Reading view

There are new articles available, click to refresh the page.

Apple abruptly abandons “buy now, pay later” service amid regulatory scrutiny

Apple abruptly abandons “buy now, pay later” service amid regulatory scrutiny

Enlarge (credit: sesame | DigitalVision Vectors)

Apple has abruptly discontinued its "buy now, pay later" (BNPL) service, Apple Pay Later, which turned Apple into a money lender when it launched last March in the US and became widely available in October.

The service previously allowed users to split the cost of purchases of up to $1,000 into four installments that were repaid over six weeks without worrying about extra fees or paying interest. For Apple, it was likely a move to increase total Apple Pay users as the company sought to offer more core financial services through its devices.

Now, it appears that Apple has found a different route to offer short-term loans at checkout in Apple Pay. An Apple spokesperson told 9to5Mac that the decision to end Apple Pay Later came ahead of the company's plan to start offering new types of installment loans globally.

Read 20 remaining paragraphs | Comments

Nvidia becomes world’s most valuable company amid AI boom

Chipmaker dethrones Microsoft and Apple as stock market surge boosts valuation above $3.3tn

Nvidia became the world’s most valuable company on Tuesday, dethroning tech heavyweight Microsoft, as its chips continue to play a central role in a race to dominate the market for artificial intelligence.

Shares of the chipmaker climbed 3.2% to $135.21, lifting its market capitalization to $3.326tn, just days after overtaking the iPhone maker Apple to become the second most valuable company.

Continue reading...

💾

© Photograph: Tyrone Siu/Reuters

💾

© Photograph: Tyrone Siu/Reuters

Trump campaign and congressional Republicans slam Biden’s latest immigration move – live

Trump campaign accuses Biden of offering ‘mass amnesty’ to undocumented; senator Josh Hawley vowed to investigate the policy if the GOP regains Senate control after election

Republicans in the House and Senate are in uproar over Joe Biden’s newly announced policy that will allow US citizens’ undocumented spouses and children who have resided in the country for more than a decade to apply for residency.

Missouri senator Josh Hawley vowed to investigate the policy, if the GOP regains control of the Senate following the November elections. The party is seen as having a good chance of doing so, since Democrats are defending two seats in red states and several others in swing states.

Continue reading...

💾

© Photograph: Nicholas Kamm/AFP/Getty Images

💾

© Photograph: Nicholas Kamm/AFP/Getty Images

Hargreaves Lansdown says it will accept private equity buyout offer

Investment fund supermarket has been offered £11.40 a share by trio of international investors

British investment fund supermarket Hargreaves Lansdown has said it will accept a proposed offer from a trio of private equity investors, meaning another of the UK’s biggest companies will leave the FTSE 100 index.

In a stock market filing on Tuesday, the company said that the US private equity firm CVC, Denmark’s Nordic Capital and a subsidiary of the Abu Dhabi Investment Authority (ADIA) had made an offer worth £11.40 a share in cash.

Continue reading...

💾

© Photograph: Dado Ruvić/Reuters

💾

© Photograph: Dado Ruvić/Reuters

Vermont Republican secretly poured water into colleague’s bag over months

Mary Morrissey apologizes after being filmed dumping liquid into backpack of Democratic legislator Jim Carroll

A Vermont lawmaker was compelled to apologize publicly after being caught on video pouring water into her colleague’s work bag multiple times across several months.

The bizarre behavior is allegedly a part of a campaign of harassment that one legislator aimed at another who represents the same district in the Green Mountain state, independent outlet Seven Days first reported.

Continue reading...

💾

© Photograph: Vermont General Assembly

💾

© Photograph: Vermont General Assembly

Labour landslide projected with dozens of Tory-held seats on knife-edge

Data showing 15% swing away from Conservatives since 2019 likely to stoke party’s fears of ‘extinction-level event’ at general election

Labour is heading for a landslide win in the election, according to a new projection, but more than 100 Conservative-held seats appear to be on a knife-edge with the results in the hands of millions of undecided or swing voters.

In its first MRP model of the 2024 general election, Ipsos estimated Labour could win 453 seats and the Conservatives 115, giving Keir Starmer’s party a majority of 256 and inflicting the Tories’ worst ever defeat.

Continue reading...

💾

© Photograph: Getty Images

💾

© Photograph: Getty Images

Red, white and blue jeans: USA go with denim for Olympics uniforms

  • Ralph Lauren unveils uniforms for Paris ceremonies
  • Athletes praise “modern, approachable” design

When Team USA walks with the world’s athletes at the Paris Olympics’ opening ceremony, they’ll be doing so in snappy tailored navy blazers from Ralph Lauren – and blue jeans.

Just regular, everyday denim blue jeans.

Continue reading...

💾

© Photograph: Charles Sykes/Invision/AP

💾

© Photograph: Charles Sykes/Invision/AP

‘He was a perfect, beautiful woman’: the female impersonator who became a 1920s star

Julian Eltinge conquered stage and screen a century ago, when gender play was normalized. But his biographer says Eltinge was ‘not an easy ally’

Over a hundred years ago, a cis man rose to superstardom as a female impersonator. His proto-drag persona was so popular – and accepted into the mainstream – that he ran his own ladies’ magazine, sold cold cream to female fans, and counted royals and celebrities as superfans.

In the new book Beautiful: The Story of Julian Eltinge, America’s Greatest Female Impersonator, the writer Andrew L Erdman documents the life of a turn-of-the-century performer whose career would still be considered radical more than 80 years after his death. The title refers to a common description of Eltinge, who was known for his elaborate costumes, tight corseting and highly illusionary makeup skills. “He was this perfect, beautiful woman,” Erdman said in an interview. “[Female impersonation] got very normalized in the 1920s … there was a lot of gender play and openness across the spectrum.”

Continue reading...

