Toggle light / dark theme

Wow! We Finally Have Evidence of a Planet in the Nearby Alpha Centauri

Support this channel on Patreon to help me make this a full time job: https://www.patreon.com/whatdamath (Unreleased videos, extra footage, DMs, no ads)
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.
Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX

Hello and welcome! My name is Anton and in this video, we will talk about new evidence for a large planet in the Alpha Centauri system near us.
Links:

NASA’s Webb Finds New Evidence for Planet Around Closest Solar Twin


https://arxiv.org/pdf/2508.03814
https://arxiv.org/pdf/2508.03812
https://iopscience.iop.org/article/10.3847/2515-5172/add880/meta.
Other videos:



#alphacentauri #planet #jameswebbspacetelescope.

0:00 Alpha centauri surprise!
0:40 What we know about the star system so far.
2:57 Potential detection in 2019
3:35 Why JWST is so good at this but there were still challenges.
4:55 Methods used to observe this star.
5:30 Surprise results and the initial analysis.
8:00 Non detection at later dates was important! Orbits worked out.
9:15 What we know about the planet so far.
11:30 Could this be rings?
12:30 What this implies and conclusions.
13:30 What’s next?

Enjoy and please subscribe.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Thank you to all Patreon supporters of this channel.

Wow! JWST Found Objects at Insane New Distances (Redshift of 25?!)

Support this channel on Patreon to help me make this a full time job: https://www.patreon.com/whatdamath (Unreleased videos, extra footage, DMs, no ads)
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.
Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX

Hello and welcome! My name is Anton and in this video, we will talk about a major discovery of most distant objects ever seen coming from the James Webb Space Telescope.
Links:
https://arxiv.org/pdf/2503.15594
https://arxiv.org/pdf/2503.

0:00 JWST breaks its own records.
0:40 Earlier observations and theory behind this.
3:10 New records at redshift of 17 and 25
5:20 What we know about these objects.
7:00 Issue explaining this.
7:50 Could this be black holes?
10:40 What’s next?
11:40 Conclusions.

Enjoy and please subscribe.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Thank you to all Patreon supporters of this channel.

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners.

The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively.

Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtinger said. “They use process masquerading to disguise malicious activity as legitimate system processes.”

New Koske Linux malware hides in cute panda images

A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory.

Researchers from cybersecurity company AquaSec analyzed Koske and described it as “a sophhisticated Linux threat.” Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks.

Koske’s purpose is to deploy CPU and GPU-optimized cryptocurrency miners that use the host’s computational resources to mine over 18 distinct coins.

3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

A new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks once popularized by the likes of CoinHive.

Although the service has since shuttered after browser makers took steps to ban miner-related apps and add-ons, researchers from the c/side said they found evidence of a stealthy miner packed within obfuscated JavaScript that assesses the computational power of a device and spawns background Web Workers to execute mining tasks in parallel without raising any alarm.

More importantly, the activity has been found to leverage WebSockets to fetch mining tasks from an external server, so as to dynamically adjust the mining intensity based on the device capabilities and accordingly throttle resource consumption to maintain stealth.

Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

The attack chains begin when one of these adversary-controlled accounts messages a victim through X, Telegram, or Discord, urging them to test out their software in exchange for a cryptocurrency payment.

Should the target agree to the test, they are redirected to a fictitious website from where they are promoted to enter a registration code provided by the employee to download either a Windows Electron application or an Apple disk image (DMG) file, depending on the operating system used.

On Windows systems, opening the malicious application displays a Cloudflare verification screen to the victim while it covertly profiles the machine and proceeds to download and execute an MSI installer. Although the exact nature of the payload is unclear, it’s believed that an information stealer is run at this stage.

/* */