It was the summer of 2020, and researcher Walter Crist was wandering around the exhibits inside a Dutch museum dedicated to the presence of the ancient Roman empire in the Netherlands. As a scientist ...
Add Yahoo as a preferred source to see more of our stories on Google. Peter Thiel at the Cambridge Union, May 8, 2024. (Nordin Catic—Getty Images for The Cambridge Union) Peter Thiel has begun tying ...
Indian government entities have been targeted in two campaigns undertaken by a threat actor that operates in Pakistan using previously undocumented tradecraft. The campaigns have been codenamed Gopher ...
Just weeks into the new year, the Trump administration has rolled out a campaign across departments that draws on images and ideas borrowed from right-wing and white nationalist circles. Liz Landers ...
Just weeks into the new year, the Trump administration has rolled out a campaign across departments that draws on images and ideas borrowed from right-wing and white nationalist circles. Liz Landers ...
A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe. Tracked ...
WASHINGTON, Dec 30 (Reuters) - President Donald Trump's administration has lifted sanctions on three executives tied to the spy software consortium Intellexa, according to a notice published to the ...
Demonstrators rally to show support to the transgender community at the Texas State Capitol on the Trans Day of Visibility, April 2, 2022. (Sheryl Wong for KUT) The state of Texas has continued ...
A cyber threat group affiliated with Hamas has been conducting espionage across the Middle East. "Wirte" — tracked by Palo Alto's Unit 42 as "Ashen Lepus" — has been spying on regional government ...
Microsoft has cut its sales targets for its agentic AI software after struggling to find buyers interested in using it. In some cases, targets have been slashed by up to 50%, suggesting Microsoft ...
Vector maps have thematic information, and these are used in real-time applications like navigation, urban and regional planning, disaster management and risk assessment, etc. Generating vector maps ...
China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage campaign that recently switched to more sophisticated attack methods. Since 2022, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results