Snowflake shares pop 19% on earnings and revenue beat

Snowflake shares spiked 19% in extended trading on Wednesday after the data analytics software maker reported fiscal third-quarter earnings that beat estimates. Here’s how the company did, compared to LSEG analysts’ expectations: Earnings per share: 20 cents, adjusted vs. 15 cents expected Revenue: $942 million vs. $897 million expected Snowflake’s revenue rose 28% year over […]

Continue Reading

NASA Showcases New AI Tools That Can Help In Scientific Research

At the Supercomputing Conference or SC2024, NASA’s Associate Administrator for the Science Mission Directorate, Nicola Fox, detailed new computational tools intended to advance space science. NASA plans to employ a large language model across its science divisions, bolstered by foundation models tailored to Earth science, heliophysics, astrophysics, planetary science, and biological and physical sciences. This […]

Continue Reading

Despite Finding No Evidence of UFO Sightings, US Govt Agency Raises Doubt

In a recent Senate testimony, Jon T. Kosloski, Director of the Pentagon’s All-Domain Anomaly Resolution Office (AARO), clarified the office’s stance on unidentified anomalous phenomena (UAP) and their ongoing investigations. Speaking to the U.S. Senate Armed Services Subcommittee on Emerging Threats and Capabilities on November 19, Kosloski emphasised that AARO has yet to uncover verifiable […]

Continue Reading

Nvidia to report third-quarter earnings after the bell

Nvidia CEO Jensen Huang arrives at the launch of the supercomputer Gefion, at the Vilhelm Lauritzen Terminal in Kastrup, Denmark, Oct. 23, 2024. Ritzau Scanpix | Mads Claus Rasmussen | Via Reuters Nvidia reports fiscal third-quarter earnings Wednesday after the market closes. Here’s what Wall Street is looking for, per LSEG consensus estimates: Revenue: $33.16 […]

Continue Reading

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple […]

Continue Reading

Alphabet’s VC arm backs little-known SAP rival Odoo, boosting valuation to $5.3 billion

Fabien Pinckaers, CEO of Belgian-based enterprise software startup Odoo. Odoo Odoo, a startup taking on SAP in the realm of enterprise software, boosted its valuation to 5 billion euros ($5.3 billion) in a secondary share round led by Alphabet‘s venture fund and Sequoia Capital. The Belgium-based company develops open-source enterprise resource planning software, with over […]

Continue Reading

Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package

Nov 20, 2024Ravie LakshmananLinux / Vulnerability Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction. The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, […]

Continue Reading

Ancient DNA Reveals 7,000 Years of Adaptation in Early Europeans

A recent study conducted by researchers from The University of Texas, Austin and the University of California, Los Angeles, has given significant insights into how ancient European populations adapted to their environments over 7,000 years. Published in Nature Communications, the research utilised ancient DNA from skeletal remains, applying advanced statistical techniques to detect genetic changes […]

Continue Reading

NHIs Are the Future of Cybersecurity: Meet NHIDR

Nov 20, 2024The Hacker NewsIdentity Security / Cyber Defense The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in […]

Continue Reading