Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • InfoWar 1992-2012

    Matt Devost and Winn Schwartau talk discuss what has happened in the information warfare and cyberconflict space over the past twenty years.

  • Radioactive Thefts and Dirty Bomb Threats

    The recent theft of a truckload of highly radioactive material in Mexico unearthed a series of panicked questions about the homeland security threat of dirty bombs. “What are they?”, “what can they do?”, “who has them?”, and “who could have them?” were questions the media found themselves mostly unprepared to answer. Before long, however, the…

  • Did Snowden Escalate the Cyberwar?

    Edward Snowden is guilty of lot of things. But contrary to Kurt Eichenwald’s recent Newsweek analysis, he did not “escalate the cyberwar.” Eichenwald interviews a host of business, intelligence, cybersecurity, and Asia experts and argues that Edward Snowden’s disclosures deep-sixed any American attempt to restrain China’s epidemic computerized corporate, technical, and military-intelligence espionage. Because the US’s…

  • Football and the Illusive Stability of Coalition Governments in the MENA States

    An Arab Spring political cycle is emerging. Single-party domination gives way to multi-party democracy which crumbles back into single-party domination. Football: An Introductory Anecdote Sitting with a group of western-educated, politically active Tunisians at a restaurant in Tunis, I commented on my surprise at the absence of soccer-playing children. I had been there for ten…

  • The Growing Threat of Maritime Terrorism

    Introduction The 21st century has seen large-scale, well-organized terrorist attacks by Islamist terrorists on nearly every continent. These same terrorists and terrorist organizations have leveraged the cyber domain to support recruitment, training, and attacks. The maritime frontier, however, is perhaps the one that has continued comparatively untouched throughout the history of modern Islamist terrorism. Attacks…

  • Frame Reflection:A Critical Review of US Military Approaches to Complex Situations

    We are pleased to present this monograph on frame reflection. As the authors note: “Our hope is that the insights gained from institutional barriers in the modern military may provide insights for designers in other walks – with ideas on framing messy situations. We have advocated that frame reflection is essential to design practice in…

  • Why “Cyberwar” Isn’t Happening

    “Cyberwar” is an imprecise and ugly term. Equal parts misleading and ambiguous, the term cyberwar has somehow battled its way into our modern lexicon and is used vaguely to describe acts of virtual aggression. Most often, cyberwar is used to describe an ill-defined and inevitable sate of computer-centric conflict between two nation states or groups.…

  • We’re only Human: Addressing the Cyber Threat Origin

    Private entities are pouring money and manpower into creating the best technologies to help mitigate a host of threats in the cyber realm. The US federal government is increasingly following this strategy. Yet, even cutting edge technology cannot determine one of the most critical and elusive intelligence questions: motivation. What drives the adversary? What does…

  • Destruction and Creation

    To comprehend and cope with our environment we develop mental patterns or concepts of meaning. The purpose of this paper is to sketch out how we destroy and create these patterns to permit us to both shape and be shaped by a changing environment. In this sense, the discussion also literally shows why we cannot…

  • Skid Row Terrorist

    The rubric of terrorism studies embeds terrorist TTPs (Tactics, Techniques, and Procedures) within the overall context of motivations and intent that a terrorist are/is presumed to have. This is further fundamentally subordinate to the over-arching al-Qaeda framework. However, if we consider characters such as the ‘dishevelled or nihilist terrorist’ (Flaherty, 2012), then terrorist TTPs have…

  • The Cyber Moscow Rules: Trust no one. Trust no device.

    Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as “Moscow Rules.” Those old rules existed for a reason. Real-world experience proved their effectiveness when agents had to operate in the presence of adversaries. Since modern cyber defenders are also…

  • When Armies Divide: The Security of Nuclear Arsenals During Revolts, Coups, and Civil Wars

    In this brief volume Jenkins takes a detailed look at the General’s putsch, which was a 1961 coup attempt by a group of retired French Generals against President Charles de Gaulle. However, it is not the putsch itself that attracts Jenkins’ analytical attention, but the chaos surrounding the status of a nuclear device that was…

  • West Africa: Terrorism’s New Front Yard

    Introduction There is a new front in the global fight against terrorism and terrorists. Ethnic, religious, and political tensions in West Africa, simmering for the past few years, have boiled over into widespread violence and coordinated military efforts throughout the region. A recent attack at an oil facility in Algeria has highlighted the wealth of…

