Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • OODA Special Report: Digital Transformation in the Transportation Sector

    This OODA special report focuses on the Transportation Sector. It is written both for firms that are in the sector who are seeking competitive advantage and for firms in other sectors that can use this awareness for strategic planning (all our market based special reports are available on our OODA network resources page). As a…

  • What Business Leaders Need To Know Regarding Hong Kong District Council Election Results (yes it probably will impact your business)

    Elections in Hong Kong have just given a major win to pro-democracy supporters. There are many other challenges in China right now. Most of the world has woken up to their never ending tactics of stealing intellectual property, hacking systems for gain, abusing trade agreements, manipulating currency, illegally claiming territory etc. The final resolution of…

  • OODA Special Report: Digital Transformation in the Energy Sector

    This OODA special report focuses on the Energy Sector. It is written both for firms that are in the sector and for those that seek to serve it with the products and services they need. Companies in this sector provide functions like exploration, production, marketing, refining and/or transporting of oil and gas products, coal and…

  • OODA Network Interview: Bob Baxley

    Dr. Bob has spent his life studying and manipulating and exploring the advanced nuances of signals processing.  What he has been able to build at Bastille completely exposes the RF spectrum, making it easy to see and understand what is going on in your physical space.   Read about his hard earned lessons, and where the…

  • OODA Network Interview: Cameron Forbes Over

    There are not a lot of high schoolers that get an opportunity to intern at the Defense Information Systems Agency, but Cameron Forbes Over parlayed that experience into a decades long career as a cybersecurity profession currently running a robust practice at CrossCountry Consulting. “If executives don’t clearly understand the risk, he/she won’t make the…

  • Observations From America’s Most Public Cyber Attacks

    The conduct of U.S. military cyber operations has significantly shifted—particularly in the last year. The Department of Defense’s newest cyber strategy, issued in September 2018, emphasizes a “persistent engagement” approach that moves the Department from a reactive state into a more proactive, assertive stance against national security threats in the cyber domain. This is also…

  • OODA Network Interview: Neal Pollard

    Neal Pollard is the CISO of UBS and has steadily built his career to safeguard people and information in a time of terrorism and cyber threats.   Neal knows that how we respond to a significant incident can be the difference between success and failure.  Read about how he has honed his career to become an…

  • OODA Network Interview: Bobbie Stempfley

    Bobbie Stempfley has made huge contributions to our national cyber defense efforts for three decades through leadership roles within DISA, DHS, and now as the head of the CMU CERT.  In this interview, Bobbie highlights her path in the industry and provides insights for future security concerns and building resiliency into your technology and organization.…

  • What Kleptocratic Support for Cybercriminals Means for Russian Cybersecurity Services

    The use of deniable actors is hardly unique to Russia, but the state’s complicity and even outright involvement in organized crime is. OODA’s reports “The Russian Threat” suggests that “Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs.”…

  • Cybercriminals as the Russian State’s Deniable Proxies

    Putin’s Russia has demonstrated a penchant for relying on proxies to provide a degree of deniability while pursuing its military objectives. As noted in Christoph Zürcher’s book The post-Soviet wars: Rebellion, ethnic conflict and nationhood in the Caucasus, Putin’s popularity emerged in large part due to his successful resolution of the conflict with Chechnya, which…

  • The Five Most Dangerous Criminal Organizations Acting As Proxies for the Russian State

    The December 2016 “Grizzly Steppe” joint analysis report issued by the FBI and DHS provided a table of monikers attributable to various Russian cybercriminal organizations serving the state’s intelligence services. However, understanding what these names refer to is a challenge in and of itself. As noted by Florian Roth in a 2018 Medium article, similarities…

  • What We All Need To Know About The Impacts of A Truly Global Internet

    Humans are more connected now than ever before. However, half the global population is behind on the digital revolution and there is great regional disparity in the availability of affordable Internet. While reports show a growth rate of one million new users a day from 2018-2019, approximately 3 billion people are still not connected. SpaceX,…

  • OODA Network Interview: Rama Polefka

    Rama Polefka  at Black Mountain Dynamics noticed a trend a long time ago: Young companies need a robust, powerful, secure IT infrastructure.  But their founders are often so busy creating the company, the IT lags behind and compromises their growth. He has spent his career working with startups to grow their IT at exactly the right…

  • Future Proof Conference Announced

    OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia. The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into…

