Water under Threat, Wooden Satellites and a Mud Bath for Baseballs
Droughts in 48 of 50 U.S. states, evidence of microplastics mucking up wastewater recycling and the science of a baseball mud bath in this week’s news roundup......»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Scientists compile library for evaluating exoplanet water
By probing chemical processes observed in the Earth's hot mantle, Cornell scientists have started developing a library of basalt-based spectral signatures that not only will help reveal the composition of planets outside of our solar system but could.....»»
New York drought conditions fan flames, spur water saving
New York has urged its 8.5 million residents to save water as America's biggest city endures an unprecedented period without significant rainfall, creating potentially dangerous drought conditions and fanning the flames of deadly wildfires......»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Colorado River basins could face tipping point, drought study warns
Water from Colorado's West Slope basins plays a vital role in supporting the economy and natural environment across seven western U.S. states, but a new study finds that even under modest climate projections, the basins face a potential tipping point.....»»
Researchers call for recognition of tire particles as a distinct environmental threat
A new study led by an international team of scientists highlights tire particles (TPs) as the leading contributor to microplastics and calls for urgent, targeted research to address their unique environmental and health risks......»»
Meteorite contains evidence of liquid water on Mars 742 million years ago
An asteroid struck Mars 11 million years ago and sent pieces of the red planet hurtling through space. One of these chunks of Mars eventually crashed into the Earth somewhere near Purdue University and is one of the few meteorites that can be traced.....»»
Metal-organic framework materials to remove dye contaminants for cleaner water
The future of MOFs, metal-organic framework materials, looks bright. A review in the International Journal of Environment and Waste Management has looked at how a specific class of these sponge-like materials might find increasing use in removing dye.....»»
Agrivoltaics for sustainable food, energy and water management in East Africa
Combining solar power production with agriculture can significantly boost crop yields, conserve water and generate low-carbon electricity for areas particularly vulnerable to climate change, a new study has shown......»»
Infostealers increasingly impact global security
Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the gl.....»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
This elephant figured out how to use a hose to shower
A younger rival may have learned how to sabotage those showers by disrupting water flow. Mary the elephant shows off her hose-showering skills. Credit: Urban et al./Curren.....»»
Low-cost method removes micro- and nanoplastics from water
Researchers at the University of São Paulo (USP) in Brazil have developed a novel nanotechnology-based solution for the removal of micro- and nanoplastics from water. Their research is published in the journal Micron......»»
Cacti are surprisingly fragile, and five other intriguing facts about these spiky wonders
Few plant families are as iconic as the resilient, spiky cactus, thriving in the driest deserts and as well as decorating our offices and homes. Their success in both environments comes down to extreme adaptations for surviving with little water—wh.....»»
BlackFog platform enhancements boost data loss prevention
BlackFog launched its next generation enterprise platform to deliver even more powerful ransomware and insider threat prevention. BlackFog’s pioneering platform focuses specifically on anti data exfiltration to prevent unauthorized data from leavin.....»»
Plant roots key to water movement and wetland restoration
A new study has revealed the critical role of plant roots in enhancing water movement through wetland soils, offering valuable insights for ecosystem restoration and water management in coastal and saline wetlands in Western Australia......»»
Massive troves of Amazon, HSBC employee data leaked
A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p r.....»»
Immersive Labs AI Scenario Generator improves cyber skills against various attack types
Immersive Labs introduced AI Scenario Generator. This new capability enables organizations to generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. By inputting a few short prompts, customers ca.....»»
North Korean hackers use infected crypto apps to target Macs
North Korean hackers have disguised malware in seemingly harmless macOS apps using sophisticated code to bypass security checks and target unsuspecting users.Malware apps continue to target Mac usersIn a recent discovery, researchers at Jamf Threat L.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»