Author: user
According to a new US government surveillance report in 2018, the hackers hired by Mexico’s Kingpin Joaquin Joaquin “El Chapo” Guzman with the goal of targeting and killing “people of interest” at the US embassy in Mexico City were spies by Mexico Kingpin Joaquin Joaquin “El Chapo” Guzman. On Friday, the Department of Justice inspector’s office revealed the case in a published report auditing the FBI’s efforts to counter surveillance with the goal of protecting “employees, investigations and operations.” The report said the 2018 incident occurred while the FBI was working on an investigation that ultimately led to El Chapo’s…
The travel industry has collected extensive travel and transportation data over the years, and founders use it to create all sorts of AI travel startups that they can think of. In fact, all the words in this sentence are links to new AI travel tools. Now, startups and current travel technology companies are taking part in a race to build one comprehensive tool that allows you to plan and manage every part of your trip. Airial is one of the candidates that has led banks to banks in their ability to end-to-end mapping of the entire travel experience. At the…
On Monday, Europol announced a takedown of its cryptocurrency investment fraud ring, which has laundered 460 million euros ($540 million) from more than 5,000 casualties worldwide. He said the operation was carried out by Spanish Guardian citizens, along with support from law enforcement agencies in Estonia, France and the United States. Europol said the syndicate investigation began in 2023. Additionally, five suspects behind the cryptocurrency fraud were arrested on June 25, 2025. Three people were arrested in the Canary Islands, while the other two were arrested from Madrid. “To carry out their misconduct, criminal network leaders are said to have…
The company behind Cursor, a viral AI coding editor, launched a web app on Monday that allows users to manage the coding agent’s network directly from their browser. Launch marks the next big step in the cursor, beyond the Integrated Development Environment (IDE). Anysphere, the company behind Cursor, initially only offered IDEs with this AI, but the company worked together to put its products in more places and develop more agent-driven experiences for its users. In May, Cursor launched a Background Agent. This is an AI system that autonomously resolves coding tasks without user supervision. In June, the company launched…
AI-powered accounting startup Campfire on Monday announced its $35 million Series A, led by Accel, and its participation from Angel Investors, including Foundation Capital, Y Combinator, Capital 49 and Mercury’s CFO Dan Kang. “Within nine months since it was formed, we had customers. [with] Some Campfire customers who have moved from Netsuite are located north of 100 employees who rip Netsuite to rip campfires and incorporate campfires. This was part of the case despite Glasgow attending YC in the summer of 2023, which clearly shows more experience than the typical 20-something YC founder. He explained the difference in age. At…
June 30, 2025Ravi LakshmananCybercrime/Vulnerability The threat actor known as Blind Eagle is attributed to a high degree of confidence in the use of Russian bulletproof hosting service Proton66. TrustWave SpiderLabs said in a report published last week that this connection can be created by pivoting from Proton66-related digital assets, leading to the discovery of an active threat cluster that leverages visual basic script (VBS) files as the first attack vector and installs shelf remote access trojan (RAT).Many threat actors rely on bulletproof hosting providers like Proton66, as these services intentionally ignore abuse reports and legal takedown requests. This allows attackers…
As the AI Energy Council gathers today, the future energy needs of the broader AI sector will be on the agenda. The demand for energy to promote the processing capabilities needed for the new wave of AI breakthroughs and the AI Energy Council’s future energy needs. With the convening of UK energy providers, high-tech companies, GEM energy regulators and National Energy Systems Operators (NESO), the second AI Energy Council meeting will explain how to predict the energy needed to achieve a 21-fold increase in computing power over the next five years. The conference is also expected to cover which sectors…
According to scientists, a new type of self-healing and reconfigurable circuit board can withstand major damage and work effectively. Once you reach the end of your life, you can even fully recycle it.The new breakthrough is paid for a material called Vitrimer because it is rigid and durable at normal temperatures, but is more adaptable and can be reconstructed at higher temperatures. Scientists outlined their findings in a new study published in Journal Advanced Materials on June 1.Circuit boards are traditionally constructed from thermal hardness such as silicon or epoxy resin. This is a type of plastic that becomes permanently…
This is the second article in a new monthly column on AI and urban planning by AICP planner and AI specialist Tom Sanchez. Here, read his first column, “Four Reasons for Planners Can’t Ignore AI.” Urban planning is always a creative field. From Hausmann’s grand redesign in Paris in the 1860s to Jane Jacobs’ battle to maintain the vibrant streets of Greenwich Village in the 1960s, creativity and design shaped the city’s appearance, feel and function. In the death and life of the great American city, Jacobs states, “Cities have the ability to provide something to everyone. Her quote implies…
Identity-based attacks are on the rise. Attacks that assume the identity of an entity that allows malicious actors to easily access resources and easily access sensitive data have increased in recent years. Several recent reports estimate that 83% of attacks will involve compromised secrets. Reports such as Verizon DBIR show that attackers are gaining their first footing, rather than exploiting vulnerabilities or misconceptions, using stolen credentials more commonly. However, attackers are not just human identities they can envision. More generally, they are after nonhuman identity (NHIS), surpassing corporate human identity by at least 50:1. Unlike humans, machines do not have…