Tech
LockBit 5.0 expands targeting amid ransomware escalation | Computer Weekly
The individuals behind a new version of the LockBit ransomware dramatically expanded their targeting during September, amid a wider rise in ransomware attacks, which were up by over a quarter when compared with August, according to security industry data.
NCC Group’s latest monthly Threat pulse report reveals that attack volumes have risen for the first time in six months, up 28% to 421 observed and reported incidents, and while this is not an all-time high, the firm’s threat team said it may signal a renewed escalation as the festive season approaches.
“The rise in attacks in September could be a sign that the decline we’ve seen recently is now over,” said NCC threat intelligence head Matt Hull.
“As we approach the busy season for attackers – with Black Friday and Christmas fast approaching – organisations can’t be complacent. Recent attacks on the transport and retail sector, specifically, have shown just how severe the disruption can be.
“Organisations need to ensure they have robust third-party risk management, rapid incident response and proactive security strategies,” he said.
But while NCC’s report says it is the Qilin, Akira and INC Ransom operations that currently dominate the landscape, intelligence from Check Point reveals that the at-large operators of LockBit are attacking organisations across the Americas, Asia and Europe with a LockBit 5.0 Chuongdong variant, and racked up at least a dozen victims in September.
Once the most dominant ransomware as a service (RaaS) crews in NCC’s datasets, LockBit was famously laid low by the UK’s National Crime Agency in a coordinated, multinational sting dubbed Operation Cronos, which unfolded just over 18 months ago in February 2024. The gang had been responsible for up to a third of all data-leak site victim postings at that time.
However, despite the highly effective takedown, which caused major disruption in the cyber criminal underground, LockBit’s administrator, LockBitSupp – named publicly as Russian national Dmitry Khoroshev – has continued to taunt his pursuers, and in August, used the RAMP forum to proclaim the group was getting back to work.
According to Check Point’s intel team, LockBitSupp has not only gained renewed traction on RAMP, but has also been attempting to mend his ravaged reputation by trying to get reinstated on the rival XSS forum, from which he had been banned. This attempt failed, which Check Point said may reflect its denizens’ increasing wariness about the scope of law enforcement penetration of their world.
According to Check Point, LockBit 5.0 introduces four core updates to enhance the locker’s efficiency, security and stealth. It now boasts multi-platform support with builds targeting Windows, Linux and ESXi systems, enhanced anti-analysis features to make investigators’ jobs harder, faster encryption, and randomised 16-character file extensions to evade detection.
Meanwhile, its affiliate control panel provides RaaS users an improved management interface, and joining the partner programme also requires a $500 (£375) down payment in Bitcoin.
“LockBit’s reemergence underscores the group’s resilience and sophistication,” said Check Point’s team. “Despite high-profile law enforcement actions and public setbacks, the group has once again managed to restore its operations, recruit affiliates and resume extortion.
“With its mature RaaS model, cross-platform reach and proven reputation among cyber criminals, LockBit’s return represents a renewed threat to organisations across all sectors. September’s wave of infections likely marks only the beginning of a larger campaign – and October’s postings may confirm the group’s full operational recovery.”
Tech
The hidden military pressures behind the new push for small nuclear reactors
Donald Trump’s recent visit to the UK saw a so-called “landmark partnership” on nuclear energy. London and Washington announced plans to build 20 small modular reactors and also develop microreactor technology—despite the fact no such plants have yet been built commercially anywhere in the world.
The UK prime minister, Keir Starmer, promised these plans will deliver a “golden age” of nuclear energy that will also “drive down bills.” Yet the history of nuclear power has been decades of overhype, soaring costs and constant delays. Around the world, the trends point the wrong way.
So why the renewed excitement about going nuclear? The real reasons have less to do with energy security, or climate change—and far more to do with military power.
