Research from NordVPN indicates that 47% of commuters use strong passwords or passcodes, 46% regularly update their software, 20% use privacy screen protectors, and only 17% utilize a VPN for added security while traveling.
Over 1,500 PostgreSQL instances exposed to the internet have been targeted by a cryptocurrency mining malware campaign called JINX-0126. Attackers exploit weak credentials to access PostgreSQL servers and use the "COPY ... FROM PROGRAM SQL" command for arbitrary command execution. They deploy a shell script to terminate existing cryptominers and deliver the pg_core binary. A Golang binary, disguised as the PostgreSQL multi-user database server, is then downloaded to establish persistence and escalate privileges, leading to the execution of the latest XMRig cryptominer variant. JINX-0126 employs advanced tactics, including unique hashes for binaries and fileless miner payload execution, to evade detection by cloud workload protection platforms.
Mullvad has introduced a multihop feature in its Android application that allows users to route their internet traffic through two distinct servers, enhancing online security and privacy. This feature creates a "tunnel within a tunnel," where data is transmitted through both an entry server and an exit server. By selecting servers in different jurisdictions, users can complicate the tracing of their data. The multihop service provides a higher level of privacy and security, as adversaries would need to execute timing attacks across multiple locations if one server is compromised. Mullvad operates under robust legal protections in Sweden and follows a strict no-logs policy, ensuring user activity is not recorded or retained.
The PC gaming landscape remains active in April, with notable releases scheduled. Key titles include:
- April 1: Koira - Cute puppy adventure
- April 2: Bugaboo Pocket - Entomology life-sim
- April 3: Sand - Extraction shooter with giant walkers
- April 8: South of Midnight - Action-adventure southern folktale
- April 8: Burden of Command - Tactical leadership RPG
- April 9: Descenders Next - Downhill snowboarding
- April 9: Into the Dead: Our Darkest Days (early access)
- April 10: Crashlands 2 - Open world crafting RPG
- April 10: Hollywood Animal - Hollywood studio management
- April 10: Steel Seed - Sci-fi stealth action adventure
- April 10: The Talos Principle: Reawakened - Unreal 5 remake
- April 10: Monaco 2 - Co-op heist sequel
- April 14: Repose - Black and white adventure
- April 14: Stygian: Outer Gods - Survival horror RPG
- April 17: Mandragora - Side-scrolling, dark fantasy RPG
- April 17: Phantom Breaker - Pixel art beat'em up
- April 17: Tempopo - Rhythmic garden puzzler
- April 18: Lunar Remastered Collection - '90s RPG classics
- April 22: War Rats: The Rat em Up
- April 23: Sunderfolk - Couch co-op RPG
- April 23: The Hundred Line: Last Defense Academy
- April 24: Detective Dotson - Crime-solving as a Bollywood hopeful
- April 24: Fatal Fury: City of the Wolves
- April 24: Phantom Brave: The Lost Hero
- April 28: Badlands Crew - Offroad battles
Additionally, various gaming events are scheduled throughout the month.
Google has introduced a yellow warning banner in the Google Play Store to alert Android users about apps that are frequently uninstalled. This banner indicates that an app may not be meeting user expectations and could be due to poor functionality, excessive advertisements, or inflated costs. Additionally, Google has implemented two other notifications: one indicating lower user engagement with an app and another showing fewer users compared to other apps. These features aim to help users make more informed app choices and avoid potentially harmful applications. Google Play Protect is also available to scan downloaded apps for security, including those from outside the Play Store. Users can enable settings to improve harmful app detection, enhancing overall safety in the app ecosystem.
The April 2025 lineup of Humble Choice includes the following PC games: 1000xResist, Aliens: Dark Descent, Distant Worlds 2, Diplomacy Is Not An Option, Dredge, Nomad Survival, Nova Lands, and Tomb Raider I-III Remastered. The Tomb Raider I-III Remastered collection features enhancements such as a camera lock-on option, achievements, health bars for bosses, and the ability to switch between classic and modern graphics. Dredge is noted for its Lovecraftian horror elements, while 1000xResist is recognized as a top game of 2024. Aliens: Dark Descent combines squad-based tactics with real-time gameplay. Humble Choice members can access these games at no extra cost, and new subscribers can sign up to gain immediate access. Membership also includes access to the Humble Vault and discounts at the Humble Store, with 5% of membership fees donated to charity, specifically to the organization Care. Additionally, there are other Humble Bundle PC game collections available for purchase.