💾

© Photograph: Laurence Senelick Collection

💾

© Photograph: Laurence Senelick Collection

Boston’s brilliant technocrats micromanaged their way to the NBA title

This Celtics team, while not quite as luminously talented as peak Steph Curry Golden State, have much of their predecessors’ machine-like air of inevitability

A blizzard of confetti across the parquet floor at TD Garden; the words “Jaylen Brown finals MVP” no longer a punchline used to taunt the Massachusetts basketball faithful but solid, unarguable reality; the Larry O’Brien trophy in the hands of Celtics owner Wyc Grousbeck; and Boston confirmed, with their 18th championship, as the most successful franchise in NBA history.

Were these the worst NBA finals – for neutrals, at least – in recent memory though? A 4-1 scoreline certainly suggests so, and the manner of the Mavericks’ capitulation on Monday night – gamely keeping pace for the first 10 minutes of the first quarter before Boston made the title all but secure by half-time – applied a weak punctuation mark to what had been a rousing Dallas effort in Game 4. In the end, Kyrie Irving failed to show up on the court that once sang his name, the Mavericks supporting cast reverted to mediocre type, and the velvet hands and magic buttocks (and dodgy knee, and injured chest) of Luka Dončić simply had nothing left to give against a Boston outfit that was too smooth, too strong, too powerful at both ends of the court. With this 18th title, after 16 Larry O’Brien-less years, the Celtics now move ahead of their historic rivals the Lakers in the NBA’s all-time championship tally.

Continue reading...

💾

© Photograph: Charles Krupa/AP

💾

© Photograph: Charles Krupa/AP

Alarming lack of access to green space fuelling UK child obesity crisis, doctors warn

Exclusive: Medics say children with poor access to outdoor play at school at higher risk of developing lifelong health problems

Doctors have warned that a “truly alarming” lack of access to outdoor space at schools is exacerbating Britain’s child obesity crisis.

Child obesity is already a significant public health problem. In England, one in three children are leaving primary school overweight or obese and face a higher risk of serious health conditions, mental health problems and dying prematurely.

Continue reading...

💾

© Photograph: Matthew Horwood/Getty Images

💾

© Photograph: Matthew Horwood/Getty Images

Restaurants are dying and the Tories won’t save them. That’s why they won’t get my vote | Tom Kerridge

Food prices and lack of experienced staff are pushing the hospitality industry to ruin – we need fresh thinking

When I opened the Hand and Flowers, the first pub in Britain to receive two Michelin stars, we scrimped, saved, maxed out our credit cards and held our breath. It was 2005, and the economic climate was very different back then. People had more money in their pockets, Britain was still a member of the EU, and a global pandemic would have seemed like a far-fetched nightmare.

Today, I still firmly believe that if you have guts and determination, Britain can be a good place to open a restaurant or start a food business. But starting something is the easy part. Trying to keep that business open is now a different story altogether.

Tom Kerridge is the chef-patron of the Hand and Flowers in Marlow, Buckinghamshire

Continue reading...

💾

© Photograph: Olivier Douliery/AFP/Getty Images

💾

© Photograph: Olivier Douliery/AFP/Getty Images

‘Times change, principles don’t’: Britons share what will decide their vote this election

Hundreds say they plan to switch, whether due to tactical reasons, single issues such as Gaza, or disappointment in Labour and the Tories

“I’ll vote Labour, 100%,” said Sean, 36, a married designer and homeowner from Chester who voted Lib Dem at the last election. “The party is a lot more centrist now than it was in 2019.

“Keir Starmer may not be the most electrifying politician, but he is what we need right now. A safe, competent pair of hands who can bring some stability. And I’d absolutely trust Labour more with the NHS than the Tories. Labour will probably be more willing to invest in it.”

Continue reading...

💾

© Photograph: Neil Hall/EPA

💾

© Photograph: Neil Hall/EPA

Workers at Premier Inn owner to protest at AGM against plans to cut 1,500 jobs

Unite union also considering employment tribunal claims for unfair dismissal against Whitbread

Workers are planning to demonstrate at Premier Inn owner Whitbread’s annual shareholder meeting over plans to cut 1,500 jobs amid rising profits.

The employees of restaurants including Brewers Fayre, Table Table and Beefeater plan to protest outside the company’s investor meeting in Dunstable, Bedfordshire on Tuesday.

Continue reading...

💾

© Photograph: Lee Smith/Reuters

💾

© Photograph: Lee Smith/Reuters

From Endrick to Adams: 10 players ready to shine at Copa América

With the tournament kicking off this week, we look at the players who will be decisive in the US this summer

One of the beautiful things about soccer in the Americas is the mix of players who suit up at the international level. Peru will once again trust 40-year-old Paolo Guerrero at a Copa América, Chile will turn to 41-year-old goalkeeper Claudio Bravo while future stars like 17-year-old Kendry Páez of Ecuador and 19-year-old Valentín Carboni of Argentina will play in their major international tournament.

Between the extremes, there are plenty of players in their primes who will dazzle. We trust you’re familiar with Lionel Messi, Vinícius Júnior and Luis Díaz, so here are 10 players who should star – if not shine as brightly as the Ballon d’Or contenders – in the US this summer.

Continue reading...

💾

© Composite: Action Images/Getty

💾

© Composite: Action Images/Getty

Britons cut back on spending despite fall in grocery inflation, says Kantar

Bad weather makes consumers trim supermarket shop and rethink summer purchases despite slower food price rises

Britons have cut back on their supermarket shopping and traditional summer purchases because of recent poor weather, even though grocery price inflation slowed further, according to a report.

Supermarket prices were 2.1% higher than a year ago in the four weeks to 9 June, according to the retail researchers Kantar. This is down from May’s 2.4% inflation rate, and marks the 16th month that price rises have slowed. Kantar found costs are falling in nearly a third of the categories it tracks, including toilet tissue, butter and milk, an improvement from last year when just 1% of categories showed price declines.

Continue reading...

