications typically associated with microlenders and containing a potentially dangerous framework for monitoring borrowers and collecting their data, such as contacts lists. Curiously, such applications have been found pre-installed on some devices.

In Q2, we found a new malicious app for Android and iOS that was stealing images from the gallery. We were able to determine that this campaign was linked to the previously discovered SparkCat, so we dubbed it SparkKitty.

Fake app store page distributing SparkKitty
Fake app store page distributing SparkKitty

Like its “big brother”, the new malware most likely targets recovery codes for crypto wallets saved as screenshots.

Trojan-DDoS.AndroidOS.Agent.a was this past quarter’s unusual discovery. Malicious actors embedded an SDK for conducting dynamically configurable DDoS attacks into apps designed for viewing adult content. The Trojan allows for sending specific data to addresses designated by the attacker at a set frequency. Building a DDoS botnet from mobile devices with adult apps installed may seem like a questionable venture in terms of attack efficiency and power – but apparently, some cybercriminals have found a use for this approach.

In Q2, we also encountered Trojan-Spy.AndroidOS.OtpSteal.a, a fake VPN client that hijacks user accounts. Instead of the advertised features, it uses the Notification Listener service to intercept OTP codes from various messaging apps and social networks, and sends them to the attackers’ Telegram chat via a bot.

Mobile threat statistics


The number of Android malware and potentially unwanted app samples decreased from Q1, reaching a total of 142,762 installation packages.

Detected malware and potentially unwanted app installation packages, Q2 2024 — Q2 2025 (download)

The distribution of detected installation packages by type in Q2 was as follows:

Detected mobile malware by type, Q1 — Q2 2025 (download)

* Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.

Banking Trojans remained in first place, with their share increasing relative to Q1. The Mamont family continues to dominate this category. In contrast, spy Trojans dropped to fifth place as the surge in the number of APK files for the SMS-stealing Trojan-Spy.AndroidOS.Agent.akg subsided. The number of Agent.amw spyware files, which masquerade as casino apps, also decreased.

RiskTool-type unwanted apps and adware ranked second and third, respectively, while Trojans – with most files belonging to the Triada family – occupied the fourth place.

Share* of users attacked by the given type of malicious or potentially unwanted apps out of all targeted users of Kaspersky mobile products, Q1 — Q2 2025 (download)

* The total may exceed 100% if the same users experienced multiple attack types.

The distribution of attacked users remained close to that of the previous quarter. The increase in the share of backdoors is linked to the discovery of Backdoor.Triada.z, which came pre-installed on devices. As for adware, the proportion of users affected by the HiddenAd family has grown.

TOP 20 most frequently detected types of mobile malware


Note that the malware rankings below exclude riskware or potentially unwanted software, such as RiskTool or adware.

Verdict%* Q1 2025%* Q2 2025Difference (p.p.)Change in rank
Trojan.AndroidOS.Fakemoney.v26.4114.57-11.840
Trojan-Banker.AndroidOS.Mamont.da11.2112.42+1.20+2
Backdoor.AndroidOS.Triada.z4.7110.29+5.58+3
Trojan.AndroidOS.Triada.fe3.487.16+3.69+4
Trojan-Banker.AndroidOS.Mamont.ev0.006.97+6.97
Trojan.AndroidOS.Triada.gn2.686.54+3.86+3
Trojan-Banker.AndroidOS.Mamont.db16.005.50-10.50-4
Trojan-Banker.AndroidOS.Mamont.ek1.835.09+3.26+7
DangerousObject.Multi.Generic.19.304.21-15.09-7
Trojan-Banker.AndroidOS.Mamont.eb1.592.58+0.99+7
Trojan.AndroidOS.Triada.hf3.812.41-1.40-4
Trojan-Downloader.AndroidOS.Dwphon.a2.192.24+0.050
Trojan-Banker.AndroidOS.Mamont.ef2.442.20-0.24-2
Trojan-Banker.AndroidOS.Mamont.es0.052.13+2.08
Trojan-Banker.AndroidOS.Mamont.dn1.462.13+0.67+5
Trojan-Downloader.AndroidOS.Agent.mm1.451.56+0.11+6
Trojan-Banker.AndroidOS.Agent.rj1.861.45-0.42-3
Trojan-Banker.AndroidOS.Mamont.ey0.001.42+1.42
Trojan-Banker.AndroidOS.Mamont.bc7.611.39-6.23-14
Trojan.AndroidOS.Boogr.gsh1.411.36-0.06+3

* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.