At first sight, the case may seem obvious. Nuclear supporters frame small modular reactors, or SMRs, as vital for cutting emissions, meeting rising demand for electricity from cars and data centers. With large nuclear plants now prohibitively expensive, smaller reactors are billed as an exciting new alternative.
But these days even the most optimistic industry analyses concede that nuclear—even SMRs—is unlikely to compete with renewables. One analysis in New Civil Engineer published earlier this year concluded that SMRs are “the most expensive source per kilowatt of electricity generated when compared with natural gas, traditional nuclear and renewables.”
Independent assessments—for instance by the formerly pro-nuclear Royal Society—find that 100% renewable systems outperform any energy system, including nuclear on cost, flexibility and security. This helps explain why worldwide statistical analysis shows nuclear power is not generally linked to carbon emissions reductions, while renewables are.
Partly, the enthusiasm for SMRs can be explained by the loudest institutional voices tending to have formal pro-nuclear remits or interests: they include the industry itself and its suppliers, nuclear agencies, and governments with entrenched military nuclear programs. For these interests, the only question is which kinds of nuclear reactors to develop, and how fast. They don’t wonder if we should build reactors in the first place: the need is seen as self-evident.
At least big nuclear reactors have benefited from economies of scale and decades of technological optimization. Many SMR designs are just “powerpoint reactors,” existing only in slides and feasibility studies. Claims these unbuilt designs “will cost less” are speculative at best.
Investment markets know this. While financiers see SMR hype as a way to profit from billions in government subsidies, their own analyses are less enthusiastic about the technology itself.
So why then, all this attention to nuclear in general and smaller reactors in particular? There is clearly more to this than meets the eye.
The hidden link
The neglected factor is the military dependence on civil nuclear industries. Maintaining a nuclear-armed navy or weapons program requires constant access to generic reactor technologies, skilled workers and special materials. Without a civilian nuclear industry, military nuclear capabilities are significantly more challenging and costly to sustain.
Nuclear submarines are especially important here as they would very likely require national reactor industries and their supply chains even if there was no civil nuclear power. Barely affordable even vessel by vessel, nuclear submarines become even more expensive when the costs of this “submarine industrial base” is factored in.
Rolls-Royce is an important link here, as it already builds the UK’s submarine reactors and is set to build the newly announced civil SMRs. The company said openly in 2017 that a civil SMR program would “relieve the Ministry of Defense of the burden of developing and retaining skills and capability.”
Here, as emphasized by Nuclear Intelligence Weekly in 2020, the Rolls-Royce SMR program has an important “symbiosis with UK military needs.” It is this dependency that allows military costs (in the words of a former executive with submarine builders BAE Systems), to be “masked” behind civilian programs.
By funding civil nuclear projects, taxpayers and consumers cover military uses of nuclear power in subsidies and higher bills—without the added spending appearing in defense budgets.
When the UK government funded us to investigate the value of this transfer, we put it at around £5 billion per year in the UK alone. These costs are masked from public view, covered by revenues from higher electricity prices and the budgets of supposedly civilian government agencies.
This is not a conspiracy but a kind of political gravitational field. Once governments see nuclear weapons as a marker of global status, the funding and political support becomes self-perpetuating.
The result is a strange sort of circularity: nuclear power is justified by energy security and cost arguments that don’t stand up, but is in reality sustained for strategic reasons that remain unacknowledged.
A global pattern
The UK is not unique, though other nuclear powers are much more candid. US energy secretary Chris Wright described the US-UK nuclear deal as important for “securing nuclear supply chains across the Atlantic.” Around US$25 billion a year (£18.7 billion) flows from civil to military nuclear activity in the US.
Russia and China are both quite open about their own inseparable civil-military links. French president Emmanuel Macron put it clearly: “Without civilian nuclear, no military nuclear, without military nuclear, no civilian nuclear.”
Across these states, military nuclear capabilities are seen as a way to stay at the world’s “top table”. An end to their civilian program would threaten not just jobs and energy, but their great power status.
