7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine

7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine

Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of Russia’s ongoing invasion of Ukraine. The vulnerability allowed a Russian cybercrime group to override a Windows protection designed to limit the execution of files downloaded from the Internet. The defense is commonly known as MotW,…

Path of Exile 2 Damage Conversion, explained – Destructoid

Path of Exile 2 Damage Conversion, explained – Destructoid

In Path of Exile 2, damage conversion is a crucial mechanic that allows players to modify their skills’ damage types, enhancing their effectiveness in different builds. With multiple damage types in the game, understanding how to convert one into another can lead to powerful build optimizations, which you may find quite useful. How Path of…

Let’s Encrypt is ending expiration notice emails—for some very good reasons

Let’s Encrypt is ending expiration notice emails—for some very good reasons

Let’s Encrypt has been providing free “wildcard” certificates for websites for nearly seven years, enabling HTTPS connections for millions of domains and doing the whole Internet a real solid. Now the nonprofit is ending a useful service, but in an exceedingly rare happenstance, it’s probably a good thing for everyone. Starting June 4, 2025, Let’s…

China targets Apple’s business practices; maybe the company should adapt

China targets Apple’s business practices; maybe the company should adapt

They say great art reflects its time. When it comes to Apple’s business, just as the iMac and iPod matched the zeitgeist, the company must now develop its business to meet the complex demands of a divided, post-globalist world struggling with economic and climate insecurity. Apple should bear that in mind as it faces its…

Google opens door to AI-powered weapons, surveillance

Google opens door to AI-powered weapons, surveillance

The company that once opened its code of conduct with the words “Don’t be evil” is now opening the door to assisting in the creation of AI-powered weapons and surveillance systems. Changes in the company’s statement of AI principles introduced in a blog post on Tuesday remove the company’s earlier prohibition on engaging in such…

Go Module Mirror served backdoor to devs for 3+ years

Go Module Mirror served backdoor to devs for 3+ years

A mirror proxy Google runs on behalf of developers of the Go programming language pushed a backdoored package for more than three years until Monday, after researchers who spotted the malicious code petitioned for it to be taken down twice. The service, known as the Go Module Mirror, caches open source packages available on GitHub…

As Internet enshittification marches on, here are some of the worst offenders

As Internet enshittification marches on, here are some of the worst offenders

Two years ago, a Canadian writer named Cory Doctorow coined the phrase “enshittification” to describe the decay of online platforms. The word immediately set the Internet ablaze, as it captured the growing malaise regarding how almost everything about the web seemed to be getting worse. “It’s my theory explaining how the Internet was colonized by…

Many Americans still don’t understand how easily IoT devices can get bricked

Many Americans still don’t understand how easily IoT devices can get bricked

“Ironically, ‘it was acting strange,’ is often the only indication a consumer may have that their device has been taken over by a malicious actor. They may see their overall network performance slow down, the device lag, or the device turning off and on at odd times,” the report says. Consumer Reports also found a…