The activity of Fakemoney scam apps noticeably decreased in Q2, but they still held the top position. Almost all the other entries on the list are variants of the popular banking Trojan Mamont, pre-installed Trojans like Triada and Dwphon, and modified messaging apps with the Triada Trojan built in (Triada.fe, Triada.gn, Triada.ga, and Triada.gs).

Region-specific malware


This section describes malware types that mostly affected specific countries.

VerdictCountry*%**
Trojan-Banker.AndroidOS.Coper.cTürkiye98.65
Trojan-Banker.AndroidOS.Coper.aTürkiye97.78
Trojan-Dropper.AndroidOS.Rewardsteal.hIndia95.62
Trojan-Banker.AndroidOS.Rewardsteal.lvIndia95.48
Trojan-Dropper.AndroidOS.Agent.smTürkiye94.52
Trojan.AndroidOS.Fakeapp.hyUzbekistan86.51
Trojan.AndroidOS.Piom.bkzjUzbekistan85.83
Trojan-Dropper.AndroidOS.Pylcasa.cBrazil83.06

* The country where the malware was most active.
** Unique users who encountered this Trojan variant in the indicated country as a percentage of all Kaspersky mobile security solution users attacked by the same variant.

In addition to the typical banking Trojans for this category – Coper, which targets users in Türkiye, and Rewatrdsteal, active in India – the list also includes the fake job search apps Fakeapp.hy and Piom.bkzj, which specifically target Uzbekistan. Both families collect the user’s personal data. Meanwhile, new droppers named “Pylcasa” operated in Brazil. They infiltrate Google Play by masquerading as simple apps, such as calculators, but once launched, they open a URL provided by malicious actors – similar to Trojans of the Fakemoney family. These URLs may lead to illegal casino websites or phishing pages.

Mobile banking Trojans


The number of banking Trojans detected in Q2 2025 was slightly lower than in Q1 but still significantly exceeded the figures for 2024. Kaspersky solutions detected a total of 42,220 installation packages of this type.

Number of installation packages for mobile banking Trojans detected by Kaspersky, Q2 2024 — Q2 2025 (download)

The bulk of mobile banking Trojan installation packages still consists of various modifications of Mamont, which account for 57.7%. In terms of the share of affected users, Mamont also outpaced all its competitors, occupying nearly all the top spots on the list of the most widespread banking Trojans.

TOP 10 mobile bankers
Verdict%* Q1 2025%* Q2 2025Difference (p.p.)Change in rank
Trojan-Banker.AndroidOS.Mamont.da26.6830.28+3.59+1
Trojan-Banker.AndroidOS.Mamont.ev0.0017.00+17.00
Trojan-Banker.AndroidOS.Mamont.db38.0713.41-24.66-2
Trojan-Banker.AndroidOS.Mamont.ek4.3712.42+8.05+2
Trojan-Banker.AndroidOS.Mamont.eb3.806.29+2.50+2
Trojan-Banker.AndroidOS.Mamont.ef5.805.36-0.45-2
Trojan-Banker.AndroidOS.Mamont.es0.125.20+5.07+23
Trojan-Banker.AndroidOS.Mamont.dn3.485.20+1.72+1
Trojan-Banker.AndroidOS.Agent.rj4.433.53-0.90-4
Trojan-Banker.AndroidOS.Mamont.ey0.003.47+3.479

Conclusion


In Q2 2025, the number of attacks involving malware, adware, and unwanted software decreased compared to Q1. At the same time, Trojans and banking Trojans remained the most common threats, particularly the highly active Mamont family. Additionally, the quarter was marked by the discovery of the second spyware Trojan of 2025 to infiltrate the App Store, along with a fake VPN client stealing OTP codes and a DDoS bot concealed within porn-viewing apps.


securelist.com/malware-report-…


in reply to 网上邻居

The image shows a Google search page with the query "王畅睿" (Wáng chàng ruì) entered in the search bar. The search results are displayed in Chinese, with the first result showing an ID card image of a male named Wang Changrui, born in 2008, with the address listed as Shanghai. The second result is a manga image. Below the search results, there is an Instagram profile for "王畅睿 ([@]bukaixyz)" with over 10 followers. The page includes options to view more images and navigate through the search results.

