Blog

  • Can fitness apps and wearables make children healthier? This study says yes

    Can fitness apps and wearables make children healthier? This study says yes

    A large umbrella review finds that app- and wearable-based interventions can spark small yet meaningful improvements in kids’ activity, diet, and weight, offering scalable digital pathways to healthier habits.

    Review: Lifestyle…

    Continue Reading

  • Cohen Media Group Picks Up Stéphane Demoustier’s ‘The Great Arch’

    Cohen Media Group Picks Up Stéphane Demoustier’s ‘The Great Arch’

    EXCLUSIVE: Cohen Media Group has taken U.S. domestic distribution rights to Stéphane Demoustier‘s The Great Arch.

    The historical drama is based on the true story of the Great Arch of La Défense, one of the most ambitious…

    Continue Reading

  • Venture Global ready to introduce natural gas into final part of Plaquemines LNG plant, filing shows – Reuters

    1. Venture Global ready to introduce natural gas into final part of Plaquemines LNG plant, filing shows  Reuters
    2. LNG Producer Faces Lawsuits Over Alleged Contract Breaches  Crude Oil Prices Today | OilPrice.com
    3. Fresh fight brewing between Venture Global and long-term customers  Upstream Online
    4. Pressure Mounts Against Venture Global to Start Commercial Service on Time at Plaquemines LNG  Natural Gas Intelligence
    5. Venture Global is facing new LNG contract scrutiny in Louisiana  10/12 Industry Report

    Continue Reading

  • Buparlisib/Chemo Combo Misses OS Mark in PD-1–Treated Recurrent HNC

    Buparlisib/Chemo Combo Misses OS Mark in PD-1–Treated Recurrent HNC

    The combination of buparlisib and paclitaxel did not show an improvement in overall survival (OS) compared with paclitaxel alone in patients with PD-1/PD-L1–pretreated recurrent/metastatic head and neck squamous cell carcinoma (HNSCC),…

    Continue Reading

  • DuPont Schedules Third Quarter 2025 Earnings Conference Call

    WILMINGTON, Del., Oct. 20, 2025 – DuPont (NYSE: DD) will release its third quarter financial results at 6:00 a.m. ET on Thursday, November 6, 2025. In addition, the company will host a conference call at 8:00 a.m. ET that day.

    The event will be webcast live and can be accessed on DuPont’s Investors Relations webpage. A replay, along with the earnings release and supporting materials, will also be posted to the website.       

    The dial-in number for the conference call is 888-440-4172 toll-free within the U.S. or +1-646-960-0673. The conference ID is 5994046.

    DuPont will reflect the previously announced divestiture of its Aramids business as discontinued operations beginning with third quarter 2025 reporting and will reflect its electronics business, Qnity, as discontinued operations beginning in fourth quarter 2025 reporting following the intended separation of Qnity on November 1, 2025.

    Qnity expects to provide a business update on a separate conference call to be announced at a later date.

     

    About DuPont

    DuPont (NYSE: DD) is a global innovation leader with technology-based materials and solutions that help transform industries and everyday life. Our employees apply diverse science and expertise to help customers advance their best ideas and deliver essential innovations in key markets including electronics, transportation, construction, water, healthcare and worker safety. More information about the company, its businesses and solutions can be found at www.dupont.com. Investors can access information included on the Investor Relations section of the website at investors.dupont.com.

    Continue Reading

  • Olympic Channel’s ‘Personal Best’ and ‘I’m Carl Lewis’ shine at SPORTEL Awards

    Olympic Channel’s ‘Personal Best’ and ‘I’m Carl Lewis’ shine at SPORTEL Awards

    Olympic Channel films ‘Personal Best’ and ‘I’m Carl Lewis’ were honoured with podiums d’or (golden podiums) at the prestigious SPORTEL Awards on Monday (October 20).

