Bull shark "baby food" under extreme threat
Juvenile bull sharks generally remain inside rivers, sheltered by mangroves while they are young and more vulnerable to predators, before moving out into coastal habitats. Until now, scientists assumed they relied on these mangrove habitats, rather t.....»»
Trump’s Election Threatens Heat Protections for Workers
A Biden administration proposal that would require employers to provide cooling measures under extreme heat conditions may be scuttled by the incoming Trump administration.....»»
Untreated sewage and fertilizer runoff threaten the Florida manatee"s main food source, contributing to malnutrition
The gentle, slow-moving Florida manatee has no natural predators......»»
Theoretical model explains the anomalous properties of water in extreme conditions
Water, a molecule essential for life, has unusual properties—known as anomalies—that define its behavior. However, there are still many enigmas about the molecular mechanisms that would explain the anomalies that make the water molecule unique. D.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Climate scientist combines research and teaching into "perfect storm" of discovery
This fall, Hurricanes Helene and Milton served as painful reminders of how climate change is fueling extreme weather, supplying warmer ocean waters and warmer air temperatures that lead to wetter, stronger tropical cyclones......»»
Researchers call for recognition of tire particles as a distinct environmental threat
A new study led by an international team of scientists highlights tire particles (TPs) as the leading contributor to microplastics and calls for urgent, targeted research to address their unique environmental and health risks......»»
Most surveyed grocery shoppers report noticing shrinkflation
Over three-quarters of surveyed consumers say they have noticed shrinkflation at the grocery store in the previous 30 days, according to the October 2024 Consumer Food Insights Report (CFI)......»»
Seaweed proteins could be the next sustainable food source
The protein in sea lettuce, a type of seaweed, is a promising complement to both meat and other current alternative protein sources. Seaweed also contains many other important nutrients, and is grown without needing to be watered, fertilized or spray.....»»
Portable spectrophotometer approach predicts shelf life of strawberries in real time
Based on non-invasive technology, a research group at the University of Cordoba has created a tool to guarantee optimal strawberry quality and minimize food waste......»»
NZ"s food manufacturers are embracing the idea of a circular economy but are slow to implement it
Around the world, the growth of industry and consumption has escalated environmental damage through increased emissions, waste and pollution from landfills......»»
Agrivoltaics for sustainable food, energy and water management in East Africa
Combining solar power production with agriculture can significantly boost crop yields, conserve water and generate low-carbon electricity for areas particularly vulnerable to climate change, a new study has shown......»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Cacti are surprisingly fragile, and five other intriguing facts about these spiky wonders
Few plant families are as iconic as the resilient, spiky cactus, thriving in the driest deserts and as well as decorating our offices and homes. Their success in both environments comes down to extreme adaptations for surviving with little water—wh.....»»
BlackFog platform enhancements boost data loss prevention
BlackFog launched its next generation enterprise platform to deliver even more powerful ransomware and insider threat prevention. BlackFog’s pioneering platform focuses specifically on anti data exfiltration to prevent unauthorized data from leavin.....»»
Massive troves of Amazon, HSBC employee data leaked
A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p r.....»»
Immersive Labs AI Scenario Generator improves cyber skills against various attack types
Immersive Labs introduced AI Scenario Generator. This new capability enables organizations to generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. By inputting a few short prompts, customers ca.....»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»