re Canada reports 1st local case of H5 bird flu By www.livescience.com Published On :: Tue, 12 Nov 2024 20:10:00 +0000 A teen in Canada may be the first person to catch an H5 bird flu virus within the country. Health officials are now working to confirm the diagnosis. Full Article Flu Health Viruses Infections & Disease
re Global carbon emissions reach new record high in 2024, with no end in sight, scientists say By www.livescience.com Published On :: Wed, 13 Nov 2024 00:01:00 +0000 There is a 50% chance that global warming will consistently exceed 1.5 degrees Celsius in the next six years, according to a new report. Full Article Climate Change Planet Earth
re 04 – The Internet Musician – 8 Steps to Create a Music Website By theinternetmusician.com Published On :: Tue, 14 Feb 2012 20:19:46 +0000 Show Notes for Episode 4: Subscribe to the Internet Musician Podcast with iTunes: As a musician, you need a good website. You know that. But you really don’t need to spend years trying to understand the technology. You also don’t want to spend tons of time working on your site without knowing if you’re doing things […] Full Article Podcast create a music website create a website music website design
re New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls By thehackernews.com Published On :: Mon, 04 Nov 2024 11:43:00 +0530 Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming Full Article
re Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It) By thehackernews.com Published On :: Mon, 04 Nov 2024 16:30:00 +0530 As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain. Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s Full Article
re THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) By thehackernews.com Published On :: Mon, 04 Nov 2024 16:58:00 +0530 This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean. Full Article
re German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested By thehackernews.com Published On :: Mon, 04 Nov 2024 17:32:00 +0530 German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka Full Article
re Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks By thehackernews.com Published On :: Tue, 05 Nov 2024 10:38:00 +0530 Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the Full Article
re Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages By thehackernews.com Published On :: Tue, 05 Nov 2024 11:03:00 +0530 An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few Full Article
re New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers By thehackernews.com Published On :: Tue, 05 Nov 2024 17:46:00 +0530 Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino Full Article
re South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers By thehackernews.com Published On :: Wed, 06 Nov 2024 12:28:00 +0530 Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as Full Article
re Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps By thehackernews.com Published On :: Wed, 06 Nov 2024 19:29:00 +0530 Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute Full Article
re VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware By thehackernews.com Published On :: Wed, 06 Nov 2024 23:22:00 +0530 An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to Full Article
re Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems By thehackernews.com Published On :: Thu, 07 Nov 2024 14:38:00 +0530 Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management Full Article
re SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims By thehackernews.com Published On :: Thu, 07 Nov 2024 15:12:00 +0530 An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. "The campaign Full Article
re 5 Most Common Malware Techniques in 2024 By thehackernews.com Published On :: Thu, 07 Nov 2024 15:18:00 +0530 Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging Full Article
re North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS By thehackernews.com Published On :: Thu, 07 Nov 2024 18:10:00 +0530 A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as Full Article
re New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus By thehackernews.com Published On :: Fri, 08 Nov 2024 12:45:00 +0530 Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON# Full Article
re Malicious NPM Packages Target Roblox Users with Data-Stealing Malware By thehackernews.com Published On :: Fri, 08 Nov 2024 17:23:00 +0530 A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available Full Article
re IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools By thehackernews.com Published On :: Fri, 08 Nov 2024 17:53:00 +0530 High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point Full Article
re AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services By thehackernews.com Published On :: Fri, 08 Nov 2024 19:32:00 +0530 The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a Full Article
re Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering By thehackernews.com Published On :: Sat, 09 Nov 2024 11:12:00 +0530 The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ) Full Article
re Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns By thehackernews.com Published On :: Sat, 09 Nov 2024 11:42:00 +0530 Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the Full Article
re Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware By thehackernews.com Published On :: Mon, 11 Nov 2024 11:43:00 +0530 Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have Full Article
re THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) By thehackernews.com Published On :: Mon, 11 Nov 2024 17:27:00 +0530 ⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways, Full Article
re New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks By thehackernews.com Published On :: Tue, 12 Nov 2024 11:30:00 +0530 Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness," Russian cybersecurity vendor Kaspersky said. "Threat actors leveraged an unconventional blend Full Article
re 5 Ways Behavioral Analytics is Revolutionizing Incident Response By thehackernews.com Published On :: Tue, 12 Nov 2024 16:30:00 +0530 Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more Full Article
re North Korean Hackers Target macOS Using Flutter-Embedded Malware By thehackernews.com Published On :: Tue, 12 Nov 2024 18:30:00 +0530 Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform earlier this month, said the Flutter-built Full Article
re Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks By thehackernews.com Published On :: Wed, 13 Nov 2024 12:44:00 +0530 The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said Full Article
re ANOTHER GREAT GUN GUY PASSES By www.backwoodshome.com Published On :: Mon, 21 Oct 2024 13:00:00 +0000 I was saddened to be told of the recent death of my old friend Ed Lovette. He had a long and distinguished career in military, law enforcement, and the CIA. Ed was a thinking man’s instructor. We took each other’s classes. He went through my LFI-I course back in the day , and about thirty […] Full Article Uncategorized
re WHY COMPETITION IS RELEVANT TO SELF-DEFENSE By www.backwoodshome.com Published On :: Thu, 24 Oct 2024 13:00:00 +0000 Recently saw this on YouTube, from a grandmaster competition shooter who is also in law enforcement. I agree with him. I’ve said for years that while a shooting match is not a gunfight, a gunfight most certainly is a shooting match. Competition experience makes shooting under pressure the norm. Wyatt Earp competed in the informal […] Full Article Uncategorized
re THE NEXT TIME AN ANTI-GUNNER SAYS CITIZENS’ RIFLES ARE USELESS AGAINST ARMIES… By www.backwoodshome.com Published On :: Sun, 27 Oct 2024 13:00:00 +0000 …remind them of this. I was recently reading “Andrew Jackson and the Miracle of New Orleans” by Brian Kilmeade and Don Yeager. The War of 1812 was going badly for the Americans. The British had burned the White House, and a huge contingent of British troops was in Louisiana planning to march north in conquest. […] Full Article Uncategorized
re THE LAW AND THE FACTS ARE ON OUR SIDE, BUT WE SHOULD BE USING EMOTION, TOO By www.backwoodshome.com Published On :: Tue, 05 Nov 2024 14:00:00 +0000 Historically, both law and facts are on the gun owners’ side of the “gun control” debate, and the Other Side had relied largely on emotion. I respectfully submit that emotion is something our side should play to, as well. I made that point recently at the 2024 Gun Rights Policy Conference in San Diego last […] Full Article Uncategorized
re SUICIDE PREVENTION By www.backwoodshome.com Published On :: Fri, 08 Nov 2024 14:00:01 +0000 While participating in a Zoom conference with other members of the New Hampshire Firearms Safety Coalition, of which I’ve been a proud member for a quarter century or so, I was reminded that I have not addressed here a topic NHFSC has strongly and successfully focused upon: suicide prevention. The organization was founded by the […] Full Article Uncategorized
re Record of Achievement By www.aquarionics.com Published On :: Fri, 20 May 2022 15:13:14 +0000 On the interesting properties of becoming the kind of person who buys vinyl records. Full Article Uncategorized
re Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’ By www.factcheck.org Published On :: Tue, 05 Nov 2024 20:36:57 +0000 A misspelling of former President Donald Trump's name occurred on an optional ballot review screen in Virginia, prompting an unfounded claim on social media of "election fraud." The error was a typo that appeared only on the ballot review screen, not on actual ballots, and would not affect any votes, election officials said. The post Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’ appeared first on FactCheck.org. Full Article Debunking Viral Claims FactCheck Posts 2024 elections Presidential Election 2024
re Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia By www.factcheck.org Published On :: Tue, 05 Nov 2024 21:42:04 +0000 Posts shared on Facebook make an unfounded claim of racially motivated threats of violence in Gwinnett County, Georgia, "from now until the Inauguration." The county sheriff's office said it had "not received any information indicating threats to any group(s) on or after election day." The post Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia appeared first on FactCheck.org. Full Article Debunking Viral Claims FactCheck Posts 2024 elections Presidential Election 2024
re Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias By www.factcheck.org Published On :: Wed, 06 Nov 2024 21:56:25 +0000 Social media users alleged bias against former President Donald Trump when a Google search on Election Day for “where to vote” returned an interactive map to find a person’s polling station when including the word “Harris” but not “Trump.” The reason is because “Harris” is a county in Texas, whereas “Trump” is not a location. The post Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias appeared first on FactCheck.org. Full Article Debunking Viral Claims FactCheck Posts 2024 elections Presidential Election 2024
re Posts Falsely Claim CBS News Reported ‘Cheating’ in Election By www.factcheck.org Published On :: Tue, 12 Nov 2024 22:20:32 +0000 Some social media posts falsely claimed that CBS News reported there was "cheating" in the 2024 presidential election that benefitted President-elect Donald Trump. We found no evidence of such a report, and a CBS News spokesperson said the outlet "did not report or say there was cheating in the election." The post Posts Falsely Claim CBS News Reported ‘Cheating’ in Election appeared first on FactCheck.org. Full Article Debunking Viral Claims FactCheck Posts 2024 elections Presidential Election 2024
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Sun, 27 Oct 2024 22:41:00 +0000 You can now download Peter F. Hamilton's Pandora's Star for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: The year is 2380. The Intersolar Commonwealth, a sphere of stars, contains more than six hundred worlds interconnected by a web of transport “tunnels” known as wormholes. At the farthest edge of the Commonwealth, astronomer Dudley Bose observes the impossible: over one thousand light-years away, a star . . . disappears. Since the location is too distant to reach by wormhole, the Second Chance, a faster-than-light starship commanded by Wilson Kime, a five-times-rejuvenated ex-NASA pilot, is dispatched to learn what has occurred and whether it represents a threat. Opposed to the mission are the Guardians of Selfhood, led by Bradley Johansson. Shortly after the journey begins, Kime wonders if the crew of the Second Chance has been infiltrated. But soon enough he will have other worries. Halfway across the galaxy, something truly incredible is waiting: a deadly discovery whose unleashing will threaten to destroy the Commonwealth . . . and humanity itself. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Tue, 29 Oct 2024 17:03:00 +0000 You can now get your hands on the digital edition of Blake Crouch's Upgrade for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: The mind-blowing new thriller from the New York Times bestselling author of Dark Matter and Recursion—currently in development as a motion picture at Steven Spielberg's Amblin Partners “You are the next step in human evolution.” At first, Logan Ramsay isn’t sure if anything’s different. He just feels a little . . . sharper. Better able to concentrate. Better at multitasking. Reading a bit faster, memorizing better, needing less sleep. But before long, he can’t deny it: Something’s happening to his brain. To his body. He’s starting to see the world, and those around him—even those he loves most—in whole new ways. The truth is, Logan’s genome has been hacked. And there’s a reason he’s been targeted for this upgrade. A reason that goes back decades to the darkest part of his past, and a horrific family legacy. Worse still, what’s happening to him is just the first step in a much larger plan, one that will inflict the same changes on humanity at large—at a terrifying cost. Because of his new abilities, Logan’s the one person in the world capable of stopping what’s been set in motion. But to have a chance at winning this war, he’ll have to become something other than himself. Maybe even something other than human. And even as he’s fighting, he can’t help wondering: what if humanity’s only hope for a future really does lie in engineering our own evolution? Intimate in scale yet epic in scope, Upgrade is an intricately plotted, lightning-fast tale that charts one man’s thrilling transformation, even as it asks us to ponder the limits of our humanity—and our boundless potential. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Wed, 30 Oct 2024 16:25:00 +0000 You can now download Sebastien de Castell's Play of Shadows for only 0.