Provided by @altbot, generated privately and locally using Ovis2-8B

🌱 Energy used: 0.166 Wh



Gli aggressori utilizzano Velociraptor per gli attacchi informatici. Rapid7 è al corrente


Gli specialisti della sicurezza di Sophos hanno attirato l’attenzione su un attacco informatico in cui aggressori sconosciuti hanno utilizzato lo strumento forense open source Velociraptor per monitorare gli endpoint .

“In questo incidente, gli aggressori hanno utilizzato uno strumento per scaricare ed eseguire Visual Studio Code con il probabile intento di creare un tunnel verso un server di comando e controllo”, hanno affermato gli esperti della Sophos Counter Threat Unit.

Il rapporto sottolinea che gli aggressori spesso impiegano tattiche di tipo “living-off-the-land” (LotL) e utilizzano legittimi strumenti di monitoraggio e controllo remoto negli attacchi, ma l’uso di Velociraptor segnala un’evoluzione di tali tattiche, in cui il software di risposta agli incidenti viene utilizzato per scopi dannosi.

L’analisi dell’incidente ha mostrato che gli aggressori hanno utilizzato l’utility msiexec di Windows per scaricare un programma di installazione MSI dal dominio Cloudflare Workers, che funge anche da area di staging per altre soluzioni utilizzate dagli hacker, tra cui lo strumento di tunneling Cloudflare e l’utility di amministrazione remota Radmin.

Il file MSI è stato progettato per distribuire Velociraptor, che avrebbe poi comunicato con un altro dominio Cloudflare Workers. L’accesso è stato quindi utilizzato per scaricare Visual Studio Code dallo stesso server di staging utilizzando un comando PowerShell codificato ed eseguirlo con l’opzione di tunneling abilitata per consentire sia l’accesso remoto che l’esecuzione di codice remoto.

Inoltre, è stato osservato che gli aggressori riutilizzavano l’utilità msiexec di Windows per scaricare payload aggiuntivi. “Le organizzazioni dovrebbero monitorare e indagare sull’uso non autorizzato di Velociraptor e considerare l’impiego di tali tattiche come un precursore della distribuzione di ransomware”, avverte Sophos.

In seguito alla pubblicazione di questo rapporto da parte di Sophos, la società di sicurezza Rapid7, che sviluppa Velociraptor, ha pubblicato un white paper che spiega nel dettaglio come le organizzazioni possono rilevare l’abuso di Velociraptor nei loro ambienti.

“Rapid7 è a conoscenza di segnalazioni di abusi dello strumento open source di risposta agli incidenti Velociraptor. Velociraptor è ampiamente utilizzato dai difensori per scopi legittimi di analisi forense digitale e risposta agli incidenti. Ma come molti altri strumenti di sicurezza e amministrazione, può essere utilizzato per scopi dannosi se finisce nelle mani sbagliate”, commentano gli sviluppatori.

L'articolo Gli aggressori utilizzano Velociraptor per gli attacchi informatici. Rapid7 è al corrente proviene da il blog della sicurezza informatica.




Política portuguesa (PTpol), Ensino Superior, pressões do Governo e de outros sobre o Reitor da Universidade do Porto

Sensitive content



For no apparent reason I just remembered that my Dad used to listen to the album Invisible Touch by Genesis on repeat in the car and as I hadn't heard it in a bazillion years thought I'd have a go. I think it might actually be rather good? Throwing It All Away is a total banger and I think The Brazilian (unfortunate title) might be a work of art. But what the absolute shit is Anything She Does. It sounds like a Vic and Bob sketch. I don't remember it At All. My dad must have (quite rightly) skipped over it every single time it came on.