There are over 1 billion distinct malware threats in cyberspace. Antivirus software is essential for identifying and eliminating threats, acting as a frontline defense against various malicious entities, including ransomware. A security offer allows protection for up to five devices at an affordable price, enhancing security for households or small businesses.
By 2025, the global cost of cybercrime is projected to reach .5 trillion annually. Many organizations continue to use outdated Endpoint Detection and Response (EDR) solutions, which are increasingly ineffective against sophisticated cyber threats. EDR was introduced in 2013 but has struggled to keep pace with evolving attack techniques. Traditional EDR is reactive, responding to incidents after they occur, and relies on known Indicators of Compromise (IoCs), which limits its effectiveness. Real-world examples of traditional EDR failures include a misconfigured update to CrowdStrike’s Falcon EDR causing an IT outage, the Akira ransomware exploiting an unsecured webcam, the Medibank breach despite multiple alerts from EDR, and the BlackCat ransomware attack on Henry Schein. These incidents highlight the inadequacy of traditional EDR in preventing modern threats. The next phase of endpoint security is Preemptive Endpoint Protection (PEP), which actively prevents attacks rather than just detecting and responding to them. PEP utilizes proactive strategies like Automated Moving Target Defense (AMTD) and Adaptive Exposure Management (AEM), and research indicates that organizations using proactive security save 30% more on breach costs compared to those relying solely on reactive measures.
Wiz Threat Research has reported a new variant of a malicious campaign targeting misconfigured and publicly exposed PostgreSQL servers, attributed to the threat actor JINX-0126. This actor exploits vulnerable PostgreSQL instances with weak login credentials to gain unauthorized access and deploy XMRig-C3 cryptominers. The campaign has evolved to include advanced evasion techniques, such as using unique hashes for binaries and executing payloads in a fileless manner to avoid detection.
The analysis indicates that the threat actor assigns unique mining workers to each victim, with three distinct wallets identified, suggesting over 1,500 affected victims. Nearly 90% of cloud environments host PostgreSQL instances, with about one-third publicly exposed. The threat actor scans for poorly configured services, exploiting default weak credentials to gain access and execute malicious payloads.
Upon successful login, the actor performs reconnaissance and executes a dropper script to deploy an obfuscated Golang binary, which contains an encrypted configuration with critical system information. The malware establishes persistence by creating cron jobs and modifying access controls. The actor also creates high-privilege roles for continued access and weakens the default admin user.
The analysis identified three wallets associated with the campaign, with each wallet having around 550 workers. The Wiz Dynamic Scanner can identify exposed PostgreSQL services, while the Wiz Runtime Sensor detects malicious activities associated with this threat. The report includes specific wallet addresses, a file hosting service, and file hashes related to the malware. Techniques used by the malware align with various MITRE ATT&CK® techniques, including credential access, defense evasion, and resource hijacking.
Minecraft has 204.33 million monthly users across various platforms. Llamas can serve as mobile storage with an inventory of 3 to 15 slots. The breaking pattern on blocks indicates orientation, appearing on the northern side. Lava is a superior fuel source in furnaces, outlasting wood and coal. Diamonds can now be found between levels 15 and 63, with deeper levels offering better chances. Players can change a blue sheep to red by bringing it near an Evoker. Torches can break surrounding sand and gravel blocks. Mushroom biomes do not spawn hostile mobs at night. Wearing a carved pumpkin prevents direct eye contact with Endermen. Iron Golems can be created for defense using iron blocks and a carved pumpkin. Cats deter Creepers. Doors placed underwater create air bubbles. Snowballs can defeat Blazes from a distance. Illuminating mob spawners with torches can stop enemy spawns. The Swift Sneak enchantment allows faster sneaking. Mooshrooms can be milked for mushroom stew. Dogs' collars can be dyed for identification. Covering pixel art with glass panes preserves designs. Zombies are attracted to turtle eggs.