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: Swordplay, magic, intrigue and friendships stronger than iron: the first volume in the new swashbuckling fantasy series set in the universe of THE GREATCOATS. Damelas Chademantaigne picked a poor night to flee a judicial duel. He has precious little hope of escaping the wrath of the Vixen, the most feared duellist in the entire city, until he stumbles through the stage doors of the magnificent Operato Belleza and tricks his way into the company of actors. An archaic law provides a temporary respite from his troubles - until one night a ghostly voice in his head causes Damelas to fumble his lines, inadvertently blurting out a dreadful truth: the city's most legendary hero may actually be a traitor and a brutal murderer. With only the help of his boisterous and lusty friend Bereto, a beautiful assassin whose target may well be Damelas himself, and a company of misfit actors who'd just as soon see him dead, this failed grandson of two Greatcoats must somehow find within himself the courage to dig up long-buried truths before a ruthless band of bravos known as the Iron Orchids come for his head. Oh, and there's still that matter of the Vixen waiting to duel him . . . Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Thu, 31 Oct 2024 14:10:00 +0000 For a limited time, you can download Paolo Bacigalupi's Navola for only 5.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: From the New York Times best-selling author of The Windup Girl and The Water Knife comes a sweeping literary historical fantasy about the young scion from a ruling-class family who faces rebellion as he ascends to power. "You must be as sharp as a stilettotore’s dagger and as subtle as a fish beneath the waters. This is what it is to be Navolese, this is what it is to be di Regulai." In Navola, a bustling city-state dominated by a handful of influential families, business is power, and power is everything. For generations, the di Regulai family—merchant bankers with a vast empire—has nurtured tendrils that stretch to the farthest reaches of the known world. And though they claim not to be political, their staggering wealth has bought cities and toppled kingdoms. Soon, Davico di Regulai will be expected to take the reins of power from his father and demonstrate his mastery of the games of Navolese diplomacy: knowing who to trust and who to doubt, and how to read what lies hidden behind a smile. But in Navola, strange and ancient undercurrents lurk behind the gilt and grandeur—like the fossilized dragon eye in the family’s possession, a potent symbol of their raw power and a talisman that seems to be summoning Davico to act. As tensions rise and the events unfold, Davico will be tested to his limits. His fate depends on the eldritch dragon relic and on what lies buried in the heart of his adopted sister, Celia di Balcosi, whose own family was destroyed by Nalova’s twisted politics. With echoes of Renaissance Italy, The Godfather, and Game of Thrones, Navola is a stunning feat of world-building and a mesmerizing depiction of drive and will. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Fri, 01 Nov 2024 02:42:00 +0000 You can now download R. Scott Bakker's The Darkness That Comes Before for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: A score of centuries has passed since the First Apocalypse. The No-God has been vanquished and the thoughts of men have turned, inevitably, to more worldly concerns...Drusas Achamian, tormented by 2,000 year old nightmares, is a sorcerer and a spy, constantly seeking news of an ancient enemy that few believe still exists. Ikurei Conphas, nephew to the Nansur Emperor, is the Exalt-General of the Imperial Army and a military genius. He plots to conquer the known world for his Emperor and dreams of the throne for himself. Maithanet, mysterious and charismatic, is spiritual leader of the Thousand Temples. He seeks a Holy War to cleanse the land of the infidel. Cnaiur, Chieftain of the Utemot, is a Scylvendi barbarian. Rejected by his people, he seeks vengeance against the former slave who slew his father, and disgraced him in the eyes of his tribe. Into this world steps Anasurimbor Kellhus, the product of two thousand years of breeding and a lifetime of training in the ways of thought, limb, and face. Steering souls through the subtleties of word and expression, he slowly binds all - man and woman, emperor and slave - to his own mysterious ends. But the fate of men - even great men - means little when the world itself may soon be torn asunder. Behind the politics, beneath the imperialist expansion, amongst the religious fervour, a dark and ancient evil is reawakening. After two thousand years, the No-God is returning. The Second Apocalypse is nigh. And one cannot raise walls against what has been forgotten... Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Fri, 01 Nov 2024 14:04:00 +0000 You can now download Guy Gavriel Kay's The Lions of Al-Rassan for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: The ruling Asharites of Al-Rassan have come from the desert sands, but over centuries, seduced by the sensuous pleasures of their new land, their stern piety has eroded. The Asharite empire has splintered into decadent city-states led by warring petty kings. King Almalik of Cartada is on the ascendancy, aided always by his friend and advisor, the notorious Ammar ibn Khairan -- poet, diplomat, soldier -- until a summer afternoon of savage brutality changes their relationship forever. Meanwhile, in the north, the conquered Jaddites' most celebrated -- and feared -- military leader, Rodrigo Belmonte, driven into exile, leads his mercenary company south. In the dangerous lands of Al-Rassan, these two men from different worlds meet and serve -- for a time -- the same master. Sharing their interwoven fate -- and increasingly torn by her feelings -- is Jehane, the accomplished court physician, whose own skills play an increasing role as Al-Rassan is swept to the brink of holy war, and beyond. Hauntingly evocative of medieval Spain, The Lions of Al-Rassan is both a brilliant adventure and a deeply compelling story of love, divided loyalties, and what happens to men and women when hardening beliefs begin to remake -- or destroy -- a world. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Sat, 02 Nov 2024 15:24:00 +0000 You can now get your hands on the digital edition of Hugh Howey's Machine Learning: New and Collected Stories for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: A collection of shockingly prescient stories covering topics from aliens to AI, including some that have never before been seen, from the New York Times best-selling author of the Silo trilogy Hugh Howey is known for crafting riveting and immersive page-turners of boundless imagination, spawning millions of fans worldwide, first with his best-selling novel Wool, and then with other enthralling works such as Sand and Beacon 23. Now comes Machine Learning, an impressive collection of Howey’s science fiction and fantasy short fiction, including three stories set in the world of Wool, two never-before-published tales written exclusively for this volume, and fifteen additional stories collected here for the first time. "Glitch" asks what happens when a battle bot refuses to fight. “The Automated Ones” introduces ideas of discrimination in a world populated by both humans and AI, and its sequel “WHILE (u > i) i –;” explores the challenges a human woman and an android face after falling in love. In "Select Character" a new mother who is bored with being stuck at home starts playing her husbands' video game according to her own rules-- and makes a surprising discovery. These stories explore everything from artificial intelligence to parallel universes to video games, and each story is accompanied by an author’s note exploring the background and genesis of each story. Howey’s incisive mind makes Machine Learning: New and Collected Stories a compulsively readable and thought-provoking selection of short works—from a modern master at the top of his game. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Sat, 02 Nov 2024 18:16:00 +0000 You can now download Barbara Hambly's The Sun Wolf and Starhawk omnibus, comprised of The Ladies of Mandrigyn, The Witches of Wenshar, and The Dark Hand of Magic, for only 3.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: Three fantasy novels of war and wizardry by a “fabulously talented” New York Times–bestselling author (Charlaine Harris). In The Ladies of Mandrigyn, a brilliant mercenary must lead his army against the forces of the most powerful wizard alive. Gifted with courage, strength, and the intelligence to know when to fight, Sun Wolf is the greatest mercenary in a land overrun by war. With his first lieutenant, Starhawk, at his side, he has laid waste to countless cities, taking the best of their treasures for himself, and distributing the rest among his bloodthirsty crew. Then a woman comes to him, an emissary from the town of Mandrigyn, a lush port city recently sacked by a powerful, mad wizard of unmatched abilities. She offers Sun Wolf untold riches for the use of his army, but the captain is not fool enough to wage war against a magician. He refuses her offer, but that is not the end of it. The women of Mandrigyn can be very persuasive. In The Witches of Wenshar, to harness his newfound magical powers, Sun Wolf must cross the desert in search of a witch who can teach him the ways of sorcery. Accompanied by his lieutenant, Starhawk, he travels across the forbidding desert to the land of Wenshar, where witchcraft is said to flourish. There he seeks out a witch with powers far beyond her years, who is rumored to have mastered the ancient art of white magic. But when he and Starhawk finally reach her, there is evil in the air—an evil against which all their might is useless. Sun Wolf must learn to harness his newfound powers—or be taken by this sinister trap. In The Dark Hand of Magic, Sun Wolf must use his immature magical powers to rescue his old army from an evil wizard’s curse. A string of rotten luck has befallen his old crew’s latest campaign, and they have begun to suspect a curse. Their arrows break; their food rots; their tunnels cave in. They have heard rumors of Sun Wolf’s magical abilities, and beg for his help. But when he goes after whatever is targeting his men, he finds himself up against the deadliest force he has ever encountered. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Mon, 04 Nov 2024 01:13:00 +0000 You can now download Neal Stephenson's Termination Shock for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: New York Times Bestseller From Neal Stephenson—who coined the term “metaverse” in his 1992 novel Snow Crash—comes a sweeping, prescient new thriller that transports readers to a near-future world in which the greenhouse effect has inexorably resulted in a whirling-dervish troposphere of superstorms, rising sea levels, global flooding, merciless heat waves, and virulent, deadly pandemics. One man—visionary billionaire restaurant chain magnate T. R. Schmidt, Ph.D.—has a Big Idea for reversing global warming, a master plan perhaps best described as “elemental.” But will it work? And just as important, what are the consequences for the planet and all of humanity should it be applied? Ranging from the Texas heartland to the Dutch royal palace in the Hague, from the snow-capped peaks of the Himalayas to the sunbaked Chihuahuan Desert, Termination Shock brings together a disparate group of characters from different cultures and continents who grapple with the real-life repercussions of global warming. Ultimately, it asks the question: Might the cure be worse than the disease? Epic in scope while heartbreakingly human in perspective, Termination Shock sounds a clarion alarm, ponders potential solutions and dire risks, and wraps it all together in an exhilarating, witty, mind-expanding speculative adventure. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Mon, 04 Nov 2024 16:09:00 +0000 You can now download Robert Jordan's The Eye of the World for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. The three next installments, The Great Hunt, The Dragon Reborn, and The Shadow Rising are also on sale. Here's the blurb: The Wheel of Time ® is a PBS Great American Read Selection! Now in development for TV! Since its debut in 1990, The Wheel of Time® by Robert Jordan has captivated millions of readers around the globe with its scope, originality, and compelling characters. The Wheel of Time turns and Ages come and go, leaving memories that become legend. Legend fades to myth, and even myth is long forgotten when the Age that gave it birth returns again. In the Third Age, an Age of Prophecy, the World and Time themselves hang in the balance. What was, what will be, and what is, may yet fall under the Shadow. When The Two Rivers is attacked by Trollocs—a savage tribe of half-men, half-beasts— five villagers flee that night into a world they barely imagined, with new dangers waiting in the shadows and in the light. Full Article
re More inexpensive ebook goodies! By fantasyhotlist.blogspot.com Published On :: Tue, 05 Nov 2024 18:04:00 +0000 You can now download Joanne Bertin's The Last Dragonlord for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale. Here's the blurb: Dragonlord Linden Rathan, last-born of a race of immortal weredragons, has spent six hundred years alone, searching for his soultwin while his fellow Dragonlords watch over humanity’s Five Kingdoms. When the Queen of Cassori dies mysteriously, Linden and the other Dragonlords are called upon to prevent civil war as two human claimants vie for the regency. As the battle for Cassori rule escalates, Linden becomes the target of the Fellowship, a secret society of true-humans who could actually destroy his immortal life. Then he meets a beautiful young ship captain named Maurynna who may be the only one who can help Linden bring Cassori back from the brink of chaos. The Last Dragonlord is the debut novel in Joanne Bertin’s acclaimed Dragonlord series. You can also download Greg Bear's Eon for only 1.99$ here. Here's the blurb: In a supernova flash, the asteroid arrived and entered Earth’s orbit. Three hundred kilometers in length, it is not solid rock but a series of hollowed-out chambers housing ancient, abandoned cities of human origin, a civilization named Thistledown. The people who lived there survived a nuclear holocaust that nearly rendered humanity extinct—more than a thousand years from now. To prevent this future from coming to pass, theoretical mathematician Patricia Vasquez must explore Thistledown and decipher its secret history. But what she discovers is an even greater mystery, a tunnel that exists beyond the physical dimensions of the asteroid. Called the Way, it leads to the home of humanity’s descendants, and to a conflict greater than the impending war between Earth’s superpowers over the fate of the asteroid, in “the grandest work yet” by Nebula Award–winning author Greg Bear (Locus). Full Article