  • What You Need To Know About Hostile Social Manipulation

    A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used…

Briefs

  • Taiwan Probes Firms Suspected of Selling Chip Equipment to China’s Huawei Despite US Sanctions

    Taiwan authorities are investigating four Taiwan-based companies suspected of helping China’s Huawei Technologies to build semiconductor facilities. Minister of Economic Affairs Wang Mei-hua said Friday that the investigation will determine if the companies have violated regulations prohibiting sales of sensitive technologies and equipment to China. The investigation also will study whether the companies exported any…

  • Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks 

    Several hacker groups have joined in on the Israel-Hamas conflict escalation that started over the weekend after the Palestinian militant group launched a major attack. Hundreds have been killed and thousands have been wounded on both sides as a result of the conflict escalation. In addition to the state-sponsored actors that have likely ramped up…

  • Incentivizing Secure Online Behavior Across Generations

    As the landscape of online security continues to evolve, there is a noticeable shift in people’s perceptions of cybersecurity, with an increasing awareness of its vital role in staying safe online, according to a survey conducted by the National Cybersecurity Alliance (NCA) and CybSafe. However, despite positive trends, there are concerns about access to adequate…

  • DC Board of Elections Discloses Data Breach

    On Friday, the District of Columbia Board of Elections (DCBOE) confirmed that voter records were compromised in a data breach at a third-party services provider. The incident came to light after a relatively new ransomware group named RansomedVC claimed to have breached DCBOE’s systems, exfiltrating more than 600,000 lines of US voter records. The stolen…

  • 23andMe Cyberbreach Exposes DNA Data, Potential Family Ties

    23andMe, the popular DNA testing company, has launched an investigation after client information was listed for sale on a cybercrime forum this week. The information leaked in the breach includes names, usernames, profile photos, gender, birthdays, geographical location, and genetic ancestry results. Recycled login credentials accessed from other cyber incidents were used to gain access…

  • AI-based algorithm uses “compressed evolution” to create functional robots

    Evolution is a very slow process, due largely to the fact that nature doesn’t “know” in advance which features of an animal will be beneficial. A new AI-based algorithm does know, however, allowing it to design purpose-specific robots within a matter of seconds. The algorithm was developed by a team of American scientists led by…

  • China to double the size of its space station as it offers an alternative to NASA-led ISS

    China plans to expand its space station to six modules from three in coming years, offering astronauts from other nations an alternative platform for near-Earth missions as the NASA-led International Space Station (ISS) nears the end of its lifespan. The operational lifetime of the Chinese space station will be more than 15 years, the China…

  • ChatGPT-owner OpenAI is exploring making its own AI chips

    OpenAI, the company behind ChatGPT, is exploring making its own artificial intelligence chips and has gone as far as evaluating a potential acquisition target, according to people familiar with the company’s plans. The company has not yet decided to move ahead, according to recent internal discussions described to Reuters. However, since at least last year…

  • North Korea Suspected in Massive Hack of DeFi Project Mixin

    The massive breach of a decentralized finance project bears the hallmarks of a North Korean attack, according to a senior White House official. Mixin Network, which helps blockchains handle transactions more efficiently, said it had lost less than $150 million in a late-September attack. Originally the company estimated it lost $200 million but reduced it…

  • Hackers With AI Are Harder to Stop, Microsoft Says

    Hackers are using AI and encryption in new ways to make cyberattacks more painful, according to new research from Microsoft. Stealthier attacks are being crafted by hackers using both artificial intelligence tools that have been on the market for a while and generative-AI chatbots that emerged last year, said Tom Burt, Microsoft’s corporate vice president…

  • Syria war: Dozens killed in drone attack on graduation ceremony

    A drone attack on a Syrian military academy in Homs has killed at least 89 people, according to Syria’s health ministry. The explosive-laden drones targeted a graduation ceremony, with women and children among the casualties. A UK-based monitoring group reported 116 people killed. The Syrian army blamed the attack on “terrorist groups backed by known…

  • Ukraine cyber-conflict: Hacking gangs vow to de-escalate

    Two major hacktivist groups involved in the Ukraine conflict, Killnet and the IT Army of Ukraine, have pledged to comply with the International Committee of the Red Cross (ICRC) rules for civilian hackers. These rules, dubbed a “Geneva Code of cyber-war,” are designed to reduce cyberattacks that impact civilians. Both groups have been involved in…

