The divide between operational and analytical databases is diminishing, as evidenced by Databricks integrating Spotify's Backstage with its Lakebase, transitioning from PostgreSQL to a unified data platform. Lakebase now offers a serverless PostgreSQL interface within Databricks, allowing Backstage to operate without awareness of the underlying changes. The integration involved updating configurations and addressing authentication challenges using OAuth JWTs.
The integration transforms the database development lifecycle by enabling near-instant database branching through Lakebase's copy-on-write architecture, allowing developers to focus on testing changes rather than safety. Branching creates a pointer to existing data, making the operation instantaneous. Point-in-Time Recovery (PITR) allows for quick restoration of data, demonstrated by a recovery process that took less than four seconds.
The goal is to integrate database branching into developer workflows seamlessly, making it automatic. This change could enhance developer productivity by allowing live data testing from the start, eliminating the need for mock objects, and resolving common issues related to staging environments. The traditional constraints of slow and costly database copies will become obsolete, prompting teams to reconsider how much time they spend on workarounds for now-nonexistent constraints.
Minecraft players are being targeted by a deceptive hacking tool called “Slinky,” which is actually an infostealer known as LofyStealer linked to the Brazilian cybercrime group LofyGang. The malware uses a Node.js-based loader and a C++ payload to extract sensitive browser data, disguising itself as a Minecraft hack. It primarily targets younger players who may unknowingly execute it. The malware operates through a two-stage architecture, with a 53.5 MB loader binary that injects a smaller 1.4 MB payload into browser processes, bypassing detection methods. It collects sensitive information such as cookies, passwords, and credit card details, compressing and encoding the data for exfiltration. The command-and-control (C2) infrastructure is hosted in Brazil, and the malware's design reflects advanced compilation techniques. The campaign is attributed to LofyGang, which has evolved into a more professional entity, posing severe risks to players who download cheats and cracked tools. Indicators of compromise include a specific C2 IP address and associated endpoints.
A new infostealer malware called LofyStealer is targeting the gaming community, particularly Minecraft players, by disguising itself as a cheat tool named “Slinky.” It employs a two-stage attack to extract sensitive information from eight major web browsers, including Chrome and Firefox, while evading detection by security software. The malware siphons off cookies, saved passwords, payment card information, and session tokens. Researchers at Zenox.ai identified LofyStealer, linking it to the Brazilian cybercrime group LofyGang, which has been active since October 2022. The malware uses social engineering tactics to appear legitimate and operates as a Malware-as-a-Service platform, offering both Free and Premium tiers to buyers. Its technical sophistication is evident in its method of in-memory browser injection, which allows it to bypass security defenses. The stolen data is compressed and sent to a command-and-control server. Users are advised to avoid downloading unofficial game mods and enable multi-factor authentication to reduce the risk of credential theft. Security teams should monitor for specific behavioral indicators related to the malware's operations.
Nothing Warp is an app that enables seamless file transfers between any Android device and a computer, compatible with any Android smartphone and computers with a Chromium-based browser. It connects an Android device to a browser extension on a computer using the internet for file sharing. Users can transfer files by tapping the share button on their device and selecting Nothing Warp, or by clicking the Upload button in the browser extension to send files from the computer to the Android device. Currently in Beta testing, Nothing Warp requires a Google account for operation and does not store files, ensuring privacy. Users must install both the mobile app and the browser extension, sign in with the same Google account, and grant necessary permissions for Google Drive access to use the service.
Windows 10 support ended in October 2024, leaving systems vulnerable to security threats. A lifetime license for Windows 11 Pro is currently available for .97, regularly priced at 9, with the offer expiring on May 3 at 11:59 PM. Windows 11 Pro includes features such as Microsoft Copilot, TPM 2.0, BitLocker encryption, Smart App Control, biometric recognition, Snap Layouts, improved memory management, DirectX 12 Ultimate, Windows Sandbox, and Hyper-V.
Morpheus is a new spyware identified by the nonprofit organization Osservatorio Nessuno, which spreads through counterfeit Android applications that appear as legitimate updates. Attackers use SMS messages to direct victims to a fraudulent website mimicking an Internet Service Provider (ISP). The spyware installs a dropper app that deploys a concealed payload, which disguises itself as legitimate system components and manipulates users into granting dangerous permissions, including Accessibility access.
Once granted, Morpheus initiates a Permission Workflow that creates a fake update overlay, disabling the touchscreen to prevent user interaction. It ensures persistence by restarting after device reboots and can request device administrator privileges. The spyware exploits overlay windows and Accessibility features to gain control of the device and bypass security measures, including disabling antivirus solutions without requiring root access.
Analysis suggests Morpheus has Italian origins, with connections to an Italian firm, IPS Intelligence, known for lawful interception technologies. The spyware is capable of invasive actions such as recording audio and video, linking to WhatsApp, and compromising device security. The report highlights a network of dubious companies and shared contacts linked to the spyware's distribution.
Future and its syndication partners may earn a commission when users buy through links in their articles. Windows 11 users often seek efficient application management, leading to the use of the Windows Package Manager (winget). The command "winget upgrade --all" requires user initiative, while the Microsoft Store only updates Store apps. This gap led to the development of Winget-AutoUpdate (WAU), which simplifies the update process. Initially designed for users familiar with scripts, WAU now includes a graphical user interface (GUI) that makes it more accessible. The GUI allows users to toggle automatic updates, set schedules, and manage allowlists and blocklists. Users can create "excludedapps.txt" and "includedapps.txt" files for managing updates. WAU is particularly useful for those who frequently install applications via winget and want to automate updates. Once configured, WAU runs in the background, providing timely notifications without manual intervention. It is a free solution that addresses update management challenges for winget users on Windows 11, transforming manual updates into an automated process.
Developer Marumittu Games and publisher Annapurna Interactive will launch the adventure puzzle game D-topia on July 14, 2026, for PC and consoles. Players will take on the role of a Facilitator in a world governed by artificial intelligence, tasked with maintaining daily life and troubleshooting system failures. The game features gentle-paced exploration, intricate logic puzzles, and interactions with residents, allowing players to shape their futures. Choices made by players will impact the community's happiness and address both mechanical and emotional needs. D-topia explores themes of happiness and fulfillment in an AI-managed society.
McAfee researchers discovered a complex Android rootkit campaign, dubbed Operation NoVoice, that infiltrated 50 applications on Google Play, exploiting vulnerabilities in the kernel that had been patched but not uninstalled. The malware was resilient enough to survive factory resets and was concealed within seemingly benign apps, which collectively garnered 2.3 million downloads. The malicious payload was hidden in the com.facebook.utils package and used steganography to embed an encrypted payload within a PNG image. The malware conducted multiple checks to avoid detection and established contact with a command-and-control server, polling for exploit packages every 60 seconds. It utilized 22 distinct exploits, including vulnerabilities that had received patches between 2016 and 2021. The malware disabled SELinux enforcement and installed a persistent rootkit that could survive factory resets. Google confirmed the removal of the infected apps but noted that users who had already downloaded them remained at risk, especially if their devices were running unpatched Android versions. McAfee advised affected users to treat their devices as compromised and consider professional inspection or hardware-level storage wiping for remediation.