💾

© Photograph: Bloomberg/Getty Images

💾

© Photograph: Bloomberg/Getty Images

Navigating Retail: Overcoming the Top 3 Identity Security Challenges

As retailers compete in an increasingly competitive marketplace, they invest a great deal of resources in becoming household names. But brand recognition is a double-edged sword when it comes to cybersecurity. The bigger your name, the bigger the cyber target on your back. Data breaches in the retail sector cost an average of $3.28 million...

The post Navigating Retail: Overcoming the Top 3 Identity Security Challenges appeared first on Silverfort.

The post Navigating Retail: Overcoming the Top 3 Identity Security Challenges appeared first on Security Boulevard.

Guidehouse and Nan McKay to Pay $11.3M for Cybersecurity Failures in COVID-19 Rental Assistance

Cybersecurity

Guidehouse Inc., based in McLean, Virginia, and Nan McKay and Associates, headquartered in El Cajon, California, have agreed to pay settlements totaling $11.3 million to resolve allegations under the False Claims Act. The settlements came from their failure to meet cybersecurity requirements in contracts aimed at providing secure online access for low-income New Yorkers applying for federal rental assistance during the COVID-19 pandemic.

What Exactly Happened?

In response to the economic hardships brought on by the pandemic, Congress enacted the Emergency Rental Assistance Program (ERAP) in early 2021. This initiative was designed to offer financial support to eligible low-income households in covering rent, rental arrears, utilities, and other housing-related expenses. Participating state agencies, such as New York's Office of Temporary and Disability Assistance (OTDA), were tasked with distributing federal funding to qualified tenants and landlords. Guidehouse assumed a pivotal role as the prime contractor for New York's ERAP, responsible for overseeing the ERAP technology and services. Nan McKay acted as Guidehouse's subcontractor, entrusted with delivering and maintaining the ERAP technology used by New Yorkers to submit online applications for rental assistance.

Admission of Violations and Settlement

Critical to the allegations were breaches in cybersecurity protocols. Both Guidehouse and Nan McKay admitted to failing their obligation to conduct required pre-production cybersecurity testing on the ERAP Application. Consequently, the ERAP system went live on June 1, 2021, only to be shut down twelve hours later by OTDA due to a cybersecurity breach. This data breach exposed the personally identifiable information (PII) of applicants, which was found accessible on the Internet. Guidehouse and Nan McKay acknowledged that proper cybersecurity testing could have detected and potentially prevented such breaches. Additionally, Guidehouse admitted to using a third-party data cloud software program to store PII without obtaining OTDA’s permission, violating their contractual obligations.

Government Response and Accountability

Principal Deputy Assistant Attorney General Brian M. Boynton of the Justice Department’s Civil Division emphasized the importance of adhering to cybersecurity commitments associated with federal funding. "Federal funding frequently comes with cybersecurity obligations, and contractors and grantees must honor these commitments,” said Boynton. “The Justice Department will continue to pursue knowing violations of material cybersecurity requirements aimed at protecting sensitive personal information.” U.S. Attorney Carla B. Freedman for the Northern District of New York echoed these sentiments, highlighting the necessity for federal contractors to prioritize cybersecurity obligations. “Contractors who receive federal funding must take their cybersecurity obligations seriously,” said Freedman. “We will continue to hold entities and individuals accountable when they knowingly fail to implement and follow cybersecurity requirements essential to protect sensitive information.” Acting Inspector General Richard K. Delmar of the Department of the Treasury emphasized the severe impact of these breaches on a program crucial to the government’s pandemic recovery efforts. He expressed gratitude for the partnership with the DOJ in addressing this breach and ensuring accountability. “These vendors failed to meet their data integrity obligations in a program on which so many eligible citizens depend for rental security, which jeopardized the effectiveness of a vital part of the government’s pandemic recovery effort,” said Delmar. “Treasury OIG is grateful for DOJ’s support of its oversight work to accomplish this recovery.” New York State Comptroller Thomas P. DiNapoli emphasized the critical role of protecting the integrity of programs like ERAP, vital to economic recovery. He thanked federal partners for their collaborative efforts in holding these contractors accountable. “This settlement sends a strong message to New York State contractors that there will be consequences if they fail to safeguard the personal information entrusted to them or meet the terms of their contracts,” said DiNapoli. “Rental assistance has been vital to our economic recovery, and the integrity of the program needs to be protected. I thank the United States Department of Justice, United States Attorney for the Northern District of New York Freedman and the United States Department of Treasury Office of the Inspector General for their partnership in exposing this breach and holding these vendors accountable.”

Initiative to Address Cybersecurity Risks

In response to such breaches, the Deputy Attorney General announced the Civil Cyber-Fraud Initiative on October 6, 2021. This initiative aims to hold accountable entities or individuals who knowingly endanger sensitive information through inadequate cybersecurity practices or misrepresentations. The investigation into these breaches was initiated following a whistleblower lawsuit under the False Claims Act. As part of the settlement, whistleblower Elevation 33 LLC, owned by a former Guidehouse employee, will receive approximately $1.95 million. Trial Attorney J. Jennifer Koh from the Civil Division's Commercial Litigation Branch, Fraud Section, and Assistant U.S. Attorney Adam J. Katz from the Northern District of New York led the case, with support from the Department of the Treasury OIG and the Office of the New York State Comptroller. These settlements highlight the imperative for rigorous cybersecurity measures in federal contracts, particularly in safeguarding sensitive personal information critical to public assistance programs. As the government continues to navigate evolving cybersecurity threats, it remains steadfast in enforcing accountability among contractors entrusted with protecting essential public resources.