  • Iran’s activist Narges Mohammadi wins Nobel Peace Prize

    Narges Mohammadi, an imprisoned Iranian human rights activist, has been awarded the 2023 Nobel Peace Prize for her tireless efforts to combat the oppression of women in Iran and promote human rights and freedom for all. This award recognizes her courageous fight against discrimination and oppression, particularly targeting women in Iran. Ms. Mohammadi is currently…

  • AWS to Mandate Multi-Factor Authentication from 2024

    Amazon Web Services (AWS) said it will require multi-factor authentication (MFA) for all privileged accounts starting mid-2024, in a bid to improve default security and reduce the risk of account hijacking. MFA is a critical step to mitigate the risks posed by phishing attacks on employees. An IBM X-Force study last month revealed that the…

  • GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks

    On Wednesday, software development giant GitHub announced an enhancement to its secret scanning feature, now allowing users to check the validity of exposed credentials for major cloud services. The secret scanning feature is meant to help organizations and developers identify potentially exposed secrets in their repositories and take immediate action. Backed by a large number…

  • Enterprises see AI as a Worthwhile Investment

    92% of AI team leaders at leading-edge organizations felt that their AI initiatives are generating value, according to Wallaroo.AI. Having found a successful formula, most of those surveyed plan to dramatically increase their spend on ML and use of ML models in the near term. Despite prior industry research indicating that 90% of AI initiatives…

  • Poor Cybersecurity Habits are Common Among Younger Employees

    According to Ivanti, research shows that Millennial and Gen Z office workers are more likely to have unsafe cybersecurity habits when compared to Gen X and older. They tend to have unsafe practices involving password hygiene, clicking on phishing links, and sharing devices with family and friends. In addition, the report finds that men and…

  • Microsoft and Amazon face UK regulator investigation over cloud services

    The clouds are gathering over Microsoft’s Azure operations in the EU and now the UK, with the launch of a new investigation into major cloud service providers that also includes Amazon. The UK’s Competition and Markets Authority (CMA) is just about to wrap up its concerns over cloud gaming with Microsoft’s proposed Activision Blizzard acquisition,…

  • AI won’t realize its potential without web3

    Headlines touting the allure of artificial intelligence’s (AI) disruptive potential might make it seem like we’re already on the cusp of a completely automated and decentralized future. However, the reality is that, while this will be a transformative journey, it will likely be an incremental one over the next decade. First applications will be built…

  • Google DeepMind unites researchers in bid to create an ImageNet of robot actions

    Of all the holy grails in robotics, learning may well be the holiest. In an era when the term “general purpose” is tossed around with great abandon, however, it can be difficult for non-roboticists to understand what today’s systems can — and can’t — do. The truth of it is that most robots these days…

  • Prada and Axiom Space collaborate to design NASA’s lunar spacesuits

    Axiom Space has selected an unconventional partner to assist in its development of spacesuits that will be worn by the next NASA astronauts to walk on the moon. Prada, the Italian luxury fashion house, announced Oct. 4 that they would collaborate on spacesuits Axiom is developing for use on Artemis missions, starting with Artemis 3…

  • Google launches Pixel 8, smartwatch with new AI feature

    Alphabet’s Google on Wednesday launched Pixel 8 smartphones and a new smartwatch that integrate its artificial intelligence (AI) technology more deeply into the company’s consumer gadgets. Google’s flagship Pixel smartphone has a fraction of Apple’s iPhone sales, but it is designed to show how Android products push the limits of available technology. Pixels are popular…

  • Bing Chat LLM Tricked Into Circumventing CAPTCHA Filter

    A user on the X platform devised and executed a plan that caused Bing Chat to solve a CAPTCHA filter last week. CAPTCHA filters are visual puzzles that are easy to solve by humans, but are difficult for automated programs. These filters help prevent applications like bots from filling out forms on the internet. Bing…

  • CISA, NSA Publish Guidance on IAM Challenges for Developers, Vendors

    The US cybersecurity agency CISA and the NSA have published new guidelines for implementing identity and access management. This guidance focuses specifically on the challenges facing developers and vendors. The guidance was released six months after guidance for IAM administrators and is intended for large organizations. The new publication focuses on best practices to help…

  • Glacial lake bursts in India leaving 100 missing and 14 dead

    More than 100 people are missing in the northeast region of India after heavy rain caused a glacial lake to burst. The rain caused flash floods to rip through the Himalayan state of Sikkim Wednesday, killing at least 14 and washing away roads and bridges. The water traveled down the Teesta River in Sikkim’s Lachen…