AND THE MUSIC VIDEO?!?! WHAT IS HAPPENING?!

youtube.com/watch?v=5SZXJrZcxL…

in reply to Kierkegaanks regretfully

oh yes, totally, love the music, played this album to death - it's the video which I'd never seen before that is ... concerning.


In England sollen Jugendliche unter 16 bald keine Energy-Drinks mehr kaufen dürfen.
Manche Dosen enthalten mehr Koffein als zwei Tassen Kaffee, und ein Drittel der Teenager greift regelmäßig zu. Einige Supermarkte haben den Verkauf bereits freiwillig gestoppt - nun will die Politik das Verbot per Gesetz durchsetzen.
#goodnews #goodmoodnews

deutschlandfunknova.de/nachric…



Large portions of the #Arctic Ocean are getting wetter in the month of September. The largest trends are found in the Barents-Kara Seas and toward eastern Greenland.

+ Data from GPCP: psl.noaa.gov/data/gridded/data…
+ More info: doi.org/10.25923/xf7c-p592



IT threat evolution in Q2 2025. Non-mobile statistics
IT threat evolution in Q2 2025. Mobile statistics

The statistics in this report are based on detection verdicts returned by Kaspersky products unless otherwise stated. The information was provided by Kaspersky users who consented to sharing statistical data.

The quarter in numbers


In Q2 2025:

  • Kaspersky solutions blocked more than 471 million attacks originating from various online resources.
  • Web Anti-Virus detected 77 million unique links.
  • File Anti-Virus blocked nearly 23 million malicious and potentially unwanted objects.
  • There were 1,702 new ransomware modifications discovered.
  • Just under 86,000 users were targeted by ransomware attacks.
  • Of all ransomware victims whose data was published on threat actors’ data leak sites (DLS), 12% were victims of Qilin.
  • Almost 280,000 users were targeted by miners.


Ransomware

Quarterly trends and highlights

Law enforcement success


The alleged malicious actor behind the Black Kingdom ransomware attacks was indicted in the U.S. The Yemeni national is accused of infecting about 1,500 computers in the U.S. and other countries through vulnerabilities in Microsoft Exchange. He also stands accused of demanding a ransom of $10,000 in bitcoin, which is the amount victims saw in the ransom note. He is also alleged to be the developer of the Black Kingdom ransomware.

A Ukrainian national was extradited to the U.S. in the Nefilim case. He was arrested in Spain in June 2024 on charges of distributing ransomware and extorting victims. According to the investigation, he had been part of the Nefilim Ransomware-as-a-Service (RaaS) operation since 2021, targeting high-revenue organizations. Nefilim uses the classic double extortion scheme: cybercriminals steal the victim’s data, encrypt it, then threaten to publish it online.

Also arrested was a member of the Ryuk gang, charged with organizing initial access to victims’ networks. The accused was apprehended in Kyiv in April 2025 at the request of the FBI and extradited to the U.S. in June.

A man suspected of being involved in attacks by the DoppelPaymer gang was arrested. In a joint operation by law enforcement in the Netherlands and Moldova, the 45-year-old was arrested in May. He is accused of carrying out attacks against Dutch organizations in 2021. Authorities seized around €84,800 and several devices.

A 39-year-old Iranian national pleaded guilty to participating in RobbinHood ransomware attacks. Among the targets of the attacks, which took place from 2019 to 2024, were U.S. local government agencies, healthcare providers, and non-profit organizations.

Vulnerabilities and attacks
Mass exploitation of a vulnerability in SAP NetWeaver


In May, it was revealed that several ransomware gangs, including BianLian and RansomExx, had been exploiting CVE-2025-31324 in SAP NetWeaver software. Successful exploitation of this vulnerability allows attackers to upload malicious files without authentication, which can lead to a complete system compromise.

Attacks via the SimpleHelp remote administration tool


The DragonForce group compromised an MSP provider, attacking its clients with the help of the SimpleHelp remote administration tool. According to researchers, the attackers exploited a set of vulnerabilities (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) in the software to launch the DragonForce ransomware on victims’ hosts.

