Dark Matter May Interact with Cosmic Ghost Particles, Hinting at a Fundamental Breakthrough

New research suggests dark matter may interact with neutrinos, explaining why cosmic structures today are less clumpy than expected. This subtle interaction challenges the standard Lambda Cold Dark Matter model and could guide particle physics experiments. If confirmed, it would be a fundamental breakthrough, reshaping our understanding of the universe and the evoluti…

Continue Reading

WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging

Jan 08, 2026Ravie LakshmananMalware / Financial Crime Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil. The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit. “The malware retrieves the victim’s WhatsApp contact list and […]

Continue Reading

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the […]

Continue Reading

Best Premium Earbuds to Buy in 2026: AirPods Pro 3, Sony WF-1000XM5, Galaxy Buds 3 Pro and More

Premium true wireless earbuds in India now focus on sound quality, smart noise cancellation, stable connectivity, comfort, and deeper ecosystem integration. Thislist highlights five top options in 2026: AirPods Pro 3 with health tracking and Apple Intelligence features, JBL Tour Pro 3 with a touchscreen smart case, Sony WF-1000XM5 for class-leading ANC, Sennheiser Mom…

Continue Reading

The State of Trusted Open Source

Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half […]

Continue Reading

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Jan 08, 2026Ravie LakshmananNetwork Security / Vulnerability Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with […]

Continue Reading

Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

Jan 08, 2026Ravie LakshmananMalware / Cloud Security Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named “wenmoonx.” “The bitcoin-main-lib and […]

Continue Reading

Poco M8 5G First Impressions

Based on our first impressions, the Poco M8 5G seems to be a thoughtfully planned successor to the disappointing M7 5G. On paper, there are indications that the phone is designed to address the needs of regular usage. But will it deliver on everything it claims to offer? Stay tuned for our full Poco M8 […]

Continue Reading

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Jan 08, 2026Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows – CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality […]

Continue Reading