The next frontier
Beyond submarines, the development of “microreactors” is opening up new military uses for nuclear power. Microreactors are even smaller and more experimental than SMRs. Though they can make profits by milking military procurement budgets, they make no sense from a commercial energy standpoint.
However, microreactors are seen as essential in US plans for battlefield power, space infrastructure and new “high energy” anti-drone and missile weaponry. Prepare to see them become ever more prominent in “civil” debates—precisely because they serve military goals.
Whatever view is taken of these military developments, it makes no sense to pretend they are unrelated to the civil nuclear sector. The real drivers of the recent US–UK nuclear agreement lie in military projection of force, not civilian power production. Yet this remains absent from most discussions of energy policy.
It is a crucial matter of democracy that there be honesty about what is really going on.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Citation:
The hidden military pressures behind the new push for small nuclear reactors (2025, October 27)
retrieved 27 October 2025
from https://techxplore.com/news/2025-10-hidden-military-pressures-small-nuclear.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
This Gas Pizza Oven Was My Favorite of the Summer. It’s Half Off Today
Cookware brand All-Clad surprised me this year. This summer, it breezed into the backyard pizza world with a debut pizza oven that I like as well as any oven I’ve tested this year. Right now, that excellent All-Clad gas-powered pizza oven is a whopping $800 off the suggested retail price, only at the All-Clad site.
What’s so good about the oven? The All-Clad gas-powered pizza oven heats up fast, and crests 900 degrees Fahrenheit after 20 minutes. It’s insulated well, comes with a built-in thermometer that’s pretty accurate, and it’s made with the sturdy stainless steel All-Clad is known for.
But especially, All-Clad’s pizza oven comes with a rotating pizza stone that removes a lot of the fuss and bother of cooking pizza evenly. Instead of having to hover nervously over each pie with a pizza peel, in order to turn the pizza before the backside burns, all I have to do is launch the pizza in the middle of the pizza stone.
The oven does the rest, spinning the pizza at a rate of one revolution every 40 seconds or so. It’s not foolproof—you have to launch the pizza in the center of the pizza stone to get an even cook—but it is a game-changer. This is true especially if I’m making multiple pizzas in a go-round. It means I’m able to prep the next pie while the current one is still spinning and baking.
Photograph: Matthew Korfhage
Tech
How blind and low-vision users manage their passwords
Passwords remain the go-to authentication tool in everyday life, says CISPA researcher Alexander Ponticello. At the same time, passwords are often a security weak spot: too short, too simple, and reused far too often. Blind and low-vision people face an additional hurdle: Systems need to work together sensibly for authentication processes to run smoothly.
A new qualitative study with 33 U.S. participants shows how this group manages passwords—and where improvements are needed. Ponticello presented his paper “How Blind and Low-Vision Users Manage Their Passwords” at the IT security conference CCS 2025 in Taipei.
Passwords are still the default tool for online security—but they’re also a constant source of problems. Many people today have hundreds of accounts and for which they must manage passwords of varying complexity. Password managers can help: They create strong passwords, store them, and autofill login credentials—problem solved, right?
Unfortunately, this isn’t the case, because password managers are far from being used consistently by everyone. Previous studies show that the main reasons are the fear of complicated setup, lack of trust, and lack of knowledge about existing tools. Older user groups also tend to be generally hesitant about digital tools. Ponticello’s new study expands research on password management and password manager use to a group that has received little attention so far: blind and low-vision users.
Widespread use of password managers in the community
Password managers can be an important tool for blind and low-vision people to manage their login credentials. “In fact, all 33 respondents in our study used password managers—sometimes consciously, sometimes unconsciously, simply because their browser or device offered to manage them,” says Ponticello. These included third-party programs such as LastPass or 1Password, as well as browser-integrated password managers like the one built into Google Chrome and system-integrated password managers such as Apple Passwords.
