Author: user
The US Department of Justice announced Monday that it had taken several enforcement measures against North Korea’s gold-making work. It announced that it would rely on undercover IT workers within American high-tech companies to raise funds for the administration’s nuclear weapons program and steal data and cryptocurrency. As part of DOJ’s multi-state efforts, the government has announced the arrest and indictment of “Danny” Wang, National Zenks in the United States. The scheme generated more than $5 million in revenue for the North Korean regime, according to the indictment. The King is accused of conspiracy to commit wire fraud, money laundering…
Tailor, a San Francisco and Tokyo-based enterprise resource planning (ERP) platform, has raised $22 million in the Series A funding round. Investors include Anri, Jic Venture Growth Investments (Jic VGI), New Enterprise Associates (NEA), Spiral Capital and Y Combinator. ERP systems usually come with a single interface that includes all the necessary features, but this is inflexible and allows you to limit customization options. In contrast, the “headless” ERP system separates the frontend (user interface) from the backend (ERP Core) to Taylor co-founder and CEO Yo Shibata. The backend manages key features of the ERP system, such as inventory management…
Proton, a privacy-centric software provider that makes Proton Mail, Proton Calendar, Proton Drive and other apps, sued Apple for alleging anti-competitive practices on Apple’s App Store. In the new lawsuit, iPhone makers hold monopolies in the smartphone, app distribution and app payment processing market, Proton said. They also compare Apple’s fees with Internet commerce tariffs and call them “artificial and arbitrary.” The lawsuit is looking for changes to the app store and financial damages. This says Proton will donate to organizations that are fighting for democracy and human rights. Court documents filed in the Northern District of California are part…
The mud volcano rings lively in front of a Taiwanese temple, with a captivating video capturing the moment when mud is shot from the ground beneath the crown of fire.Wang Dang Mud Volcano in Wang Dang Township, southern Taiwan, reached 6.6 feet (2 meters) high on Thursday (June 26) when material spitting foaming mud through four separate vents reached 6.6 feet (2 meters) high, Formosa Television (FTV).Footage from the approximately 10-hour eruption shows a flame igniting on the burning mud. But while mud volcanoes can ignite naturally, Wandun’s flame was intentionally set up by locals to burn emitted methane, a…
Plasma may have changes in DNA that could flag cancer several years before existing diagnostic testing. This is a hint from early research.A recent study, published May 22 in the journal Cancer Discovery, found traces of free-proliferating DNA from dead pre-cancer cells or cancer cells in plasma donated three years before diagnosis.”This is an important step towards preclinical cancer detection, which could potentially revolutionize cancer screening,” said Catherine Alix Panaviere, a cancer researcher at the University of Montpellier in France, who was not involved in the work. “Previous detections usually correlate with better outcomes for more cancer types with previous…
As Sen. Ted Cruz (R-TX) and other lawmakers work to ensure inclusion in the GOP megaville, a federal proposal to prohibit state and local governments from regulating AI for five years can quickly be signed into law. Proponents, including Sam Altman of Openai, Palmer Luckey of Anduril, and Marc Andreessen of A16Z, have argued that the “patchwork” of AI regulation between nations will curb American innovation when competition to beat China is intensifying. Critics include most Democrats, many Republicans, humanity CEO Dario Amodei, labor groups, AI safety nonprofits, and consumer rights advocates. They warn that the provision will prevent consumers…
Chinese scientists have discovered many hosts of viruses that have never been seen before in bats living near humans. These viruses contain two closely related to the deadly Nipah and Hendra viruses, which can cause severe encephalopathy and respiratory disease in humans.Published in Plos Pathogens on June 24th, the work highlights the importance of paying attention to bats and other animals living near human populations, avoiding contact with them whenever possible.Bats are natural reservoirs of many pathogens that can cause human disease, but the full range of bacteria, viruses and other potentially infectious factors is unknown. Previous studies have focused…
On Monday, Google announced a series of updates aimed at incorporating Gemini AI and other AI-powered tools into the classroom. At the ISTE Edtech conference, Tech Giant introduced over 30 AI tools for educators, a version of the Gemini app for education, expanding access to the co-video creation app Google Vids, and other tools for managed Chromebooks. The update represents the major AI push in the EDTECH space. At Edtech Space, educators struggle to adapt to how AI tools are entering the learning environment, like AI chatbots and startups that promise to “check everything.” Today’s school-age children and teens are…
The mini solar telescope, tied to the side of the International Space Station (ISS), took the first image, revealing subtle changes in the homestar’s outside atmosphere that you’ve never seen before.NASA’s coronary diagnostic experiment (Codex) is a small solar telescope attached to the outside of the ISS. That’s the coronagraph. This means blocking the solar disk and allowing the telescope to focus on the solar atmosphere, or the details that are unprecedented in the coronavirus. The occult disc blocking sunlight is the size of a tennis ball and is held in place by three metal arms at the end of…
June 30, 2025Ravi LakshmananCyber Attacks/Critical Infrastructure The US Cybersecurity and Intelligence Agency has issued a joint advisory warning of potential cyberattacks from Iranian state-sponsored or affiliated threat actors. “Over the past few months, there has been an increase in activity from actors related to Hattivists and the Iranian government, which is expected to escalate due to recent events,” the agency said. “These cyber actors often exploit the targets of opportunity based on their use of less than or outdated software, accompanied by the use of default or common passwords on internet-connected accounts and devices, with known common vulnerabilities and exposures.”…