  • Slavery and Human Trafficking in 2013

    Introduction Reports and statistics from the UN, national governments, and politically diverse NGO’s demonstrate that human trafficking and slavery are as common today as they were during the years when transAtlantic slave trading was a legal enterprise. Estimates place the number of global victims as high as 29 million. The reality of this twenty-first century…

  • Adam Lanza and Dangerous Minds

    We asked Chris Flaherty, author of the recent OODA sponsored monograph entitled “Dangerous Minds: The Relationship between Beliefs, Behaviors, and Tactics” for his thoughts regarding the recent Adam Lanza attacks. What follows is his response. “Adam Lanza, has been the subject of much media speculation, however if some of the reporting is to be credited…

Briefs

  • $24bn for Ukraine Tops Biden Budget Request Ahead of Looming Showdown

    United States President Joe Biden has submitted a request for about $40bn in additional spending, with over half slated to go towards support for Ukraine. This request has come as the Ukrainian counteroffensive has slowed. While aid to Ukraine has bipartisan support, a group of far right Republicans have grown resistant to providing more funding,…

  • Russia Launches Lunar Lander in Race to Find Water on Moon

    Russia launches its first moon-landing spacecraft in 47 years on Friday in a bid to be the first nation to make a soft landing on the lunar south pole, which is believed to hold coveted pockets of water ice. This Russian lunar mission is racing against India, and more broadly with the United States and…

  • Biden Calls China a ‘Ticking Time Bomb’ Over Economic Troubles

    U.S. President Biden called China a “ticking time bomb” because of its economic challenges and said the country was in trouble because of weak growth. China’s consumer sector fell into deflation and factory-gate prices extended declines in July. China may be entering an era of much slower economic growth with stagnated consumer prices and wages,…

  • U.S. Reaches Deal With Iran to Free Americans for Jailed Iranians and Funds

    The United States and Iran have reached an agreement to win the freedom of five imprisoned Americans in exchange for several jailed Iranians and eventual access to about $6 billion in Iranian oil revenue. After more than two years of negotiations, Iran has released five Iranian American dual citizens in house arrest as the first…

  • Iran releases US dual nationals into house arrest, lawyer says

    Iran has released five US-Iranian dual nationals into house arrest, according to US officials. The individuals include Siamak Namazi, Emad Shargi, and Morad Tahbaz, the latter of whom also holds a British passport. A fourth individual and a fifth who had been previously released were also among those affected. The releases were reportedly part of…

  • Ukraine orders evacuation of parts of north-east

    Ukraine has issued a mandatory evacuation order for all civilians in 37 settlements in the north-east of the country due to increased Russian attacks in the area. The order comes as Russia intensifies its attacks on Ukraine. Ukrainian officials report that Russian troops have gained some ground in the area, while Ukraine claims to have…

  • Period poverty: In Africa, women are being priced out of buying sanitary ware

    A BBC survey across nine African countries has found that women on the minimum wage in Ghana have to spend one in every seven dollars they earn on sanitary pads. The survey compared the minimum wage to the cost of the cheapest sanitary pads and found that in many cases, the cost was beyond the…

  • Ecuador politician murder suspects are Colombian, police say

    The individuals arrested in connection with the killing of Ecuadorian presidential candidate Fernando Villavicencio have been identified as Colombian nationals. A seventh suspect, who died in a shootout with police, was also Colombian. Villavicencio was assassinated leaving a campaign event in Quito, and his murder has sparked concerns about organized crime’s involvement in Ecuadorian politics.…

  • CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio 

    The US Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched zero-day vulnerability affecting Microsoft’s .NET and Visual Studio products to its Known Exploited Vulnerabilities Catalog. The vulnerability, identified as CVE-2023-38180, was addressed by Microsoft in its August 2023 Patch Tuesday updates. The flaw could be exploited for denial-of-service (DoS) attacks, and Microsoft…

  • European Startup Pistachio Raises €3.25 Million for Cybersecurity Training Platform

    Norwegian startup Pistachio has acquired €3.25 million (approximately $3.5 million) in funding for its AI-powered cybersecurity training platform. The platform utilizes artificial intelligence to develop personalized training and automated attack simulations tailored to an organization’s employees. Each employee’s profile is used to generate a customized training program, with attack simulations continually running and slowing down…

  • Symmetry Systems Raises $17.7M for Data Security Posture Management Platform

    Symmetry Systems, a data security company, has secured $17.7 million in an insider funding round, bringing its total funding to over $35 million. The funds will be used to expand its AI-powered Data Security Posture Management (DSPM) platform. This platform aids organizations in tracking sensitive data, minimizing exposure risks, complying with security and privacy audits,…

  • Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million

    Network security company Check Point Software has announced its acquisition of Perimeter 81, a provider of Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) solutions, for approximately $490 million. Perimeter 81 offers cloud-delivered solutions for securing remote access, network traffic, and endpoint devices. Despite being valued at $1 billion a year ago,…

  • Robot security guard dubbed ‘secret agent man’ deployed to patrol Ohio sidewalks

    A shopping mall in Ohio is integrating cutting-edge AI technology into its safety team in the form of a 400-pound robot security guard. “He’s our secret agent man,” Stacie Schmidt, vice president of marketing at Crocker Park, told local media. “He’s a new team member to our security team here at Crocker Park.” Crocker Park is an…

  • AI is being used to give dead, missing kids a voice they didn’t ask for

    These are some of the world’s most high-profile criminal cases involving children. These are stories of abuse, abduction, torture and murder that have long haunted the countries where the crimes occurred. Now, some content creators are using artificial intelligence to recreate the likeness of these deceased or missing children, giving them “voices” to narrate the disturbing…

  • Virgin Galactic flies its first tourists to the edge of space

    Virgin Galactic rocketed to the edge of space with its first tourists Thursday, including a former British Olympian who bought his ticket 18 years ago and a mother-daughter duo from the Caribbean. The space plane glided back to a runway landing at Spaceport America in the New Mexico desert, after a brief flight that gave…

  • US and China AI-tech standoff shows signs of spreading to other countries

    The emergence of high-level artificial intelligence (AI) technology has caused the United States and China to safeguard their resources in a race to develop the most powerful systems. A tense relationship is developing between the two world powers, as the Biden Administration announced it would limit Chinese tech investments in semiconductors, quantum computing and AI. This…

  • From OpenAI To Stripe, Artificial Intelligence Is Remaking The Cloud

    Artificial intelligence is transforming cloud computing as we know it, as evidenced by Forbes’ latest Cloud 100 list of the sector’s best privately-held companies. This year, AI is everywhere: New No. 1 OpenAI and No. 2 Databricks are supplying tools to help companies build AI features. No. 3 Stripe, a fintech company, adopted the tech…

  • AI Risk Database Tackles AI Supply Chain Risks

    An emerging free tool that analyzes artificial intelligence (AI) models for risk has set a path to become a mainstream part of cybersecurity teams’ toolboxes to tackle AI supply chain risks. Created last March by the AI risk experts at Robust Intelligence, the AI Risk Database has been enhanced with new features and opensourced on…

  • What the OWASP Top 10 for LLMs Means for the Future of AI Security

    The first industry standard for Large language models (LLMs) marks a turning point that could critically impact the adoption of LLMs in business environments. This effort was not led by generative AI providers, rather it was pioneered by the Open Worldwide Application Security Project (OWASP) which recently released version 1.0 of its Top 10 for…

  • Nvidia drops new AI chip expected to cut development costs

    Nvidia, one of the world’s leading developers of semiconductor chips, revealed its latest chip on Aug. 7, designed to power high-level artificial intelligence (AI) systems. The company said its next-generation GH200 Grace Hopper Superchip is one of the first to be equipped with an HBM3e processor, and is designed to process “ the world’s most complex…

  • Microsoft partners with Aptos Labs to build A.I. tools to help banks explore blockchain integrations on Azure

    Since the A.I.-hype train reached full speed earlier this year, there’s been no shortage of crypto entrepreneurs trying to get a piece of the action. Developers have deployed ChatGPT-based assistants for a slew of blockchains, including Solana, Avalanche, and Bitcoin. Now, those behind the Aptos blockchain—a legacy of Facebook’s scuttled stablecoin project—have entered the fray—but…

  • How Artificial Intelligence Is Helping Today’s Small Businesses

    Marketing experts Ming-Hui Huang and Roland Rust wrote an influential article titled “Artificial Intelligence in Service” in which they theorized that there are four types of intelligences needed to perform service tasks: mechanical, analytical, intuitive, and empathetic. A key point made associated with the theory was that to perform some more advanced service tasks, artificial…

  • Iran Says it has Technology to Build Supersonic Missiles Amid U.S. Tensions

    Iran has said it’s obtained supersonic missile technology amid rising tensions with the United States over military deployments in the region. The missiles are now undergoing tests. It did not say when such a missile could potentially complete the testing phase. Iran has an array of cruise missiles but none have breached Mach 1 so…

  • Turbulent Waters: How the Black Sea Became a Hot Spot in the War

    The Black Sea, bordered by Ukraine, Russia, and three NATO countries,  has become an increasingly dangerous cauldron of military and geopolitical tensions. The region is deeply important to Moscow, Ukraine, and the West. Russian warships patrol the surface of the Black Sea, launching missiles at Ukrainian towns. Skimming the water’s surface, Ukrainian sea drones carry…

  • An Oil-Rich Ally Tests Its Relationship With the U.S.