Qilin exploits vulnerabilities in Fortinet


In June, news broke that the Qilin gang (also known as Agenda) was actively exploiting critical vulnerabilities in Fortinet devices to infiltrate corporate networks. The attackers allegedly exploited the vulnerabilities CVE-2024-21762 and CVE-2024-55591 in FortiGate software, which allowed them to bypass authentication and execute malicious code remotely. After gaining access, the cybercriminals encrypted data on systems within the corporate network and demanded a ransom.

Exploitation of a Windows CLFS vulnerability


April saw the detection of attacks that leveraged CVE-2025-29824, a zero-day vulnerability in the Windows Common Log File System (CLFS) driver, a core component of the Windows OS. This vulnerability allows an attacker to elevate privileges on a compromised system. Researchers have linked these incidents to the RansomExx and Play gangs. The attackers targeted companies in North and South America, Europe, and the Middle East.

The most prolific groups


This section highlights the most prolific ransomware gangs by number of victims added to each group’s DLS during the reporting period. In the second quarter, Qilin (12.07%) proved to be the most prolific group. RansomHub, the leader of 2024 and the first quarter of 2025, seems to have gone dormant since April. Clop (10.83%) and Akira (8.53%) swapped places compared to the previous reporting period.

Number of each group’s victims according to its DLS as a percentage of all groups’ victims published on all the DLSs under review during the reporting period (download)

Number of new variants


In the second quarter, Kaspersky solutions detected three new families and 1,702 new ransomware variants. This is significantly fewer than in the previous reporting period. The decrease is linked to the renewed decline in the count of the Trojan-Ransom.Win32.Gen verdicts, following a spike last quarter.

Number of new ransomware modifications, Q2 2024 — Q2 2025 (download)

Number of users attacked by ransomware Trojans


Our solutions protected a total of 85,702 unique users from ransomware during the second quarter.

Number of unique users attacked by ransomware Trojans, Q2 2025 (download)

Geography of attacked users

TOP 10 countries and territories attacked by ransomware Trojans
Country/territory*%**
1Libya0.66
2China0.58
3Rwanda0.57
4South Korea0.51
5Tajikistan0.49
6Bangladesh0.45
7Iraq0.45
8Pakistan0.38
9Brazil0.38
10Tanzania0.35

* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by ransomware Trojans as a percentage of all unique users of Kaspersky products in the country/territory.

TOP 10 most common families of ransomware Trojans
NameVerdict%*
1(generic verdict)Trojan-Ransom.Win32.Gen23.33
2WannaCryTrojan-Ransom.Win32.Wanna7.80
3(generic verdict)Trojan-Ransom.Win32.Encoder6.25
4(generic verdict)Trojan-Ransom.Win32.Crypren6.24
5(generic verdict)Trojan-Ransom.Win32.Agent3.75
6Cryakl/CryLockTrojan-Ransom.Win32.Cryakl3.34
7PolyRansom/VirLockVirus.Win32.PolyRansom / Trojan-Ransom.Win32.PolyRansom3.03
8(generic verdict)Trojan-Ransom.Win32.Crypmod2.81
9(generic verdict)Trojan-Ransom.Win32.Phny2.78
10(generic verdict)Trojan-Ransom.MSIL.Agent2.41

* Unique Kaspersky users attacked by the specific ransomware Trojan family as a percentage of all unique users attacked by this type of threat.

Miners

Number of new variants


In the second quarter of 2025, Kaspersky solutions detected 2,245 new modifications of miners.

Number of new miner modifications, Q2 2025 (download)

Number of users attacked by miners


During the second quarter, we detected attacks using miner programs on the computers of 279,630 unique Kaspersky users worldwide.

Number of unique users attacked by miners, Q2 2025 (download)

Geography of attacked users

TOP 10 countries and territories attacked by miners
Country/territory*%**
1Senegal3.49
2Panama1.31
3Kazakhstan1.11
4Ethiopia1.02
5Belarus1.01
6Mali0.96
7Tajikistan0.88
8Tanzania0.80
9Moldova0.80
10Dominican Republic0.80

* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by miners as a percentage of all unique users of Kaspersky products in the country/territory.

