today's leftovers
-
This Steam Deck dock has a thermoelectric cooler
If you're lucky enough to track down a Steam Deck, chances are you've already experienced the sweaty palm syndrome with this handheld console — just as our very own Jess Conditt did in her review. Worse yet, the machine is prone to throttling or even crashing due to overheating, to the point where modders came up with their own creativesolutions. For the rest of us who don't want to void the warranty, though, Hong Kong-based Unitek is now offering the Cooler Dock Pro for Steam Deck.
-
Linux Weekly Roundup #209
Welcome to this week's Linux Weekly Roundup.
We had a full week in the world of Linux releases with, Bodhi Linux 7.0.0 Alpha, Bluestar Linux 6.0.7, deepin 23 alpha, and Mageia 9 alpha1.
-
iTWire - More Medibank members' data leaked ahead of shareholders' meeting [Ed: Microsoft Windows TCO]
The attacker(s) who launched a ransomware attack on medical insurer Medibank Group has released some additional data from among the tranche which was stolen. Ransomware generally attacks only systems running Microsoft's Windows operating system.
On Monday morning AEDT, the attacker(s) updated a post on the dark web, specifying that a file containing data about the mental health of some members had joined the others already released.
The attacker(s) said more data would be released by Friday and appear to be waiting to see what happens at the Wednesday meeting of Medibank shareholders before acting.
"There is some more records for everybody to know," the updated portion of the post said. "We'll announce, that next portion of data we'll publish at Friday, bypassing this week completely in a hope something meaningful happened on Wednesday."
-
Worok Hackers Abuse Dropbox API to Exfiltrate Data via Backdoor Hidden in Images [Ed: Microsoft Windows TCO]
The Slovak cybersecurity company also documented Worok's compromise sequence, which makes use of a C++-based loader called CLRLoad to pave the way for an unknown PowerShell script embedded within PNG images, a technique known as steganography.
That said, the initial attack vector remains unknown as yet, although certain intrusions have entailed the use of ProxyShell vulnerabilities in Microsoft Exchange Server to deploy the malware.