    The ruler of the United Arab Emirates is a key American ally who counts on the United States to defend his country. However, he has traveled to Russia twice over the past year to meet with President Vladimir V. Putin, and later this month the Emirati and Chinese air forces plan to train together for…

  • A Missile Strikes the Heart of a Ukrainian City — and Then Another

    On Tuesday, a pair of missile strikes killed at least nine people and wounded 82 others. These missiles hit the city center of Pokrovsk just 37 minutes apart. The second strike maximized casualties among rescuers and onlookers responding to the first one, a tactic Russian forces have used before. On Monday evening, Russian forces also…

  • Recent Ransomware Attacks Share Curiously Similar Tactics

    Sophos X-Ops has investigated four different ransomware attacks, one including Hive, two by Royal, and one by Black Basta, and noticed distinct similarities between the attacks. Sophos is tracking and monitoring the attacks as a “cluster of threat activity” that defenders can use to speed up detection and response times. Knowing highly specific attacker behavior…

  • Unveiling The Cyber Conundrum: Why Government Hacks Outpace Mega Corporations

    Cyberattacks have become an unfortunate reality impacting government institutions and mega corporations alike. However, a notable disparity emerges when we compare the frequency with which the U.S. government reports breaches compared to major companies. One significant factor contributing to this difference is the obligation of disclosure for the government. When a government entity is hacked,…

  • The Impact of Artificial Intelligence on Software Development

    With the debut of ChatGPT in 2022, important discussions have surfaced around artificial intelligence (AI) as a whole, including its beneficial application, negative repercussions, and ethical considerations. The technology will be revolutionary for the software development industry. AI will change how information is generated from, flows through, and is acted upon in the software development…

  • Portugal battles wildfires amid third heatwave of the year

    Portugal is currently facing intense wildfires that have engulfed thousands of hectares of land, as firefighters struggle to contain the flames amid soaring temperatures. The fires near the southern town of Odemira have forced more than 1,400 people to evacuate and have so far destroyed around 6,700 hectares of land. The extreme heatwave, with temperatures…

  • Pakistan: Imran Khan barred from politics for five years

    Imran Khan, the former Prime Minister of Pakistan, has been disqualified from holding public office for five years by the country’s electoral authorities. This comes three days after he was sentenced to three years in prison for corruption. The Election Commission of Pakistan’s decision also means Khan will be dismissed as a Member of Parliament.…

  • Niger coup: Wagner taking advantage of instability – Antony Blinken

    US Secretary of State Antony Blinken has stated that Russia’s Wagner mercenary group is exploiting the instability in Niger following a recent coup. The country’s ruling junta, which came to power after ousting President Mohamed Bazoum, is reported to have requested assistance from Wagner, which is active in neighboring Mali. While Blinken doesn’t believe that…

  • Amazon nations fall short of agreed goal to end deforestation

    The eight countries sharing the Amazon basin have fallen short of their agreed goal to end deforestation at a summit in Belém, Brazil. While a joint declaration formed an alliance to combat deforestation, each country was left to pursue its own conservation goals. The Amazon, which covers around 60% of Brazil, plays a crucial role…

  • White House Holds First-Ever Summit on the Ransomware Crisis Plaguing the Nation’s Public Schools

    The White House hosted its first-ever cybersecurity summit to address the rise of ransomware attacks targeting US schools, which have resulted in leaks of sensitive student data. Over 48 districts reported ransomware attacks this year, already surpassing 2022’s total. Homeland Security Secretary Alejandro Mayorkas emphasized the ruthlessness of attackers, including exposing private information like suicide…

  • Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns

    Adobe has released a critical set of updates for its Acrobat and Reader software, fixing around 30 vulnerabilities affecting Windows and macOS. Successful exploitation could lead to arbitrary code execution, memory leaks, and other security issues. Adobe Commerce and Magento Open Source products also received urgent updates for security vulnerabilities. Adobe Dimension software updates cover…

  • Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days

    Microsoft has released patches for 33 affected products and a “defense in depth update” to counter the exploitation of remote code execution vulnerabilities impacting Windows and Office users. This action comes a month after Microsoft confirmed active exploitation of these vulnerabilities. The security updates address the attack chain leading to the Windows Search security feature…

  • Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan

    Boston-based cybersecurity firm Rapid7 (NASDAQ: RPD) has revealed plans for a significant restructuring that will lead to an 18% reduction in its employee headcount. The move could impact approximately 500 employees out of its total of around 2,700, with more than 700 employees located at its Boston headquarters. The company’s restructuring plan also involves the…

  • Unmasking hypnotized AI: The hidden risks of large language models

    The emergence of Large Language Models (LLMs) is redefining how cybersecurity teams and cybercriminals operate. As security teams leverage the capabilities of generative AI to bring more simplicity and speed into their operations, it’s important we recognize that cybercriminals are seeking the same benefits. LLMs are a new type of attack surface poised to make…

  • Nvidia Unveils Faster Chip Aimed at Cementing AI Dominance

    Nvidia Corp. announced an updated AI processor that gives a jolt to the chip’s capacity and speed, seeking to cement the company’s dominance in a burgeoning market. The Grace Hopper Superchip, a combination graphics chip and processor, will get a boost from a new type of memory, Nvidia said at the Siggraph conference in Los…

  • Artificial Intelligence (AI) and Web3: How are they Connected?

    Simply put, Artificial Intelligence (AI) is the ability of machines to do functions that we usually associate with a human mind – for example, doing a reasoning task, solving a mathematics problem, stock market trading, and much more. At its core, AI combines computer science with robust datasets to enable problem-solving. Since its inception, AI…

  • We Need Smart Intellectual Property Laws for Artificial Intelligence

    Once a backwater filled with speculation, artificial intelligence is now a burning, “hair on fire” conflagration of both hopes and fears about the revolutionary technological transformation. A profound uncertainty surrounds these intelligent systems—which already surpass human capabilities in some domains—and their regulation. Making the right choices for how to protect or control the technology is…

  • New acoustic attack steals data from keystrokes with 95% accuracy

    A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%. When Zoom was used for training the sound classification algorithm, the prediction accuracy dropped to 93%, which is still dangerously high, and a record for that…

  • Why ChatGPT Is Getting Dumber at Basic Math

    Since becoming widely available to the public last year, artificial-intelligence chatbots have dazzled people who experimented with them, kicked off a global development race and even contributed to the strike in Hollywood over their impact on writers and actors. AI tools have also generated fear that they will inexorably improve and threaten humanity. OpenAI’s ChatGPT debuted…

  • US scientists repeat fusion ignition breakthrough for 2nd time

    U.S. scientists have achieved net energy gain in a fusion reaction for the second time since December, the Lawrence Livermore National Laboratory said on Sunday. Scientists at the California-brd lab repeated the fusion ignition breakthrough in an experiment in the National Ignition Facility (NIF) on July 30 that produced a higher energy yield than in…

  • PayPal launches PYUSD stablecoin backed by the US dollar

    PayPal is launching its own stablecoin: PayPalUSD (PYUSD). The company says the cryptocurrency token is “fully backed by U.S. dollar deposits” and can be bought or sold on PayPal’s app or website at $1.00 per PYUSD. With PYUSD, you can make person-to-person payments, fund purchases with the currency at checkouts, and transfer PYUSD between PayPal and…

  • Generative AI In Cyber Should Worry Us, Here’s Why

    It’s fair to say that recent months have sparked a growing interest in AI in the general media. Hollywood’s robot apocalypse may be fiction, but advances in computing power, intelligent unsupervised algorithms, and applications like chatbots are fuelling genuine fears about job displacement. Not without justification. Telecoms giant BT plans to cut 55,000 jobs by…

  • U.S. Companies are Buying Less From China as Relations Remain Tense

    U.S. companies are accelerating efforts to reduce their dependence upon Chinese suppliers. Through the first five months of this year, U.S. imports from China were down 24% from one year ago, either to avoid the risk of being pinched between rival superpowers or as part of a longer term strategy to produce goods closer to…

  • U.S. Deployed Warships After China, Russia Naval Patrol Near Alaska

    The United States deployed four navy warships after Russian and Chinese naval forces conducted joint patrols near the Alaskan coast, according to a report by the Wall Street Journal (WSJ). At least 11 Russian and Chinese ships went close to the Aleutian Islands in the northern U.S. state of Alaska. The ships never entered U.S.…