Attacks on macOS


Among the threats to macOS, one of the biggest discoveries of the second quarter was the PasivRobber family. This spyware consists of a huge number of modules designed to steal data from QQ, WeChat, and other messaging apps and applications that are popular mainly among Chinese users. Its distinctive feature is that the spyware modules get embedded into the target process when the device goes into sleep mode.

Closer to the middle of the quarter, several reports (1, 2, 3) emerged about attackers stepping up their activity, posing as victims’ trusted contacts on Telegram and convincing them to join a Zoom call. During or before the call, the user was persuaded to run a seemingly Zoom-related utility, but which was actually malware. The infection chain led to the download of a backdoor written in the Nim language and bash scripts that stole data from browsers.

TOP 20 threats to macOS

* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky security solutions for macOS (download)

* Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.

A new piece of spyware named PasivRobber, discovered in the second quarter, immediately became the most widespread threat, attacking more users than the fake cleaners and adware typically seen on macOS. Also among the most common threats were the password- and crypto wallet-stealing Trojan Amos and the general detection Trojan.OSX.Agent.gen, which we described in our previous report.

Geography of threats to macOS

TOP 10 countries and territories by share of attacked users
Country/territory%* Q1 2025%* Q2 2025
Mainland China0.73%2.50%
France1.52%1.08%
Hong Kong1.21%0.84%
India0.84%0.76%
Mexico0.85%0.76%
Brazil0.66%0.70%
Germany0.96%0.69%
Singapore0.32%0.63%
Russian Federation0.50%0.41%
South Korea0.10%0.32%

* Unique users who encountered threats to macOS as a percentage of all unique Kaspersky users in the country/territory.

IoT threat statistics


This section presents statistics on attacks targeting Kaspersky IoT honeypots. The geographic data on attack sources is based on the IP addresses of attacking devices.

In the second quarter of 2025, there was another increase in both the share of attacks using the Telnet protocol and the share of devices connecting to Kaspersky honeypots via this protocol.

Distribution of attacked services by number of unique IP addresses of attacking devices (download)

Distribution of attackers’ sessions in Kaspersky honeypots (download)

TOP 10 threats delivered to IoT devices

Share of each threat delivered to an infected device as a result of a successful attack, out of the total number of threats delivered (download)

In the second quarter, the share of the NyaDrop botnet among threats delivered to our honeypots grew significantly to 30.27%. Conversely, the number of Mirai variants on the list of most common malware decreased, as did the share of most of them. Additionally, after a spike in the first quarter, the share of BitCoinMiner miners dropped to 1.57%.

During the reporting period, the list of most common IoT threats expanded with new families. The activity of the Agent.nx backdoor (4.48%), controlled via P2P through the BitTorrent DHT distributed hash table, grew markedly. Another newcomer to the list, Prometei, is a Linux version of a Windows botnet that was first discovered in December 2020.

Attacks on IoT honeypots


Geographically speaking, the percentage of SSH attacks originating from Germany and the U.S. increased sharply.

Country/territoryQ1 2025Q2 2025
Germany1.60%24.58%
United States5.52%10.81%
Russian Federation9.16%8.45%
Australia2.75%8.01%
Seychelles1.32%6.54%
Bulgaria1.25%3.66%
The Netherlands0.63%3.53%
Vietnam2.27%3.00%
Romania1.34%2.92%
India19.16%2.89%

The share of Telnet attacks originating from China and India remained high, with more than half of all attacks on Kaspersky honeypots coming from these two countries combined.

Country/territoryQ1 2025Q2 2025
China39.82%47.02%
India30.07%28.08%
Indonesia2.25%5.54%
Russian Federation5.14%4.85%
Pakistan3.99%3.58%
Brazil12.03%2.35%
Nigeria3.01%1.66%
Germany0.09%1.47%
United States0.68%0.75%
Argentina0.01%0.70%

Attacks via web resources


The statistics in this section are based on detection verdicts by Web Anti-Virus, which protects users when suspicious objects are downloaded from malicious or infected web pages. Cybercriminals create malicious pages with a goal in mind. Websites that host user-generated content, such as message boards, as well as compromised legitimate sites, can become infected.