    ‘Personal Best’ received the golden podium for Best Thematic…

    Continue Reading

  • The Murky Underworld Where the Louvre Thieves Hope to Hawk Their Stolen Jewels – The Wall Street Journal

    1. The Murky Underworld Where the Louvre Thieves Hope to Hawk Their Stolen Jewels  The Wall Street Journal
    2. Everything we know about the Louvre jewellery heist  BBC
    3. Thieves steal crown jewels in 4 minutes from Louvre Museum  AP News
    4. Historic jewels…

    Continue Reading

  • Want To Know the Future of the Art World? This Book Has You Covered

    Want To Know the Future of the Art World? This Book Has You Covered

    When the pandemic hit, the author and cultural consultant András Szántó didn’t let the crisis go to waste. He picked up the phone, calling museum directors for a series of interviews that formed his 2021 book The Future of the Museum. That…

    Continue Reading

  • Notable Threat Updates and Looking Ahead

    Notable Threat Updates and Looking Ahead

    We recently published an Insights piece “The Golden Scale: Bling Libra and the Evolving Extortion Economy,” which primarily focused on the Salesforce data theft extortion activity. This was associated with the cybercriminal syndicate known as Scattered LAPSUS$ Hunters. Since early October 2025, we have observed several notable developments within a Telegram channel (SLSH 6.0 part 3) used by the threat actors. This activity may provide a glimpse into how the group plans to operate in the foreseeable future. We’re providing these insights so that organizations can better prepare for and defend against this evolving threat activity.

    Fallout From the Extortion Deadline

    As noted in our previous Insights piece, Scattered LAPSUS$ Hunters listed the deadline for impacted organizations to make a ransom payment as 11:59 PM ET on Oct. 10, 2025. Since that time, news reports have indicated that the threat actors have leaked stolen data allegedly belonging to six companies. These companies operate across the aviation, energy and retail sectors. The leaked data allegedly includes various types of personally identifiable information (PII) such as names, dates of birth, email addresses, phone numbers and frequent flyer numbers.

    Unit 42 recently tried to access the data leak site (DLS) associated with the threat actors, and noticed the website had what appeared to be a defacement message posted (see Figure 1). As a result, we were unable to determine if any victim data was still listed.

    Figure 1. Screenshot of message posted to Bling Libra’s latest DLS as of Oct. 17, 2025. Source: Scattered LAPSUS$ Hunters’ DLS.

    On Oct. 11, 2025, a day after the posted deadline and the release of data for the six organizations referenced above, the threat actors stated that “nothing else will be leaked.” The meaning of “the things we have cannot be leaked for obvious reasons” is unclear (see Figure 2). These “obvious reasons” could mean increased attention and action from law enforcement due to who owns the data or its type.

    Telegram screenshot reads: "A lot of people are asking what else will be leaked. Nothing else will be leaked. Everything that was leaked was leaked, we have nothing else to leak and obviously the things we have cannot be leaked for obvious reasons. :D
    Figure 2. Screenshot of Telegram post to SLSH 6.0 part 3 channel on Oct. 11, 2025. Source: Telegram.

    As shown below in Figure 3, the threat actors appear to potentially be stepping away from any activities until the beginning of next year. A post after this one states “I promise you, you WILL feel our wrath.”

    Telegram screenshot with a statement from the threat actors on their continuous operations targeting global corporations and critical infrastructure, and insisting they are not criminals but businessmen.
    Figure 3. Screenshot of Telegram post to SLSH 6.0 part 3 channel on Oct. 11, 2025. Source: Telegram.

    Extortion-as-a-Service Program Advertisement

    On Oct. 10, 2025, shortly prior to their self-imposed deadline, the threat actors formally alluded to the launch of their extortion-as-a-service (EaaS) program as shown in Figure 4. They claim this EaaS program will be similar to a typical ransomware-as-a-service (RaaS) program with a clear difference: no file encryption. As noted in my previous Insights piece, one likely factor for this shift is to potentially fly under the radar of law enforcement attention. This could be motivated by their focus on disrupting ransomware operations in recent years.

