Author: user

Simple factsWhere is it? Klyuchevskoy (Klyuchevskaya sopka), Russia [56.050698, 160.6463962]What do you see in the photo? A giant eruption plume chases after an erupting volcanoWhich satellite took the photo? Nasa AquaWhen did you take it? November 1, 2023This eerie satellite image shows a “devil” Russian volcano expelling a 1,000-mile-long river of smoke into the Earth’s atmosphere. This is an impressive reminder of the volcanic power trapped in the Pacific Ocean’s “Ring of Fire.”The volcano known as Klyuchevskoy (or sometimes Klyuchevskaya Sopka) is an active formation in the Kamchatka Peninsula in Russia, with over 300 volcanoes. According to the Smithsonian Association’s…

Read More

Some states have a constitutional “green amendment” that declares that state residents have a right to a healthy environment. Can these modifications be used to challenge policies that increase car-related pollution? The seven state constitutions include the “green amendment,” which states that citizens of the state have the right to a healthy environment. For example, the New York amendment stipulates that all New Yorkers have the right to clean air and water, and have a healthy environment. Only three of the seven “Green Amendment” states (Pennsylvania, Montana and New York) have allowed private citizens to sues the government to stop…

Read More

The Great Lakes Region generally rated it as at the top of the list of the most climate-resilient regions in the United States. The locations in the northern inland, mitigating climates and abundant freshwater supply give a great advantage over the rest of the country where extreme heat and droughts quickly lead to regular havoc. Beyond that, it has become one of the most food-secure regions in the country as it is closest to some of North America’s most productive farmland. It is the national leader in renewable energy production, particularly wind and hydropower. The risk of major natural disasters…

Read More

Have you ever stopped by a grocery store on your way to a dinner party and grabbed a bottle of wine? Have you grabbed what you saw first, or have you considered the available choices and deliberated where your gifts would like to come from?People who lived in western Iran 11,000 years ago had the same idea, but in reality they looked a little different. In our latest study, my colleagues and I studied the ruins of the ancient east feast in Asiabu, in the Zagros Mountains, where people gathered for a joint celebration.The fairer left behind the skulls of…

Read More

Scientists could detect the largest known black hole merger to date, a massive collision from two massive space-time ruptures swirling with each other – and hold evidence for the most elusive type of black hole in the universe.The merger that took place outside our Milky Way galaxy produced about 225 times more black holes than the sun.This was almost twice the previous record holder, producing the final black hole with a solar mass of about 142. The new collision was discovered by the Ligo-Virgo-Kagra (LVK) Collaboration. This is a group of four detectors that identify cataclysmic universe events from gravitational…

Read More

The Milky Way could be surrounded by dozens of undetected satellite galaxies, scientists argue.Cosmosologists are using the new mathematical model using the highest decomposition simulation of dark matter from Galaxy, an invisible entity that shapes the massive structure of the universe, as cosmologists predict that over 100 additional satellite galaxies may be swirling around us, beyond what is already catalogued.If these galaxies are discovered by telescopes, they can support standard models of cosmology, namely the dominant model of the universe that explains how galaxies are formed. Researchers presented their discoveries at the Royal Astronomical Society’s National Astronomical Conference held in…

Read More

Cognition, the startup behind Viral AI Coding Agent Devin, announced in a blog post Monday that it has signed a decisive agreement to acquire AI coding startup Windsurf. The announcement comes days after Google hired Windsurf CEO Varun Mohan, co-founder Douglas Chen, and Research Leaders on a $2.4 billion deal, and Reverse Ackhia, who left the remaining 250-person team at Startup. Google’s deal came just hours after Windsurf’s expired Openai’s $3 billion offer, clearing the way AI coding startups explore other options. The frenzy to get Windsurf represents a new peak in insane races for developing AI coding products. “The…

Read More

The Trump administration plans to spend $1 billion over the next four years on what is called “offensive cyber operations.” The provisions of one big, beautiful bill, a Trump landmark, have not said what these “offensive cyber operations” are, nor do they say that certain tools and software qualify. The budget focuses on the cost of improving and improving the capacity of the US Pacific Command, which operates in the Asia-Pacific region, including China, the US’s biggest geopolitical rival. The move to spend 1 billion on cyber comes as the US faces an ongoing cyber threat from China, as newly…

Read More

Elon Musk’s AI chatbot Grok pivoted from anti-Semitism to anime girl Waifus. Musk wrote in an X post on Monday that it was now available on the Grok app for “Super Grok” subscribers, where AI peers pay $30 a month. According to a post shared by Musk, there are at least two AI mates available. Annie is an anime girl wearing a tight corset and a short black dress with thigh-high fish nets and a 3D fox creature Bad Rudy. “This is pretty cool,” Musk wrote, sharing a photo of a blonde goth anime girl. Given this paywall feature that…

Read More

July 14, 2025Hacker NewsSecret Management / SAAS Security Phishing and ransomware dominate the headlines, but another serious risk follows quietly for most companies. The risk of quietly creating shadow access in the core system GIT is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations around the world. However, amid the daily shipping code fuss, developers may inadvertently leave API keys, tokens, or passwords in their configuration and code files, effectively handing over keys to the kingdom to the attacker. This is not just for the poor sanitation. This is a risk in a…

Read More