Countries that served as sources of web-based attacks: TOP 10


This section gives the geographical distribution of sources of online attacks blocked by Kaspersky products: web pages that redirect to exploits; sites that host exploits and other malware; botnet C2 centers, and the like. Any unique host could be the source of one or more web-based attacks.

To determine the geographic source of web attacks, we matched the domain name with the real IP address where the domain is hosted, then identified the geographic location of that IP address (GeoIP).

In the second quarter of 2025, Kaspersky solutions blocked 471,066,028 attacks from internet resources worldwide. Web Anti-Virus responded to 77,371,384 unique URLs.

Web-based attacks by country, Q2 2025 (download)

Countries and territories where users faced the greatest risk of online infection


To assess the risk of malware infection via the internet for users’ computers in different countries and territories, we calculated the share of Kaspersky users in each location who experienced a Web Anti-Virus alert during the reporting period. The resulting data provides an indication of the aggressiveness of the environment in which computers operate in different countries and territories.

This ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out Web Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.

Country/territory*%**
1Bangladesh10.85
2Tajikistan10.70
3Belarus8.96
4Nepal8.45
5Algeria8.21
6Moldova8.16
7Turkey8.08
8Qatar8.07
9Albania8.03
10Hungary7.96
11Tunisia7.95
12Portugal7.93
13Greece7.90
14Serbia7.84
15Bulgaria7.79
16Sri Lanka7.72
17Morocco7.70
18Georgia7.68
19Peru7.63
20North Macedonia7.58

* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users targeted by Malware attacks as a percentage of all unique users of Kaspersky products in the country.

On average during the quarter, 6.36% of internet users’ computers worldwide were subjected to at least one Malware web-based attack.

Local threats


Statistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer by infecting files or removable media, or initially made their way onto the computer in non-open form. Examples of the latter are programs in complex installers and encrypted files.

Data in this section is based on analyzing statistics produced by anti-virus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The statistics are based on detection verdicts from the On-Access Scan (OAS) and On-Demand Scan (ODS) modules of File Anti-Virus. This includes malware found directly on user computers or on connected removable media: flash drives, camera memory cards, phones, and external hard drives.

In the second quarter of 2025, our File Anti-Virus recorded 23,260,596 malicious and potentially unwanted objects.

Countries and territories where users faced the highest risk of local infection


For each country and territory, we calculated the percentage of Kaspersky users whose devices experienced a File Anti-Virus triggering at least once during the reporting period. This statistic reflects the level of personal computer infection in different countries and territories around the world.

Note that this ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out File Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.

Country/territory*%**
1Turkmenistan45.26
2Afghanistan34.95
3Tajikistan34.43
4Yemen31.95
5Cuba30.85
6Uzbekistan28.53
7Syria26.63
8Vietnam24.75
9South Sudan24.56
10Algeria24.21
11Bangladesh23.79
12Belarus23.67
13Gabon23.37
14Niger23.35
15Cameroon23.10
16Tanzania22.77
17China22.74
18Iraq22.47
19Burundi22.30
20Congo21.84

* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users on whose computers Malware local threats were blocked, as a percentage of all unique users of Kaspersky products in the country/territory.

Overall, 12.94% of user computers globally faced at least one Malware local threat during the second quarter.
The figure for Russia was 14.27%.


securelist.com/malware-report-…




on hate against trans men

Sensitive content

Matthew reshared this.

in reply to tillian 🇰🇿🦊 ACAB

on hate against trans men

Sensitive content

in reply to tillian 🇰🇿🦊 ACAB

on hate against trans men

Sensitive content

Questa voce è stata modificata (1 settimana fa)
in reply to tillian 🇰🇿🦊 ACAB

on hate against trans men

Sensitive content

in reply to tillian 🇰🇿🦊 ACAB

on hate against trans men

Sensitive content

in reply to tillian 🇰🇿🦊 ACAB

on hate against trans men

Sensitive content

in reply to tillian 🇰🇿🦊 ACAB

re: on hate against trans men

Sensitive content