11 Mar 2026

feedSlashdot

Researchers Discover 14,000 Routers Wrangled Into Never-Before-Seen Botnet

An anonymous reader quotes a report from Ars Technica: Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices -- primarily made by Asus -- that have been conscripted into a proxy network that anonymously carries traffic used for cybercrime. The malware -- dubbed KadNap -- takes hold by exploiting vulnerabilities that have gone unpatched by their owners, Chris Formosa, a researcher at security firm Lumen's Black Lotus Labs, told Ars. The high concentration of Asus routers is likely due to botnet operators acquiring a reliable exploit for vulnerabilities affecting those models. He said it's unlikely that the attackers are using any zero-days in the operation. The number of infected routers averages about 14,000 per day, up from 10,000 last August, when Black Lotus discovered the botnet. Compromised devices are overwhelmingly located in the US, with smaller populations in Taiwan, Hong Kong, and Russia. One of the most salient features of KadNap is a sophisticated peer-to-peer design based on Kademlia (PDF), a network structure that uses distributed hash tables to conceal the IP addresses of command-and-control servers. The design makes the botnet resistant to detection and takedowns through traditional methods. [...] Despite the resistance to normal takedown methods, Black Lotus says it has devised a means to block all network traffic to or from the control infrastructure." The lab is also distributing the indicators of compromise to public feeds to help other parties block access. [...] People who are concerned their devices are infected can check this page for IP addresses and a file hash found in device logs. To disinfect devices, they must be factory reset. Because KadNap stores a shell script that runs when an infected router reboots, simply restarting the device will result in it being compromised all over again. Device owners should also ensure all available firmware updates have been installed, that administrative passwords are strong, and that remote access has been disabled unless needed.

Read more of this story at Slashdot.

11 Mar 2026 11:00pm GMT

feedArs Technica

Report: RFK Jr.’s anti-vaccine agenda curbed as GOP realizes it's unpopular

Meanwhile, Kennedy's allies want all vaccine recommendations eliminated.

11 Mar 2026 10:19pm GMT

FCC chair blasts Amazon after it criticizes SpaceX megaconstellation

Will it really take "centuries" for SpaceX to deploy its megaconstellation?

11 Mar 2026 10:04pm GMT

feedSlashdot

Microsoft's 'Xbox Mode' Is Coming To Every Windows 11 PC

In April, Microsoft will be rolling out a full-screen "Xbox mode" to all Windows 11 PCs, including laptops, desktops, and tablets. The move follows last week's confirmation of its next-generation Xbox console, known internally as Project Helix, which will be capable of running both Xbox titles and PC games. The Verge reports: Technically, you've been able to try the Xbox Full Screen Experience (FSE) in preview since November 2025, if you were part of both the Windows Insider and Xbox Insider Programs. But it needed work, as well as a better name. When Microsoft originally shipped it on the Asus-designed Xbox Ally and Xbox Ally X handhelds, we were clear: it didn't meaningfully turn a PC experience into an easy-to-use Xbox one. But if Microsoft is putting its full weight behind PC as the future of Xbox gaming, perhaps that will change change.

Read more of this story at Slashdot.

11 Mar 2026 10:00pm GMT

feedArs Technica

14,000 routers are infected by malware that's highly resistant to takedowns

Most of the devices are made by Asus and are located in the US.

11 Mar 2026 9:27pm GMT

feedSlashdot

Grammarly Disables Tool Offering Generative-AI Feedback Credited To Real Writers

Grammarly has disabled its Expert Review feature after backlash from writers whose names were used to present AI-generated feedback without their permission. Superhuman (formerly Grammarly) CEO Shishir Mehrotra wrote in a LinkedIn post that the company will disable Expert Review while they "reimagine" the feature: Back in August, we launched a Grammarly agent called Expert Review. The agent draws on publicly available information from third-party LLMs to surface writing suggestions inspired by the published work of influential voices. Over the past week, we received valid critical feedback from experts who are concerned that the agent misrepresented their voices. This kind of scrutiny improves our products, and we take it seriously. As context, the agent was designed to help users discover influential perspectives and scholarship relevant to their work, while also providing meaningful ways for experts to build deeper relationships with their fans. We hear the feedback and recognize we fell short on this. I want to apologize and acknowledge that we'll rethink our approach going forward. After careful consideration, we have decided to disable Expert Review while we reimagine the feature to make it more useful for users, while giving experts real control over how they want to be represented -- or not represented at all. We deeply believe in our mission to solve the "last mile of AI" by bringing AI directly to where people work, and we see this as a significant opportunity for experts. For millions of users, Grammarly is a trusted writing sidekick -- ever-present in every application, ready to help. We're opening up this platform so anyone can build agents that work like Grammarly -- expanding from one sidekick to a whole team. Imagine your professor sharpening your essay, your sales leader reshaping a customer pitch, a thoughtful critic challenging your arguments, or a leading expert elevating your proposal. For experts, this is a chance to build that same ubiquitous bond with users, much like Grammarly has. But in this world, experts choose to participate, shape how their knowledge is represented, and control their business model. That future excites me, and I hope to build it with experts who want to develop it alongside us.

Read more of this story at Slashdot.

11 Mar 2026 9:25pm GMT

30 Jan 2026

feedPlanet Arch Linux

How to review an AUR package

On Friday, July 18th, 2025, the Arch Linux team was notified that three AUR packages had been uploaded that contained malware. A few maintainers including myself took care of deleting these packages, removing all traces of the malicious code, and protecting against future malicious uploads.

30 Jan 2026 12:00am GMT

19 Jan 2026

feedPlanet Arch Linux

Personal infrastructure setup 2026

While starting this post I realized I have been maintaining personal infrastructure for over a decade! Most of the things I've self-hosted is been for personal uses. Email server, a blog, an IRC server, image hosting, RSS reader and so on. All of these things has all been a bit all over the place and never properly streamlined. Some has been in containers, some has just been flat files with a nginx service in front and some has been a random installed Debian package from somewhere I just forgot.

19 Jan 2026 12:00am GMT

11 Jan 2026

feedPlanet Arch Linux

Verify Arch Linux artifacts using VOA/OpenPGP

In the recent blog post on the work funded by Sovereign Tech Fund (STF), we provided an overview of the "File Hierarchy for the Verification of OS Artifacts" (VOA) and the voa project as its reference implementation. VOA is a generic framework for verifying any kind of distribution artifacts (i.e. files) using arbitrary signature verification technologies. The voa CLI ⌨️ The voa project offers the voa(1) command line interface (CLI) which makes use of the voa(5) configuration file format for technology backends. It is recommended to read the respective man pages to get …

11 Jan 2026 12:00am GMT