  • US gives 1.1 million rounds of ammunition seized from Iran to Kyiv

    The United States has sent approximately 1.1 million bullets seized from Iran last year to Ukraine. The US Central Command (Centcom) oversees operations n the Middle East and says the rounds were confiscated from a ship bound for Yemen in December. Ukraines Western allied warned their production lines were struggling to keep up with the…

  • Biden approves new section of border wall as Mexico crossings rise

    US President Joe Biden has approved the building of a section of border wall in southern Texas in an effort to slow rising immigration levels. 20 miles of border wall will be built in Starr County along its border with Mexico, where officials are reporting high numbers of crossings. The US Customs and Border Protection…

  • Israeli troops kill two Palestinians in occupied West Bank confrontation

    Israeli troops killed two Palestinians in a confrontation with gunmen in the occupied West Bank, according to military and medical officials. Israel’s military said that a gunfight had erupted after soldiers identified a suspicious vehicle on Thursday near Shufa village, in the Tulkarem area. This is not the first raid carried out by Israelis in…

  • Anthropic seeks huge investment from Google just days after Amazon invested billions

    Anthropic has emerged as one of the best-funded rivals to OpenAI LP in generative artificial intelligence, but despite raising billions of dollars already, it’s still seeking more. According to a report today in The Information, Anthropic is now holding talks with investors, including Google LLC, about a new $2 billion funding round. It comes after Amazon.com…

  • EU to assess export controls on sensitive tech to China

    The EU is to examine bloc-wide export controls in sensitive technology as part of its attempt to “de-risk” its relationship with China and other authoritarian regimes. The European Commission has identified four areas — semiconductors, artificial intelligence, quantum computing and biotechnology — in which to assess whether the bloc should ban the transfer of some…

  • China’s next moon mission aims to do what no country has ever done. Its space ambitions don’t end there

    China’s lunar mission to bring back the first samples ever collected from the moon’s far side is on schedule for next year, officials say, as Beijing ramps up its ambitious plan to send astronauts to the moon this decade and build an international lunar research station. Preparations for the next planned mission – known as Chang’e-6…

  • Why Evolving AI Threats Need AI-Powered Cybersecurity

    The urgency to fortify defenses against the weaponization of Artificial Intelligence (AI) in cyberattacks has never been greater. Adversaries can now harness AI to launch targeted cyberattacks with unprecedented precision and exploit vulnerabilities at speeds and scales unattainable by human hackers. AI can also be used to craft highly convincing phishing emails, create malware that…

  • US sanctions Chinese firms in crackdown on fentanyl supply chain

    The United States has imposed sanctions on 25 China-based entities and individuals involved in the production of chemicals used to make the potent opioid, fentanyl, which plays a significant role in the US drug crisis. The US alleges that the fentanyl supply chain often starts with Chinese chemical companies. China has criticized the sanctions, arguing…

  • Asian Games: China censors ‘Tiananmen’ image of athletes hugging

    A photo of two Chinese female athletes with race numbers forming the number “64” has been censored on Chinese social media due to its inadvertent reference to the Tiananmen Square massacre that occurred on June 4, 1989, where troops shot and killed hundreds of pro-democracy protesters in Beijing. Discussions of the incident remain taboo in…

  • Marina Ovsyannikova: Anti-war Russian journalist sentenced in absentia

    Russian journalist Marina Ovsyannikova, who staged an on-air protest against Russia’s invasion of Ukraine, has been sentenced to 8.5 years in prison by a Moscow court. The 45-year-old was convicted in absentia for “spreading knowingly false information” about the Russian armed forces and had fled Russia with her daughter after escaping house arrest. She called…

  • Venice tourist bus plunges from bridge, killing 21

    A tragic bus accident near Venice has claimed the lives of at least 21 people, including several children, as the electric bus broke through a barrier and plunged nearly 50 feet from a flyover, bursting into flames near railway tracks in Mestre, which connects to Venice. The victims included five Ukrainians, one German, and the…

  • Google, Yahoo Boosting Email Spam Protections

    Google and Yahoo have jointly announced new email security requirements to enhance protection against phishing and spam. Beginning in the first quarter of the following year, both email providers will mandate bulk senders to authenticate their emails using industry best practices, aiming to bolster user trust in email sources and prevent misuse by attackers exploiting…

  • Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions

    A vulnerability known as “Looney Tunables” has been identified in the GNU C Library (glibc), affecting major Linux distributions like Debian, Fedora, and Ubuntu. Tracked as CVE-2023-4911, this vulnerability impacts glibc’s dynamic loader, which loads libraries into memory and resolves symbol references for programs. Attackers can exploit this vulnerability to achieve full root privileges on…

  • Lyca Mobile Services Significantly Disrupted by Cyberattack

    International mobile virtual network operator (MVNO) Lyca Mobile has confirmed that it suffered a cyberattack that disrupted services for several days. The attack, which began late last week, affected customers and retailers’ access to top-ups and impacted national and international calling. While Lyca Mobile has not provided detailed information about the incident, it is investigating…

  • New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks

    A study conducted by cybersecurity company Binarly has found multiple vulnerabilities in Supermicro’s Baseboard Management Controller (BMC), a special chip on server motherboards that supports remote management. The most severe of these vulnerabilities are three cross-site scripting (XSS) flaws in the BMC server frontend that could be exploited remotely, without authentication, to execute arbitrary JavaScript…

  • Key Taiwan Tech Firms Helping Huawei With China Chip Plants

    Several Taiwanese technology companies are helping Huawei Technologies Co. build infrastructure for an under-the-radar network of chip plants across southern China, an unusual collaboration that risks inflaming sentiment on a democratic island grappling with Beijing’s growing belligerence. On a scorching summer afternoon in Shenzhen in late August, one vast, nearly-finished construction site established by a…

  • Nearly half of CEOs believe that AI not only could—but should—replace their own jobs

    Since the explosive launch of ChatGPT, there has been a prevailing fear among workers that employers would leverage artificial intelligence to cut costs by replacing human jobs. However, new research has unveiled an interesting twist: CEOs are contemplating replacing their own roles with AI. Researchers from edX, an education platform for upskilling workers, conducted a survey…

  • NATO testing underwater drones off the coast of Europe to deter Russia

    NATO is testing new sea drones that can use artificial intelligence to detect suspicious activity near underwater infrastructure. Fourteen members of the NATO alliance, along with Sweden, have teamed up for multiple exercises over 12 days off the coast of Portugal to test underwater sea drones that have real-time ability to send “a deterrence signal to…

  • US government issues first-ever space debris penalty to Dish Network

    The US Federal Communications Commission (FCC) has issued its first fine to a company that violated its anti-space debris rule, the commission announced on Monday. Dish Network has to pay $150,000 to the commission over its failure to deorbit its EchoStar-7 satellite, which has been in space for more than two decades. Instead of properly deorbiting…

  • How Big Tech is co-opting the rising stars of artificial intelligence

    In 2021, a group of engineers abandoned OpenAI, concerned that the pioneering artificial intelligence company had become too focused on making money. Instead, they formed Anthropic, a public-benefit corporation dedicated to creating responsible AI. This week, the do-gooders at Anthropic threw in with a surprisingly corporate partner, announcing a deal with Amazon worth up to…

  • Mali in meltdown as militants advance and U.N. withdraws

    The United Nations began winding down its peacekeeping mission in Mali in July. As U.N. forces withdraw, various militant groups have launched offensives across the country. Al Qaeda-affiliated Jama’at Nusrat al-Islam wa al-Muslimin (JNIM) militants have launched a series of offensives in central Mali, and Islamic State-allied insurgents have carried out attacks in the eastern…

  • After Ankara bombing, Turkey hits back in Iraq and at home

    The Kurdistan Workers Party (PKK) claimed responsibility for a recent bombing attack near government buildings in Ankara. One bomber was killed in the blast, while the other was killed by Turkish security forces. Two Turkish police officers were injured in the blast. The Turkish Armed Forces responded with airstrikes against 20 PKK targets in Iraq’s…

  • 100k exposed systems endanger power, traffic, water utilities

    Bitsight researchers identified nearly 100,000 exposed industrial control systems (ICSs) that could allow attackers to seize control of various physical infrastructure elements. The report specifically identified power grids, traffic light systems, and water systems that are vulnerable to attacks. The research team looked at systems communicating with widely used ICS protocols, including Modbus, KNX, BACnet,…

  • Silent Skimmer: A Year-Long Web Skimming Campaign Targeting Online Payment Businesses

