Author: user
The Federal Highway Administration (FHWA) has announced a new road safety program, but there is no related funding or other details, reports Graham Kilmer, a city in Milwaukee. The program “Reliable Operations and Distraction Reducing Strategies or Safe Arteries for Everyone through Safe Roads” requires state and local agencies to identify dangerous roads, “eliminate distractions,” and “easy interpretation and navigation for all users, including pedestria, vehicle operators and automated vehicles.” Secretary Duffy’s letter does not specify what constitutes a “distraction.” This letter has been mentioned three times. “The roads are for safety, not political messages or artwork,” Duffy says, indicating…
July 16, 2025Ravi LakshmananWindows Server / Enterprise Security Cybersecurity researchers have revealed what they say is a “significant design flaw” in the Delegated Managed Service Account (DMSA) introduced in Windows Server 2025. “This flaw can cause impactful attacks, allowing cross-domain lateral movement, allowing permanent access to all managed service accounts and their resources indefinitely across Active Directory,” Semperis said in a report she shares with Hacker News. Put another way, successful exploits allow the enemy to avoid authentication guardrails and generate passwords for all delegated managed service accounts (DMSAS) and group managed service accounts (GMSA) and associated service accounts. The…
US high-tech startup Skydweller Aero has teamed up with Thales, a French electronics company specializing in defense systems, to develop a new maritime surveillance drone that can stay far longer than existing machines.Skydweller aims to be able to fly continuously, with power purely from solar energy. The first flight milestone is to keep your aloft for 90 days, but in the end you could fly much longer.The solar energy that powers the Skydweller is captured by over 17,000 individual solar cells and spreads over a wing surface of approximately 2,900 square feet (270 square meters). You might like it During…
July 16, 2025Hacker NewsIdentity Management / AI Security The AI Gold Rush is lit. But without identity-first security, all deployments are open doors. Most organizations protect native AI like web apps, but act like junior employees with root access and no manager. From hype to high stakes Generated AI has moved beyond the hype cycle. The companies are: Automating customer service workflows with AI agents that integrate AI agents to accelerate deployment software development for LLM Copilots Whether you’re connecting to a building with an open source model or a platform like Openai or humanity, your goal is speed and…
Scientists can determine how aging the whole body is based on a single snapshot of the brain, researchers argue in a new study.Scientists who published their findings in the journal Nature Aging on July 1st developed a benchmark for biological aging based on brain MRI. The team says the tool can predict future risks for individuals with cognitive impairment and dementia, chronic conditions such as heart disease, physical frailty and early death.Ahmad Hariri, professor of psychology and neuroscience at Duke University, said: “Faster aging increases the risk of many diseases, including diabetes, heart disease, stroke, and dementia,” he told Live…
The UK government has launched a bold new life science sector plan as part of its flagship industrial strategy. The Life Science Sector Plan outlines the 10-year mission to leverage UK science and innovation, providing an NHS with a focus on long-term economic growth and stronger prevention. Developed in close collaboration with the government’s 10-year health plan, the plan doubles the UK’s growth life sciences sector. It turns cutting-edge research into real-world results: new treatments, faster diagnosis, and more lives saved. It is about breakthroughs occurring in the UK, ensuring you stay in the UK, creating jobs, improving lives across…
Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones and allow them to retrieve text messages such as chat apps such as signals. On Wednesday, mobile cybersecurity company Lookout issued a new report that was only shared with TechCrunch – detailing the details of a hacking tool called Massistant. According to Lookout, Hypertrophy is Android software used for forensic extraction of data from mobile phones. This means that the authorities using them must have physical access to those devices. Lookout doesn’t know for certain which Chinese police agencies are using the…
Patient: 38-year-old woman from New DelhiSymptoms: The patient had given birth via emergency caesarean section in another country, but after surgery she noticed pain on the right side of her lower abdomen. The doctors at the time told her that it was normal postoperative pain, but they didn’t explore it further. Eventually, a mass formed on the site, intensifying the pain in the woman.What happened next: Four years after her C-section, the patient sought further medical advice at New Delhi Hospital in 2014. The doctor performed ultrasound and CT scans to reveal the cyst at the site of the pain.…
Satellite communications will be central as the UK space agency announces new projects and investments at the UK Space Conference, highlighting the growing economic and national security role of the sector. The UK’s booming space sector has reached a new milestone today as the UK Space Conference was held in Manchester to bring together government, industrial and international partners to shape the future of the space economy. Marking this opportunity, the UK space agency announced a new wave of investment aimed at strengthening satellite communications and space-based technologies. Among the headline announcements are £4.5 million in funding for cutting-edge projects…
July 16, 2025Hacker NewsAI Security/Fraud Detection The attack on social engineering has entered a new era. And they are fast, smart, and deeply personalized. It’s not just suspicious emails in your spam folder. Today’s attackers mimic executives, hijack social channels, create websites, emails, and even audio, mimic executives, mimic executives, use stolen branding assets, Deep Fark Tools. They don’t just blow them away, they’re impersonating. Modern attackers don’t rely on coincidence. They run long-term multi-channel campaigns on email, LinkedIn, SMS and even support portals targeting employees, customers and partners. Whether it’s a fake recruiter reaching out on LinkedIn, a look…