    Telegram screenshot announcing the launch of a new EaaS (Extortion-as-a-Service), detailing features such as anonymity and professional negotiation support, with further details to be released soon.
    Figure 4. Screenshot of Telegram post to SLSH 6.0 part 3 channel on Oct. 10, 2025. Source: Telegram.

    Renewed Insider Access Recruitment

    On Oct. 5, 2025, the threat actors posted an advertisement seeking insider access at organizations across a variety of industries, as seen in Figure 5.

    As also noted by ReliaQuest on their X account, the threat actors state their primary interest is in acquiring access to call centers, gaming companies, hosting providers, software-as-a-service (SaaS) and telecom organizations. These organizations would be based in countries such as the U.S., UK, Australia, Canada and France.

    Telegram screenshot that includes information on rules, IA rates, employee or insider recruitment, and regions of focus.
    Figure 5. Screenshot of Telegram post to SLSH 6.0 part 3 channel on Oct. 5, 2025 Source: Telegram.

    Threat actors affiliated with “The Com” have previously advertised interest in partnering with insiders at targets of interest to them. This was reported in our May 2025 update on Muddled Libra (aka Scattered Spider).

    Potential Emergence of New Ransomware

    On Oct. 4, 2025, the threat actors claimed to be developing a new form of ransomware named “SHINYSP1D3R” as noted in Figures 6 and 7. These posts appear to be related to observations previously noted by Falconfeeds in August 2025. It is currently unclear if the aforementioned ransomware is still under development or simply a false claim.

    Telegram screenshot: "It's time to make it clear to certain entities what real extortion looks like." The rest of the text lists other cybercrime groups and asks the readers to stay tuned on what's new.
    Figure 6. Screenshot of Telegram posts to SLSH 6.0 part 3 channel on Oct. 4, 2025. Source: Telegram.
    Telegram screenshot that says what is coming next is the GTA 6 of ransomware.
    Figure 7. Screenshot of Telegram posts to SLSH 6.0 part 3 channel on Oct. 4, 2025. Source: Telegram.

    What Comes Next — and What I Recommend You Do

    Given that the clearnet version of Scattered LAPSUS$ Hunters’ newly launched DLS is unavailable at this time, it is unclear if any of the victims listed on the site made a ransom payment to the threat actors.

    Additionally, it remains relatively uncertain if the EaaS program advertised by the threat actors will be as lucrative of a business model as they likely hoped it would be. Given that the advertisement specifically cites the removal of any file encryption in comparison to a traditional RaaS program, organizations may be less willing to make a ransom payment considering the potential lack of operational disruption.

    Finally, it is not evident why the threat actors would potentially be interested in operating both an EaaS and a RaaS program, other than attempting to diversify their revenue streams. This is certainly something Unit 42 will continue to monitor going forward.

    As noted in our previous Insights piece, the theft and leakage of PII, including loyalty program details (e.g., frequent flyer numbers) from some victim organizations (specifically those in hospitality) could enable cybercriminals to conduct identity theft and other types of fraud, including fueling the growth of fraudulent travel agencies advertised across underground cybercrime forums and Telegram channels.

    Given the rise of RaaS programs in recent years, many organizations have developed incident response playbooks specifically to prepare for a ransomware event in terms of operational disruption. I believe it is now time for organizations to create similar playbooks for the growing threat of EaaS programs, specifically to prepare for the reputational risks associated with such events. This should include having third-party experts on standby via retainer to assist with potential negotiations, verification of stolen data and other related actions.

    If your organization has been threatened with data theft extortion by Scattered Lapsus$ Hunters or other cybercriminals, the Unit 42 Incident Response team is here and ready to support with either a suspected compromise or to reduce the risk via a proactive threat assessment.

    Continue Reading