Chinese hackers are switching to new malware for government attacks
New attacks from the Chinese based Mustang Panda group reveal a change in tactics.....»»
Unveiling the secrets of aging: Scientists discover dual role of immunoglobulins
A team of scientists from the Chinese Academy of Sciences (CAS) and BGI Research has uncovered the intricate mechanisms by which immunoglobulins influence the aging process, a finding that might reshape our understanding of aging......»»
Claude AI to process secret government data through new Palantir deal
Critics worry Anthropic is endangering its "ethical" AI stance due to defense associations. Anthropic has announced a partnership with Palantir and Amazon Web Services to bring it.....»»
TSMC will stop making 7 nm chips for Chinese customers
US restrictions on semiconductor tech are spurring the move. Taiwan Semiconductor Manufacturing Company has notified Chinese chip design companies that it will suspend production.....»»
A new form of macOS malware is being used by devious North Korean hackers
North Korean hackers are targeting crypto businesses with backdoors again......»»
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives
AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third consecutive quarter with these attacks being the top of emerging risk. IT.....»»
Two senior presidential campaign officials" iPhones maybe hacked by Chinese group
Evidence suggests that the earlier Chinese Salt Typhoon breach of American telecoms may have led to the potential hacking of two presidential campaign officials' iPhones.iPhones potentially breachedWhether the hack actually happened, what data might.....»»
The UK government wants to help businesses make trustworthy AI products
The UK Government hopes to unlock £6.5 billion with a plan to build public trust in AI......»»
North Korean hackers employ new tactics to compromise crypto-related businesses
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the.....»»
Brazil"s Amazon posts lowest deforestation in nine years: govt
The Brazilian Amazon experienced its smallest amount of yearly deforestation in nearly a decade, President Luiz Inacio Lula da Silva's government reported Wednesday, in line with its promise to combat forest loss......»»
Artificial receptors made from coronavirus DNA open up new avenues for research
A team of microbiologists and virologists at Wuhan University, working with colleagues from the Chinese Academy of Sciences, the University of Washington and Humabs BioMed SA, has found that it is possible to use coronavirus DNA to create receptors t.....»»
More families purchased school meals after federal nutrition policies enacted, research suggests
Families purchased more school lunches and breakfasts the year after the federal government toughened nutritional standards for school meals. A new University of California, Davis, study suggests that families turned to school lunches after the Obama.....»»
New bird flu outbreak confirmed in UK
The UK government warned bird keepers to remain vigilant after bird flu was detected at a commercial poultry farm in northern England, the second outbreak this year and first of the season......»»
Key cybersecurity predictions for 2025
In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will be in 2025. The post Key cybersecurity predictions for 2025 appeared first o.....»»
Suspect arrested in Snowflake data-theft attacks affecting millions
Threat actor exploited account credentials swept up by infostealers years earlier. Canadian authorities have arrested a man on suspicion he breached hundreds of accounts belonging.....»»
Secrets and lies: Spies of the Stuart era played a dangerous game in the shadows of an unstable Europe
Stuart monarchs were repeatedly challenged by dangerous threats—a gunpowder plot, a civil war and political revolution. As a result, by the restoration of Charles II in 1660, the English government had come to rely on a shadowy trade of secrets for.....»»
New survey finds alarming tolerance for attacks on the press in US, particularly among white, Republican men
Press freedom is a pillar of American democracy. But political attacks on US-based journalists and news organizations pose an unprecedented threat to their safety and the integrity of information......»»
Mapping the maze where the IRS could find billions in unpaid taxes
In 2021, the difference between what U.S. taxpayers owed the federal government and what they paid hit nearly $700 billion. This "tax gap" has been growing for years while the Internal Revenue Service's budget has shrunk, declining by 18% between 201.....»»
Hundreds of code libraries posted to NPM try to install malware on dev machines
These are not the the developer tools you think they are. An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM) repository in.....»»
How to boost Asian American voter turnout in Los Angeles: A new study points the way
Improving the quality of translated voting materials, broadening government outreach to potential voters and increasing the number of in-person voting sites are key to boosting voter turnout among Asian Americans in Los Angeles, according to a newly.....»»
AMD buying Intel? It’s on the table
According to a new report, the U.S. government is encouraging Intel to consider a merger, potentially with rival AMD......»»