Cybersecurity Experts Warn of Rising Malware Threats from Sophisticated Social Engineering Tactics

TA571 and ClearFake Campaign 

Cybersecurity researchers have uncovered a disturbing trend in malware delivery tactics involving sophisticated social engineering techniques. These methods exploit user trust and familiarity with PowerShell scripts to compromise systems.  Among these threat actors, the two highlighted, TA571 and ClearFake campaign, were seen leveraging social engineering for spreading malware. According to researchers, the threat actors associated with TA571 and the ClearFake cluster have been actively using a novel approach to infiltrate systems.  This technique involves manipulating users into copying and pasting malicious PowerShell scripts under the guise of resolving legitimate issues.

Understanding the TA571 and ClearFake Campaign 

[caption id="attachment_77553" align="alignnone" width="1402"]TA571 and ClearFake Campaign  Example of a ClearFake attack chain. (Source: Proofpoint)[/caption] The TA571 campaign, first observed in March 2024, distributed emails containing HTML attachments that mimic legitimate Microsoft Word error messages. These messages coerce users to execute PowerShell scripts supposedly aimed at fixing document viewing issues.  Similarly, the ClearFake campaign, identified in April 2024, employs fake browser update prompts on compromised websites. These prompts instruct users to run PowerShell scripts to install what appears to be necessary security certificates, says Proofpoint. Upon interaction with the malicious prompts, users unwittingly copy PowerShell commands to their clipboard. Subsequent instructions guide them to paste and execute these commands in PowerShell terminals or via Windows Run dialog boxes. Once executed, these scripts initiate a chain of events leading to the download and execution of malware payloads such as DarkGate, Matanbuchus, and NetSupport RAT. The complexity of these attacks is compounded by their ability to evade traditional detection methods. Malicious scripts are often concealed within double-Base64 encoded HTML elements or obscured in JavaScript, making them challenging to identify and block preemptively.

Attack Variants, Evolution, and Recommendations

Since their initial observations, Proofpoint has noted the evolution of these techniques. TA571, for instance, has diversified its lures, sometimes directing victims to use the Windows Run dialog for script execution instead of PowerShell terminals. Meanwhile, Clearlake has incorporated blockchain-based techniques like "EtherHiding" to host malicious scripts, adding a layer of obfuscation. These developments highlight the critical importance of user education and better cybersecurity measures within organizations. Employees must be trained to recognize suspicious messages and actions that prompt the execution of PowerShell scripts from unknown sources. Organizations should also deploy advanced threat detection and blocking mechanisms capable of identifying malicious activities embedded within seemingly legitimate web pages or email attachments. While the TA571 and ClearFake campaigns represent distinct threat actors with varying objectives, their utilization of advanced social engineering and PowerShell exploitation techniques demands heightened vigilance from organizations worldwide. By staying informed and implementing better cybersecurity practices, businesses can better defend against these online threats.

France now ‘most unloved’ European stock market; Le Pen victory would push up French debt, warns Goldman Sachs – business live

Rolling coverage of the latest economic and financial news

Iceland’s chairman, Richard Walker, says Kantar are correct that the cost of living squeeze isn’t over – before squeezing in a plug for his supermarket:

Back in January, Walker (a former Conservative supporter) announced he was backing Labour, saying Keir Starmer understood how the cost of living crisis has put an “unbearable strain” on families.

Continue reading...

💾

© Photograph: Denis Charlet/AFP/Getty Images

💾

© Photograph: Denis Charlet/AFP/Getty Images

Yet more EE excuses over payout when our internet went down

After a week-long delay to fix the problem, it only offered only £18.66 in compensation

Two months ago, our internet went down. EE arranged an engineer appointment with its partner firm Qube within 48 hours, but the visit was cancelled on the day. Another appointment was made for two days after that, but the engineer was unable to fix the problem. A week after the problem, an Openreach engineer attended and restored our service. EE’s compensation policy, in the event of total loss of service, entitles us to £48.80 plus £30.49 for a late-notice appointment cancellation. However, EE only paid £18.66. I was told compensation for cancelled appointments only applies to Openreach engineers and I wasn’t entitled to compensation for the seven-day delay because it recorded that there was no fault.
HT, Hook, Hampshire

The auto-compensation scheme is not goodwill on the part of EE; it’s a requirement by regulator Ofcom. Under the rules, customers are entitled to daily payments of £9.76 if their service is not restored within two working days and last-minute cancellations require a £30.49 payout.

Continue reading...

💾

© Photograph: AJTFoto/Alamy

💾

© Photograph: AJTFoto/Alamy

More Melroses, fewer Sheins: the real definition of success for London | Nils Pratley

Look to Simon Peckham’s return with Rosebank Industries for an example of where the market should place value

It’s a euros triumph already: the value of all the companies on the London stock market is greater than all those on the Paris exchange: $3.18tn plays $3.13tn, calculates Bloomberg.

Actually, we should probably contain our excitement. First, the position is not groundbreaking: until only a few years ago, London was miles ahead as the biggest stock market in Europe. Second, the current position could reverse in an instant: it would merely take a marginal improvement in the value of fashion stocks such as LVMH, Hermès and Gucci-owning Kering that are heavyweights in Paris.

Continue reading...

💾

© Photograph: Stefan Wermuth/Reuters

💾

© Photograph: Stefan Wermuth/Reuters

What are the main UK parties promising on climate and is it enough? – podcast

Last week more than 400 scientists signed an open letter to political parties urging ambitious action on the environment to prevent making Britain and the world ‘more dangerous and insecure’.

Now that the main parties’ manifestos have all been released, Ian Sample is joined by the global environment editor, Jon Watts, and the biodiversity reporter, Phoebe Weston, to find out what the manifestos have to say about nature and climate, and whether anyone is promising the level of action scientists are asking for

Find more analysis of how the UK parties rate on their environmental manifesto pledges

Continue reading...

💾

© Photograph: Rob Arnold/Alamy

💾

© Photograph: Rob Arnold/Alamy

Boston Celtics beat Dallas Mavericks in NBA finals to win record 18th title

The Boston Celtics beat the Dallas Mavericks 106-88 on Monday night to claim a record 18th NBA title, one more than their old rivals the Lakers.

