Author: user
Egyptian archaeologists have discovered the remains of a 4,500-year-old valley temple. According to a translated statement from the Egyptian Ministry of Tourism and Antiquities, the structure is part of a solar temple built by ancient Egyptians in honor of the sun god Ra.The temple is located in Abu Ghrab, about 16 km (10 miles) southwest of Cairo. The Sun Temple consists of two parts: the upper temple, which archaeologists excavated several years ago, and the newly excavated valley temple, which the team began work on in 2024. The Valley Temple is located near the Nile River, and the two parts…
Temperature stress may be causing genetic mutations in southern Greenland’s polar bears, a new study reports.This species is struggling in the face of global climate change. Global sea ice levels fell to record lows in February, with sea levels rising due to global warming. These changes threaten polar bears, which live and hunt on shrinking ice sheets.But a group of polar bears (Ursus maritimus) in southern Greenland may have evolved to cope with their difficult environment. Researchers have found a link between changes in polar bears’ DNA and rising temperatures. you may like The study, published Dec. 12 in the…
December 16, 2025Ravi LakshmananMalware/threat detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity was first detected by Amazon’s managed threat detection service GuardDuty and its automated security monitoring systems on November 2, 2025, and employs never-before-seen persistence techniques to disrupt incident response and continue unimpeded, according to a new report shared by the tech giant ahead of publication. “The attacker, operating from an external hosting provider, quickly enumerated resources and permissions before deploying cryptocurrency mining resources across ECS and EC2,” Amazon said.…
A giant city-sized butterfly carved into the surface of Mars millions of years ago has been photographed in a new photo thanks to European Space Agency scientists. Experts say this beautiful Martian insect with smooth, rock-like wings is a striking reminder of Mars’ violent, watery past.The so-called Butterfly is an asymmetrical impact crater created when a giant asteroid struck Mars at an unusually low angle in the distant past. The region is located in the highly rugged, formerly volcanic Ideus Fossae region of Mars’ northern lowlands, and measures approximately 12.4 miles (20 km) from east to west and 9.3 miles…
Instagram is expanding Reels viewing beyond mobile, the social network announced Tuesday. The company is piloting IG for TV, a new experience that lets you watch Reels on your TV, starting with Amazon Fire TV. Bringing Reels to TV will allow Instagram to better compete with YouTube, which largely dominates the TV space. Instagram seems to want viewers to switch to the TV app while they’re watching content on the couch, similar to how you switch channels on your TV. For example, you might be watching something on Netflix and decide that you can’t maintain your attention span for that…
The hacker group Scattered Lapsus$ Hunters, which includes members of the gang known as the ShinyHunters, claims to have stolen the personal information of premium members of porn site Pornhub and is attempting to extort the site. On Friday, Pornhub acknowledged that it was among several companies affected by a previous breach at widely used web and mobile analytics provider Mixpanel that exposed unspecified “analytics events” for some Pornhub Premium users. On Monday, Bleeping Computer reported that it had seen a sample of stolen Pornhub data. This included personal information related to Pornhub Premium members, such as registered email addresses…
December 16, 2025Ravi LakshmananCybersecurity/Cryptocurrency Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its creator to sneak into cryptocurrency wallet stealers. The malicious package named “Tracer.Fody.NLog” remained in the repository for nearly six years. This was published on February 26, 2020 by a user named ‘csnemess’. It is impersonating ‘Tracer.Fody’ managed by ‘csnemes’. The package remains available at the time of writing and has been downloaded at least 2,000 times, 19 of which were in the past 6 weeks for version 3.2.4. “It pretends to be a standard .NET tracing…
The IPO window may be open, but some former startups don’t appear to have any intention of going public. In a way it makes sense. IPOs are a traditional way to raise money, and if you can raise an exorbitant amount of money for your company without exposing it to public scrutiny, why would you? Databricks proves that point. The data intelligence company has raised more than $4 billion in a Series L funding round at a $134 billion valuation. This is a 34% increase from the $100 billion valuation it achieved just three months ago. This is Databricks’ third…
With tightening regulatory deadlines, the transition away from legacy PFAS-based firefighting foams has become increasingly urgent. ProDecon® has established itself as a trusted technical partner in PFAS decontamination, supporting the firefighting sector in delivering best-practice transitions and assured regulatory compliance. Across Europe, end users of firefighting foam are rapidly transitioning from C8 and C6 Class B foams to fluorine-free alternatives (F3). Yet, a central question continues to divide the industry: Is chemical decontamination necessary to remove residual PFAS within systems, or can systems simply be water-rinsed, or even left unrinsed before switching to F3? ProDecon® and Tetra Tech have successfully…
December 16, 2025Ravi LakshmananCloud security/vulnerabilities Amazon’s threat intelligence team has revealed details of a “multiyear-long” Russian state-led campaign targeting critical infrastructure in the West from 2021 to 2025. Targets of the campaign included organizations in the energy sector in Western countries, critical infrastructure providers in North America and Europe, and companies with cloud-hosted network infrastructure. This activity is believed with high confidence to be the work of APT44, a group affiliated with GRU, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear. This activity was notable for using a misconfigured customer network edge device with an exposed management interface…