  • Ukraine says U.S and German air defence systems ‘highly effective’

    Ukraine is seeing “significant results” from U.S. and German air defense systems. Both Ukraine and Russia have stepped up attacks on each other’s troops. Zelenskiy said advanced air defense systems, which include the U.S. built Patriot and Germany’s IRIS-T, were providing “highly effective” and have “already yielded significant results.” He also stated that Ukraine shot…

  • North Korean hackers breached top Russian missile maker

    A group of North Korean hackers secretly breached computer networks at a major Russian missile developer for at least five months last year. They secretly installed stealthy digital backdoors into systems at a rocket design bureau based in Reutov. Reuters could not determine whether any data was taken during the intrusion or what information may…

  • CISA Unveils Plan to Measure Cybersecurity Success

    The Cybersecurity Strategic Plan marks the CISA’s roadmap for the next three years as the agency works with the larger Biden administration to safeguard America’s digital networks from the increased onslaught of malicious cyber attacks. The plan has nine objectives and its three overarching goals include prioritizing coordinated threat disclosure, proactive vulnerability analyses, and implementing…

  • Google Pays Apple $15,000 For Hacking Chrome Security

    Google has confirmed that a high-severity security vulnerability in the Chrome web browser was found by Apple’s Security Engineering and Architecture (SEAR) team. Google paid the SEAR team $15,000 for the discovery and disclosure. Apple’s SEAR is tasked with providing the foundation for operating system security across all of the Cupertino-based technology behemoth’s product lines.…

  • Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities

    Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities that were most frequently exploited in malicious attacks in 2022. Last year, the Five Eyes agencies say, threat actors mainly targeted internet-facing systems that were not patched against older, known vulnerabilities. Timely patching these known…

  • Budget Constraints Threaten Cybersecurity in Government Bodies

    Government organizations are attractive targets for threat actors according to BlackBerry. Due to the limited resources and often immature cyber defense programs, these publicly funded organizations are struggling against the threat of attacks. BlackBerry reports there has been a 40% increase in cyberattacks against government agencies and the public services sector.  In healthcare, the convergence…

  • UK scouts pulled out of camp after S Korea heatwave

    The UK Scouts, the largest group at the World Scout Jamboree in South Korea, are leaving the event early due to extreme heat. Temperatures reached 35°C (95°F), causing hundreds of participants to fall ill. The British group, which consists of over 4,000 members, is relocating from Saemangeum to Seoul in an effort to alleviate the…

  • Voyager 2: Nasa fully back in contact with lost space probe

    NASA has successfully reestablished contact with its Voyager 2 probe, which had lost communication with Earth in July due to a wrong command. Thanks to an “interstellar shout” command, the probe’s antenna has been realigned to face Earth again, allowing NASA to regain contact. Mission controllers used a powerful transmitter to send the command, and…

  • Alexei Navalny: Russian opposition leader’s jail term extended to 19 years

    Russian opposition leader Alexei Navalny, imprisoned since 2021, has had his jail term extended to 19 years after being found guilty of founding and funding an extremist organization. Navalny, a vocal critic of the Kremlin, has been serving a nine-year term for other charges, widely regarded as politically motivated. He will now be held in…

  • Ukraine counter-offensive two months in: Can it still succeed?

    The ongoing conflict in Ukraine has entered a critical phase, with the country launching a counter-offensive against Russian forces. While aided by Western military equipment, progress has been slow due to Russia’s extensive fortifications. Despite some small gains and strategic advancements, such as the potential disruption of Russian supply routes, the overall territorial situation remains…

  • Microsoft Criticized Over Handling of Critical Power Platform Vulnerability

    A critical vulnerability in Microsoft’s Power Platform, which exposed authentication data and sensitive information, has raised concerns over the tech giant’s response. Researchers from Tenable discovered the flaw, caused by insufficient access control to Azure Function hosts in the Power Platform, allowing attackers to interact with underlying code without authentication. Exploiting this could have granted…

  • Threat Actors Abuse Cloudflare Tunnel for Persistent Access, Data Theft

    Threat actors have been exploiting the open source tool Cloudflared to establish persistent access to compromised systems and steal information covertly, according to cybersecurity firm GuidePoint Security. Cloudflared, a command-line client for Cloudflare Tunnel, enables proxying traffic between Cloudflare and the user’s origin. Attackers can use it to create outbound connections over HTTPS, providing direct…