DJing

NID Tapes interview – “it’s a totally new branch of the tree of electronic music” | Juno Daily

Archive discovery re-opens world of sublime musicality NID studio circa 1969 Released next month on The state51 Conspiracy, NID Tapes: Electronic Music in From India 1969-1972 is a throwback to the early days of analogue composition. The compilation escapes the usual tendency towards Eurocentrism in championing this field, showcasing the collective’s experiments with the Moog […]

Cybersecurity

ShroudedSnooper’s HTTPSnoop Backdoor Targets Middle East Telecom Companies

Sep 19, 2023THNMalware / Cyber Threat Telecommunication service providers in the Middle East are the target of a new intrusion set dubbed ShroudedSnooper that employs a stealthy backdoor called HTTPSnoop. “HTTPSnoop is a simple, yet effective, backdoor that consists of novel techniques to interface with Windows HTTP kernel drivers and devices to listen to incoming […]

Cybersecurity

Microsoft AI Researchers Leak 38TB of Private Data

Microsoft accidentally revealed a huge trove of sensitive internal information dating back over three years via a public GitHub repository, it has emerged. Cloud security firm Wiz discovered the privacy snafu when it found the GitHub repository “robust-models-transfer” which belonged to Microsoft’s AI research division. Although the repository was meant only to provide access to […]

Cybersecurity

Australian Law Firm Hack Affected 65 Government Agencies

Fraud Management & Cybercrime , Geo-Specific , Ransomware Australian Federal Police, Department of Home Affairs Reportedly Among the Victims Mihir Bagwe (MihirBagwe) • September 18, 2023     Image: Shutterstock An April ransomware attack against one of Australia’s largest law firms swept up the data of 65 Australian government agencies, the country’s newly appointed national […]

Cybersecurity

Fraudsters Steal Over $1m in Three Weeks in ‘Pig Butchering’ Scam

Malicious actors have stolen more than $1m in a ‘pig butchering’ cryptocurrency scam in just three months, researchers from Sophos have found. The highly sophisticated operation used a total of 14 domains and dozens of nearly identical fraud sites, according to the investigation. The attackers utilized fake trading pools of cryptocurrency from decentralized finance (DeFi) […]