North Korea using cyber heists to fund nuclear programme, says UN
A confidential UN report circulated among its Security Council members reportedly claims that North Korea has continued to maintain and develop its nuclear and ballistic missile programmes through cyberattacks......»»
Silver-silica composite catalyst inspired by geochemical cycling exhibits reversible local pH control
A research team led by Dr. Hyung-Suk Oh and Dr. Woong Hee Lee at the Clean Energy Research Center at Korea Institute of Science and Technology (KIST) has developed a silver-silica composite catalyst capable of reversible local pH control through a si.....»»
Cyber crooks push Android malware via letter
Cyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical letter impersonating MeteoSwiss (i.e., Switzerland’s Federal Office of Meteorology and Cl.....»»
New family of optimized omnigenous magnetic fields could display enhanced fusion plasma confinement
Physicists have been trying to design fusion reactors, technologies that can generate energy via nuclear fusion processes, for decades. The successful realization of fusion reactors relies on the ability to effectively confine charged particles with.....»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
Nature pays price for war in Israel"s north
Across northern Israel's lush, green nature reserves, the ecological toll of the war between Israel and Hezbollah militants is laid bare: wild boar hit by shrapnel, trees reduced to ashes and swathes of charred vegetation......»»
Three innovative ways to help countries hit by climate disasters, beyond a loss and damage fund
These days, it's hard to escape news stories discussing how climate change is contributing to extreme weather disasters, including the recent U.S. hurricanes. Aid agencies are increasingly worried about the widespread damage......»»
Madrid"s fifth Apple Store opens November 28
Apple has announced the opening of Apple La Vaguada, in north Madrid, marking the city's fifth store and its first in ten years.Custom wallpaper for the new Apple La Vaguada in Madrid — image credit: AppleJust over a decade on from the opening of i.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Thousands flee as Typhoon Usagi hits north of Philippines
Typhoon Usagi slammed into the Philippines' already disaster-ravaged north on Thursday, as authorities rushed to evacuate thousands of people from coastal areas......»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
The time is ripe to support urban agriculture: Experts urge Congress to fund new iteration of Farm Bill
As Congress reconvenes, a coalition of advocates has published a policy brief calling on representatives to provide more support for urban agriculture through a new iteration of the Farm Bill, which has been in a state of limbo since expiring in Sept.....»»
Early Black Friday Lenovo Laptop deals 2024: 20% off the best Lenovo Laptops
All kinds of Lenovo laptops are on sale for Cyber Monday, so whether you're a student, a work-from-home employee, or a gamer, there's an offer waiting for you......»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Social engineering scams sweep through financial institutions
North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams now represent 23% of all digital banking fraud. Growing danger of deepfake a.....»»
Cyber professionals face an IP loss reckoning in 2025
AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, or de.....»»
Fewer wells leaking methane in North Sea than expected
Less than two percent of the abandoned wells in the Dutch part of the North Sea are leaking methane originating from shallow gas accumulations. That conclusion was reached by researchers from NIOZ and TNO, in collaboration with the Dutch State Superv.....»»
Tax whistleblower laws boost state revenue: Study
The federal tax gap—money people and companies owe Uncle Sam but fail to pay on time—has climbed to historic highs: $696 billion in 2022, according to the IRS. It's money that—if recouped—could fund infrastructure or education or pay down gov.....»»
Immersive Labs AI Scenario Generator improves cyber skills against various attack types
Immersive Labs introduced AI Scenario Generator. This new capability enables organizations to generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. By inputting a few short prompts, customers ca.....»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»