“You have very few chances in life to be great … you’ve got to take the bull by the horns and you’ve got to own it, and our guys owned it,” said the Celtics’ 35-year-old coach, Joe Mazzulla, at the trophy presentation ceremony.

Continue reading...

💾

© Photograph: Peter Casey/USA Today Sports

💾

© Photograph: Peter Casey/USA Today Sports

Thailand passes historic bill recognising marriage equality

Country on track to become third in Asia – after Taiwan and Nepal – to legalise same-sex marriage

Thailand’s senate has passed the final reading of a historic marriage equality bill, paving the way for the country to become the first in south-east Asia to recognise same-sex marriage.

The bill gained the support of nearly all upper-house lawmakers and will be sent to the palace for the pro-forma endorsement by King Maha Vajiralongkorn. The law will come into force 120 days after it is published in the royal gazette.

Continue reading...

💾

© Photograph: Nathalie Jamois/SOPA Images/REX/Shutterstock

💾

© Photograph: Nathalie Jamois/SOPA Images/REX/Shutterstock

Enhancing Enterprise Browser Security

TechSpective Podcast Episode 133   Nick Edwards, Vice President of Product Management at Menlo Security joins me for this insightful episode of the TechSpective Podcast. Nick brings decades of cybersecurity experience to the table, offering a deep dive into the […]

The post Enhancing Enterprise Browser Security appeared first on TechSpective.

The post Enhancing Enterprise Browser Security appeared first on Security Boulevard.

💾

From Risk to Resolution: OX Security’s Integrations with KEV and EPSS Drive Smarter Vulnerability Prioritization

In June 2023, a critical vulnerability (CVE-2023-34362) in the MOVEit Transfer file transfer software was exploited by adversaries, resulting in a series of high-profile data breaches. Despite the availability of patches, and the vulnerability being publicly known and actively exploited, many organizations failed to prioritize its remediation. This lapse allowed attackers to gain unauthorized access […]

The post From Risk to Resolution: OX Security’s Integrations with KEV and EPSS Drive Smarter Vulnerability Prioritization appeared first on OX Security.

The post From Risk to Resolution: OX Security’s Integrations with KEV and EPSS Drive Smarter Vulnerability Prioritization appeared first on Security Boulevard.

Cinnamon 6.2 released

Cinnamon, the popular GTK desktop environment developed by the Linux Mint project, pushed out Cinnamon 6.2 today, which will serve as the default desktop for Linux Mint 22. It’s a relatively minor release, but it does contain a major new feature which is actually quite welcome: a new GTK frontend for GNOME Online Accounts, part of the XApp project. This makes it possible to use the excellent GNOME Online Accounts framework, without having to resort to a GNOME application – and will come in very handy on other GTK desktops, too, like Xfce.

The remainder of the changes consist of a slew of bugfixes, small new features, and nips and tucks here and there. Wayland support is still an in-progress effort for Cinnamon, so you’ll be stuck with X for now.

West Mercia police in ‘chaos’ after failure to find new chief constable

Met police commander Kyle Gordon had been chosen to be force’s new head but will not now be taking up role

A police force has been thrown into “chaos” after its lengthy search for a new chief constable ended in failure.

The Metropolitan police commander Kyle Gordon was chosen to be the new head of the West Mercia force after a recruitment process led by John Campion, the Conservative police and crime commissioner (PCC) for the region.

Continue reading...

💾

© Photograph: Jacob King/PA

💾

© Photograph: Jacob King/PA

Keir Starmer ‘not immune’ to argument for scrapping two-child benefit cap

Labour leader says projected rise in number of children hit by policy is ‘powerful’ reason to ditch it but refuses to set timeline

Keir Starmer has said he is “not immune” to the powerful argument for scrapping the two-child benefit cap, after experts said the number of children affected by it would rise by a third in the next five years.

The Labour leader refused to set out a timeline for when he would scrap the policy, despite previously saying he would ditch it if he could.

Continue reading...

💾

© Photograph: David Levene/The Guardian

💾

© Photograph: David Levene/The Guardian

New York military veteran comes out in obituary: ‘I was gay all my life’

Colonel Edward Thomas Ryan, who died at age 85, will be buried next to his life partner Paul Cavagnaro

A US military veteran who died earlier this month came out as gay in an obituary published after his death.

The obituary in the Albany Times-Union tells the story of Colonel Edward Thomas Ryan, a decorated army officer who served in the Vietnam war and was also a fireman in his hometown, Rensselaer, New York. He died on 1 June at the age 85.

Continue reading...

💾

© Photograph: Legacy.com

💾

© Photograph: Legacy.com

Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing

Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security weaknesses strategically.

The post Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing appeared first on Horizon3.ai.

The post Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing appeared first on Security Boulevard.

Leadership Expansion: Introducing Our New SVP of Sales and SVP of Customer

It’s an exciting time here at Hyperproof! We are thrilled to announce that two new senior leaders have joined Hyperproof: Jay Hussein, Senior Vice President of Customer, and Mike Johnson, Senior Vice President of Sales. Both Mike and Jay have a wealth of experience serving larger enterprises and will support Hyperproof as we scale our...

The post Leadership Expansion: Introducing Our New SVP of Sales and SVP of Customer appeared first on Hyperproof.

The post Leadership Expansion: Introducing Our New SVP of Sales and SVP of Customer appeared first on Security Boulevard.

Strengthening the Shield: Cybersecurity Strategies for SMEs

Cybersecurity Strategies

By: Abhilash R., Head of Cybersecurity at OQ Trading In a progressively digital world, small and medium sized enterprises (SMEs) are not immune to cyber threats. Despite their size, SMEs are prime targets for cyberattacks due to their limited resources and perceived vulnerability. Therefore, implementing robust cybersecurity strategies is imperative to safeguard sensitive data, maintain customer trust, and ensure business continuity. This article delves into five essential cybersecurity strategies tailored to SMEs, emphasizing their importance, and providing cost effective solutions.

