Tree Crops Overlooked in Policies Despite Critical Role in Sustainability Goals

Tree crops, including apples, cherries, olives, nuts, coffee, and cacao, account for more than 183 million hectares of agricultural land globally. Despite their significant contribution to food production, livelihoods, and ecological balance, these crops have been largely overlooked in agricultural policymaking. Their potential to address global sustainability challenges, protect biodiversity, and mitigate climate change has […]

Continue Reading

Tough new EU cyber rules require banks to ramp up security — but many aren’t ready

New regulations are forcing organizations to take cybersecurity more seriously. Sean Gladwell | Moment | Getty Images Tough new European Union regulations requiring banks to bolster their cybersecurity systems officially come into effect Friday — but many of the bloc’s financial services firms aren’t yet in full compliance with the rules. The EU’s Digital Operational […]

Continue Reading

NASA’s Hubble reveals the blue lurker star in M67, shedding light on stellar mergers and evolution

A rare stellar phenomenon, termed the “blue lurker,” has been observed by NASA’s Hubble Space Telescope within the open star cluster M67, located approximately 2,800 light-years away. This star, part of a unique triple-star system, has captivated researchers due to its unusual evolutionary history. Identified for its accelerated spin rate and distinct characteristics, the blue […]

Continue Reading

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access, protecting data, maintaining compliance across […]

Continue Reading

New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Threat Intelligence Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected […]

Continue Reading

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

Jan 17, 2025Ravie LakshmananInsider Threat / Cryptocurrency The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People’s Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source […]

Continue Reading

Apple Disables Notifications Summaries for These Apps on iOS 18.3 Beta 3

Apple has reportedly disabled its Apple Intelligence notification summaries feature for some apps after facing backlash over error-laden summaries for news headlines. The artificial intelligence (AI) tool recently summarised a Washington Post news notification inaccurately, garnering flak from users and news publications. Last month, the BBC claimed that iOS 18 generated an incorrect summary of […]

Continue Reading

Sony Cancels Two More PlayStation Projects in Broader Retreat

Sony Group Corp.’s PlayStation has canceled previously unannounced games at two of its top subsidiaries, the company said Thursday. The games, at Oregon-based Bend Studio and Texas-based Bluepoint Games, were both “live service” projects designed to draw recurring revenue from players.  A company spokesperson confirmed the cancellations. In a statement, the spokesperson said the two […]

Continue Reading

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users’ data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield […]

Continue Reading

Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims’ WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. “Star Blizzard’s targets are most commonly related to government or diplomacy (both […]

Continue Reading