Author

2nd June – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd June, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES IT management software company ConnectWise confirmed that a sophisticated nation-state cyberattack had compromised its environment, affecting a limited number of customers using its ScreenConnect remote access tool. The company launched a forensic…

Read More

Whales blow bubble rings—And they might be talking to us

A team of scientists from the SETI Institute and the University of California at Davis documented, for the first time, humpback whales producing large bubble rings, like a human smoker blowing smoke rings, during friendly interactions with humans. This previously little studied behavior may represent play or communication. Humpback whales are already known for using…

Read More

How To Style Quiet Luxury

By definition quiet luxury is all about effortless-looking wardrobe staples that are crafted with good tailoring, subtle elegance and minimalism in mind. My aesthetic has always been very minimal, investing in wardrobe staples that last in your closet. I took a mixture of my elevated basics to create these looks. Pants: DISSH | Vest: DISSSH…

Read More

How outdated phones can power smart cities and save the seas

Each year, more than 1.2 billion smartphones are produced globally. The production of electronic devices is not only energy-intensive but also consumes valuable natural resources. Additionally, the manufacturing and delivery processes release a significant amount of CO2 into the atmosphere. Meanwhile, devices are aging faster than ever — users replace their still-functional phones on average…

Read More