Employee Education and Training

One of the most critical cybersecurity strategies for SMEs is ensuring that employees are educated and trained in cybersecurity best practices. Human error remains a significant factor in cyber incidents, making cybersecurity awareness training indispensable. Employees should be educated on recognizing phishing attempts, creating strong passwords, and understanding the importance of software updates. Importance: Employees serve as the first line of defence against cyber threats, they are also the weakest links in cybersecurity. By educating them, SMEs can significantly reduce the risk of successful cyberattacks. Solutions: Implement regular cybersecurity training sessions for all employees, covering topics such as identifying suspicious emails, safe internet browsing practices, and responding to security incidents. Utilize online training resources and simulations to reinforce learning effectively. You can develop internal cybersecurity awareness materials using free or low cost presentation tools such as Google Slides or Microsoft PowerPoint. Create engaging presentations covering topics like identifying phishing emails, password best practices, and responding to security incidents. Additionally, leverage free online resources such as cybersecurity blogs, webinars, and tutorials to supplement employee training efforts. Encourage participation in online courses offered by reputable cybersecurity organizations, some of which may be available at no cost.

Implementing Multi-Factor Authentication (MFA)

Multifactor authentication (MFA) adds an extra layer of security by requiring users to provide multiple forms of verification before accessing sensitive data or systems. This strategy helps mitigate the risk of unauthorized access, even if passwords are compromised. Importance: Passwords alone are no longer sufficient to protect against cyber threats. MFA significantly enhances security by requiring additional authentication factors, such as biometric data or one-time codes. Solutions: Implement MFA for all accounts with access to sensitive information or critical systems. Many cloud-based services and software applications offer built-in MFA capabilities, making implementation relatively straightforward and cost effective. Utilize built-in MFA features provided by cloud-based services and software applications, many of which offer MFA functionality at no additional cost. Implement open source MFA solutions that can be customized to fit the organization's specific needs without incurring licensing fees. Alternatively, explore low-cost MFA options offered by third-party providers, ensuring compatibility with existing systems and scalability as the business grows.

Regular Data Backups

Data loss can have devastating consequences for SMEs, ranging from financial losses to reputational damage. Regularly backing up data is essential for mitigating the impact of ransomware attacks, hardware failures, or accidental deletions. Importance: Data backups serve as a safety net, allowing SMEs to recover quickly in the event of a cyber incident. Without backups, businesses risk permanent loss of valuable information. Solutions: Automate regular backups of critical data to secure cloud storage or offline storage devices. Utilize backup solutions that offer versioning capabilities, allowing businesses to restore data to previous states if necessary. Utilize cloud based backup solutions that offer affordable storage options and automated backup scheduling. Leverage free or low cost backup software with basic features for backing up critical data to secure cloud storage or external hard drives. Implement a combination of full and incremental backups to optimize storage space and minimize backup times. Explore open source backup solutions that provide flexibility and customization options without the need for expensive proprietary software.

Network Security Measures

Securing the network infrastructure is crucial for protecting against external threats and unauthorized access. SMEs should implement robust network security measures, such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs). Importance: Networks are prime targets for cyberattacks, making network security measures essential for preventing unauthorized access and data breaches. Solutions: Deploy firewalls to monitor and control incoming and outgoing network traffic. Implement IDS to detect and respond to suspicious activities within the network. Utilize VPNs to encrypt data transmissions and establish secure connections for remote workers. Implement open source firewall solutions that provide robust network protection without the high cost associated with commercial firewalls. Utilize free or low cost intrusion detection system (IDS) software that offers essential features such as real time monitoring and threat detection. Explore cost effective virtual private network (VPN) solutions tailored to SMEs' needs, such as subscription based services with affordable pricing plans and easy deployment for remote workers.

Regular Security Assessments and Updates

Cyber threats are constantly evolving, requiring SMEs to stay vigilant and proactive in their cybersecurity efforts. Regular security assessments and updates help identify vulnerabilities and ensure that systems and software are up to date with the latest security patches. Importance: Cyber threats are continuously evolving, making regular security assessments and updates essential for maintaining strong cybersecurity posture. Solutions: Conduct regular security assessments to identify potential vulnerabilities in systems, networks, and applications. Develop and implement a patch management strategy to ensure that software and firmware updates are applied promptly. Conduct internal security assessments using free or low cost vulnerability scanning tools to identify potential weaknesses in systems and networks. Utilize open source penetration testing frameworks to simulate cyberattacks and assess the effectiveness of existing security measures. Implement a systematic approach to applying security patches and updates, leveraging free tools provided by software vendors or community driven initiatives. Additionally, establish internal processes for monitoring security advisories and alerts issued by relevant authorities to stay informed about emerging threats and vulnerabilities. In conclusion, cybersecurity is a critical concern for SMEs in today's digital landscape. By implementing the strategies explained above, SMEs can significantly enhance their cybersecurity posture without breaking the bank. Investing in cybersecurity is not only essential for protecting sensitive data and maintaining business operations but also for safeguarding the long-term viability and reputation of SMEs in an increasingly interconnected world. About Author: Abhilash Radhadevi, a seasoned cybersecurity leader, serves as the Head of Cybersecurity at OQ Trading, bringing over two decades of comprehensive experience in the Banking, Financial, Oil and Energy sectors. Widely recognized for his adept leadership, Abhilash has effectively steered international organizations through intricate security challenges. His illustrious career includes spearheading pioneering cybersecurity strategies, resulting in prestigious awards and acclaim. Beyond his professional achievements, Abhilash maintains a global influence and demonstrates unwavering commitment to mentoring, showcasing his dedication to shaping the future landscape of cybersecurity. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Understanding Cyberconflict in the Geopolitical Context