“Those who intentionally chose a password manager usually relied on recommendations from acquaintances or advice in relevant forums. Accessibility played at least as important a role as system security,” Ponticello explains.
Real accessibility only if systems work together
“Depending on the degree of impairment, blind and low-vision users rely primarily on screen readers to use their devices in everyday life. Our first intuition was that it must be a big problem that screen readers read passwords aloud in public. However, this proved to be less of a problem, as almost all study participants told us that they use headphones,” says the researcher.
In addition, the speech output usually runs so fast that bystanders can hardly understand anything. However, for blind and low-vision people to use password managers smoothly, screen readers, password managers, apps, and websites must work together accordingly.
“If one of these parties fails, the whole system breaks down,” says Ponticello.
Unfortunately, there are still programs where accessibility seems to be an afterthought. At the latest when updates need to be installed, some users have experienced that programs no longer work properly. The result: Users feel they cannot reliably depend on the systems.
Security versus everyday life: Compromises are common
Many of the users surveyed therefore combine password managers with backup strategies. Some even keep password lists in Braille—safely stored, but still analog.
“That’s not inherently insecure,” the researcher explains. “But you have to be aware of who might have access to that list.” Other study participants said they intentionally create simpler passwords so they can enter them without a tool if necessary.
“That contradicts security best practices,” he says, “but above all it shows that systems need to become more reliable.”
What (still) needs to be done—and how to do it better
According to Ponticello, one problem is how password managers generate passwords: Random passwords with special characters are often hard for blind people to find on the keyboard. A better alternative would be passphrases that string whole words together.
“Unfortunately, screen readers then read those passwords letter by letter instead of recognizing the words. The integration hasn’t been thought through to the end,” the researcher says. App stores could also help by clearly labeling a tool’s accessibility and introducing special review categories for affected users where blind and low-vision people can get information directly.
“But the most important thing is: We need accessibility by design—correct labels for buttons, a sensible focus order, and consistent screen reader flows.”
Outlook
Conducting a similar study with German users could be Ponticello’s next step. So far, legislation in the U.S. has been stricter than in the EU. Laws such as the Americans with Disabilities Act have long enforced strict accessibility standards for websites and digital services there. The EU is following suit with the European Accessibility Act (EAA).
In Germany, this led to the Accessibility Strengthening Act, which has been required to be applied since June 28, 2025. “I’m curious to see what effects this will have in the future,” says Ponticello.
Ponticello’s study shows: Accessibility is not a luxury but a basic prerequisite for digital security. Many hurdles—from lack of labeling to fragile integrations—can be solved if platforms, developers, and lawmakers take them seriously.
“We need to adapt the systems, not the people,” the researcher says. “Only then can passwords be used securely by everyone.”
More information:
How Blind and Low-Vision Users Manage Their Passwords. cispa.de/en/research/publicati … nage-their-passwords
Provided by
CISPA Helmholtz Center for Information Security
Citation:
How blind and low-vision users manage their passwords (2025, October 27)
retrieved 27 October 2025
from https://techxplore.com/news/2025-10-vision-users-passwords.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
-
Tech1 week agoHow to Protect Yourself Against Getting Locked Out of Your Cloud Accounts
-
Tech1 week agoThe DeltaForce 65 Brings Das Keyboard Into the Modern Keyboard Era—for Better or Worse
-
Business1 week agoGovernment vows to create 400,000 jobs in clean energy sector
-
Business1 week agoDiwali 2025: Gold & silver likely to consolidate next week; Here’s what analysts said – The Times of India
-
Tech1 week agoGemini in Google Home Keeps Mistaking My Dog for a Cat
-
Fashion1 week agoEgypt’s apparel exports rise 25% in H1, trims US market reliance
-
Fashion1 week agoReal UK GDP grows 0.3% QoQ in quarter to Aug 2025: ONS
-
Business1 week agoInflation expected to jump to highest since January last year