    The BlackBerry Research and Intelligence Team discovered a financially motivated skimming campaign targeting online businesses based in the Asia Pacific, North America, and South America. The team attributed the year-long campaign to a threat actor with significant Chinese language experience. The “Silent Skimmer” campaign targeted the payment checkout page and attempted to swipe customers’ sensitive…

  • European Telecommunications Standards Institute Discloses Data Breach

    The European Telecommunications Standards Institute (ETSI) is a not-for-profit organization that supports the development and testing of technical standards for communication technologies. The organization recently announced that it suffered a cyberattack on its member portal. The attackers successfully stole a database containing information on ETSI’s online users. The organization has over 900 members from 65…

  • Two Syrian soldiers injured in Israeli air attack on army sites in Deir al Zor

    Syrian state media announced that Israel conducted an air attack on Syrian armed forces sites in the eastern Deir al Zor province on Monday. The military action injured two Syrian soldiers and destroyed various facilities. The Israeli army has not commented on the alleged attack. The strike is likely part of Israel’s larger campaign against…

  • Live Exploitation Underscores Urgency to Patch Critical WS-FTP Server Flaw

    Vulnerability researchers at Rapid7 discovered threat actors targeting a pre-authentication flaw in Progress Software’s WS_FTB server. The attacks come just days after the company released security patches for the server product. CVE-2023-40044 is a critical severity flaw that affects all WS_FTP Server versions prior to 8.7.4 and 8.8.2. Rapid7 researchers noted that attackers utilized the…

  • UN authorizes Haiti security mission to fight gangs

    The United Nations Security Council authorized a Multinational Security Support mission to fight gang violence in Haiti on Monday. Haiti’s Foreign Minister Jean Victor Geneus described the action as a “glimmer of hope” for the Haitian population. All members of the Security Council voted in favor of the initiative except China and Russia, which abstained.…

  • AMD CEO Lisa Su on the AI revolution and competing with Nvidia

    Dr. Lisa Su, the CEO of AMD. Lisa and I spoke for half an hour, and we covered an incredible number of topics, especially about AI and the chip supply chain. These past few years have seen a global chip shortage, exacerbated by the pandemic, and now, coming out of it, there’s suddenly another big…

  • Agility Robotics set to open ‘world’s first factory for humanoid robots’

    Agility Robotics, creator of the bipedal humanoid robot Digit, says it is planning to open what it calls “RoboFab”, the company’s robot manufacturing facility in Salem, Oregon with the capability to produce more than 10,000 robots per year. Initial construction of Agility’s 70,000 square foot robot factory began last year, and it is set to open…

  • Web3 Lost Over $890 Million to Hacks and Scams in Q3 2023

    Beosin EagleEye platform, a subsidiary of Beosin, a blockchain security audit company, revealed in a research report that Web3 lost approximately $890 million to various security breaches, phishing scams, and rug pulls in the third quarter of 2023. Breaking down the losses, it was revealed that 43 separate hacker attacks led to a cumulative loss…

  • New Lockheed Martin system will manage satellite constellations from the cloud using AI

    Lockheed Martin just announced a new “Operations Center of the Future,” a new facility that the company hopes will make its growing constellations of Earth-orbiting satellites easier to manage. Situated near Denver, this facility is a major innovation in satellite operations, company representatives said, with the capacity to handle multiple space missions at once through a…

  • What the Patent Eligibility Restoration Act Means for Artificial Intelligence Inventions

    The Patent Eligibility Restoration Act (PERA) is no doubt an ambitious bill. In terms of its design, the proposed legislation attempts to deal with each of the Supreme Court’s decisions in Alice, Mayo and Myriad, plus all of their progeny applications thereafter engendered by the Federal Circuit, the Patent Trial and Appeal Board (PTAB), all…

  • UK Awards $4bn Contract to Build AUKUS Nuclear Submarines

    The United Kingdom has awarded three UK companies a 4 billion pound ($4.9bn) contract to design and manufacture a nuclear-powered attack submarine as part of the country’s AUKUS programme with Australia and the United States. In a statement, the UK Ministry of Defense, said the new submarines known as SSN-AUKUS, “will be the largest, most…

  • Serbia Denies US, EU Reports of Military Build-Up Along Kosovo Border

    Serbia has denied reports of a military build-up along the border with Kosovo, alleging a “campaign of lies” against his country in the wake of a shootout a week earlier that killed four people and fuelled tensions in the volatile Balkan region. Earlier this week, the United States urged Belgrade to pull its forces back…