Cyberconflict

By Hoda Alkhzaimi The technological prowess of small nations is increasingly recognized as a significant driver of global economic power. This is because technology is a great equalizer; it can enable small nations to leapfrog development stages and compete on a global scale. For instance, the UNCTAD Technology and Innovation Report 2021 highlights that frontier technologies like AI, robotics, and biotechnology have the potential to significantly boost sustainable development, while also posing the risk of widening the digital divide. Small nations, by embracing these technologies, can foster innovation, improve productivity, and create high-value industries that contribute to global trade and economic growth. Moreover, the digital transformation allows for the democratization of information and resources, enabling smaller economies to participate in markets traditionally dominated by larger countries. The OECD also emphasizes the role of SMEs in adapting to a more open and digitalized environment, which is essential for inclusive globalization. Therefore, the technological development of small nations is not just about national progress; it's about contributing to and shaping the global economic landscape. By investing in technology and innovation, small nations can assert their presence on the world stage, influencing global trends and economic policies. Cyber conflicts have emerged as a significant factor in international relations, influencing the dynamics of power in the digital age. The Atlantic Council's Cyber Statecraft Initiative highlights the shift from traditional deterrence strategies to more proactive measures like Defend Forward and Persistent Engagement, reflecting the evolving nature of cyber threats. Research published in Armed Forces & Society suggests that cyber conflicts, termed 'cool wars', are reshaping interactions between states, with denial-of-service attacks and behaviour-changing tactics significantly affecting state relations. Moreover, the ICRC has raised concerns about the protection of civilians from cyber threats during armed conflicts, emphasizing the need for legal and policy frameworks to address the digital risks in warfare. The CyberPeace Institute's analysis of cyberattacks in the context of the Ukraine conflict provides valuable data on the harm to civilians and the evolution of cyber threats. Additionally, the European Repository of Cyber Incidents offers an extensive database of cyber incidents, which can serve as a resource for understanding the scope and impact of cyber warfare. These insights underscore the importance of cyber capabilities in asserting influence and the need for robust cyber defence mechanisms to safeguard national security and civilian welfare in the face of digital threats. The interplay between cyber operations and political power is complex, and as technology continues to advance, the implications for international stability and power hierarchies will likely become even more pronounced

The Role of Misinformation and Disinformation in Cyberconflict

Misinformation and disinformation play a critical role in the landscape of cyberconflict, shaping public perception and influencing the dynamics of geopolitical tensions. A report by Full Fact highlights the detrimental impact of false information on democratic societies, emphasizing the need for informed citizenship to combat the spread of such information. Similarly, data from UNESCO underscores the pervasive risk of encountering disinformation across various media platforms, with statistics indicating a significant trust deficit in media and an increase in the manipulation of news consumption. The cybersecurity sector also recognizes disinformation as a substantial threat, with a study by the Institute for Public Relations revealing that 63% of Americans view disinformation as a major societal issue, and nearly half of cybersecurity professionals consider it a significant threat to security. These concerns are echoed globally, as a survey found that over 85% of people worry about the impact of online disinformation on their country's politics. The intertwining of misinformation, disinformation, and cyberconflict presents a complex challenge that requires a multifaceted approach, including media literacy, regulatory frameworks, and international cooperation to mitigate its effects and safeguard information integrity.

The Role of Big Tech in Cyberconflict Interplay

The role of big tech companies in cyber conflict is a complex and evolving issue. These companies often find themselves at the forefront of cyber conflict, whether as targets, mediators, or sometimes even participants. For instance, during civil conflicts, digital technologies have been used to recruit followers, finance activities, and control narratives, posing additional challenges for peacemakers. The explosive growth of digital technologies has also opened new potential domains for conflict, with state and non-state actors capable of carrying out attacks across international borders, affecting critical infrastructure and diminishing trust among states. In response to the invasion of Ukraine, big tech companies played crucial roles in addressing information warfare and cyber-attacks, showcasing their significant influence during times of conflict. Moreover, the technological competition between major powers like the United States and China further highlights the geopolitical dimension of big tech's involvement in cyber conflict. These instances underscore the need for a robust framework to manage the participation of big tech in cyber conflict, ensuring that their capabilities are harnessed for peace and security rather than exacerbating tensions.

Hedging the Risks of Using AI and Emerging Tech To Scaleup Misinformation and Global Cyberconflicts

In response to the growing threat of election misinformation, various initiatives have been undertaken globally. The World Economic Forum has identified misinformation as a top societal threat and emphasized the need for a concerted effort to combat it, especially in an election year with a significant global population going to the polls. The European Union has implemented a voluntary code of practice for online platforms to take proactive measures against disinformation, including the establishment of a Rapid Alert System and the promotion of fact-checking and media literacy programs. In the United States, the Brennan Center for Justice advocates for active monitoring of false election information and collaboration with internet companies to curb digital disinformation. Additionally, the North Carolina State Board of Elections (NCSBE) provides guidelines for the public to critically assess the credibility of election news sources and encourages the use of reputable outlets. These initiatives represent a multifaceted approach to safeguarding the integrity of elections by enhancing public awareness, improving digital literacy, and fostering collaboration between governments, tech companies, and civil society. In the ongoing battle against election misinformation, several key alliances and actions have been formed. Notably, the AI Elections Accord was proposed for public signature at the Munich Security Conference on February 16, 2024. This accord represents a commitment by technology companies to combat deceptive AI content in elections. In a similar vein, Meta established a dedicated team on February 26, 2024, to address disinformation and the misuse of AI leading up to the European Parliament elections. Furthermore, the Federal Communications Commission (FCC) in the United States took a decisive step by making AI-generated voices in robocalls illegal on February 8, 2024, to prevent their use in misleading voters. These measures reflect a growing recognition of the need for collaborative efforts to safeguard the integrity of elections in the digital age. The alliances and regulations are pivotal in ensuring that the democratic process remains transparent and trustworthy amidst the challenges posed by advanced technologies. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Snowballing of the Snowflake Breach: All About the Massive Snowflake Data Breach

Snowflake breach, Snowflake, Snowflake cyber incident, Snowflake Cyberattack

With companies coming forward every day announcing impacts from their third-party cloud data storage vendor, the Snowflake data breach seems to be snowballing into one of the biggest data breaches of the digital age. Here's everything to know about the Snowflake breach; we'll update this page as new information becomes available.

Why the Snowflake Breach Matters

Snowflake is a prominent U.S.-based cloud data storage and analytics company, with over 9,800 global customers. Its customer base includes major corporations like Adobe, AT&T, Capital One, DoorDash, HP, JetBlue, Mastercard, Micron, NBC Universal, Nielsen, Novartis, Okta, PepsiCo, Siemens, US Foods, Western Union, and Yamaha, among others. Snowflake holds approximately a 20% share of the data warehouse market and was recently ranked #1 on the Fortune Future 50 List, it an attractive target for cybercriminals. However, it is crucial to note that the breaches are not necessarily due to failures by Snowflake. The correlation does not imply causation, as emphasized by Snowflake’s Chief Information Security Officer Brad Jones. The company, along with its forensic partners, found no evidence of vulnerabilities or breaches within Snowflake’s platform.

Ongoing Investigation and Preliminary Results in Snowflake Breach

On May 31, Snowflake revealed that attackers accessed customer accounts using single-factor authentication. According to preliminary results, these attackers leveraged credentials obtained through infostealing malware.

Compromised Employee Account

Snowflake confirmed that a threat actor obtained credentials from a single former employee, accessing demo accounts that were isolated from production and corporate systems. Snowflake’s core systems are protected by Okta and Multi-Factor Authentication (MFA) but the demo accounts lacked such safeguards.

Test Environments Targeted

Demo accounts are often overlooked as security risks. Despite assurances that these accounts do not contain sensitive data, they remain attractive targets due to their perceived value. Cybercriminals exploit the perception gap, knowing that a claimed breach of a high-profile company like Snowflake can generate significant media attention.

Attack Path

The initial access point for the attackers was almost certainly compromised credentials obtained through infostealing malware. Mandiant, who helped Snowflake in its investigation, confirmed that the compromised credentials were from customer instances and were traced back to infostealer malware logs. Several variants of infostealer malware were used, including VIDAR, RISEPRO, REDLINE, RACOON STEALER, LUMMA, and METASTEALER.

Possible Reasons for the Breach

Mandiant confirmed that there was no breach of Snowflake’s enterprise environment. They identified that most credentials used by the attackers originated from historical infostealer infections. The lack of MFA and failure to rotate credentials for up to four years were significant factors. Network allow lists were also not used to restrict access to trusted locations.

Unconfirmed Threat Actor Claims

The threat actor also claimed to have logged into Snowflake’s ServiceNow using the same credentials. This claim has neither been confirmed nor explicitly refuted by Snowflake. Other unknowns include whether similar methods compromised other Snowflake employees, and the definition of "sensitive" data used for determining the impact on demo accounts. The investigation is ongoing, but Snowflake stands by its initial findings.

Affected Customers from Snowflake Breach

The data breaches began in April 2024, and the company claimed it had impacted a “limited” number of Snowflake customers. Snowflake initially did not disclose the exact number or the names of all affected customers. However, a comprehensive report from Mandiant two weeks after the initial disclosure revealed that 165 customers were impacted in the Snowflake data breach. While some victims have been identified through attackers’ offers to sell stolen data, others were revealed via mandatory public disclosures. Most companies have yet to confirm the impact. Following is a list of all companies know to have been impacted in the Snowflake data breach:
  • Santander Group: The company confirmed a compromise without mentioning Snowflake.
  • Impact: Santander Bank staff and 30 million customers’ data has allegedly been breached.
  • TicketMaster (Live Nation Entertainment subsidiary): Confirmed via an SEC 8-K report, with Snowflake identified as the third party involved.
  • Impact: 560 Million TicketMaster user details and card info potentially at risk.
  • LendingTree: Notified by Snowflake about a potential data impact involving QuoteWizard.
  • Impact: On June 1, a hacker going by the name “Sp1d3r” posted on the cybercriminal platform BreachForums that they had stolen the sensitive information of over 190 million people from QuoteWizard. The alleged database included customer details, partial credit card numbers, insurance quotes and other information.
  • Advance Auto Parts: Unconfirmed by the company, but a dark web listing claimed significant data theft.
  • Impact: Same actor as LendingTree claimed leak of 380 million customers and 358,000 former and current employees.
  • Pure Storage: The Pure Storage data breach involved a third party temporarily gaining access to the workspace, which housed data such as company names, LDAP usernames, email addresses, and the Purity software release version number.
  • Impact: The same threat actor known as “Sp1d3r” claimed responsibility, alleging the theft of 3 terabytes of data from the company’s Snowflake cloud storage that was reportedly being sold for $1.5 million.
Tech Crunch discovered over 500 login credentials and web addresses for Snowflake environments on a website used by attackers to search for stolen credentials. These included corporate email addresses found in a recent data dump from various Telegram channels.

Security Measures and Customer Support

Snowflake Chief Information Security Officer Brad Jones reiterated the company's findings, asserting that the breaches were not due to any vulnerabilities, misconfigurations, or breaches of Snowflake’s platform or personnel credentials. Snowflake is collaborating with customers to enhance security measures and plans to mandate advanced security controls such as multi-factor authentication (MFA) and network policies, especially for privileged accounts. The company acknowledges the friction in their MFA enrollment process and is working to streamline it. The shared responsibility model places MFA enforcement on customers, but Snowflake aims to make it a standard prerequisite due to the high sensitivity of the data stored in their cloud environments.

Key Recommendations for Snowflake Customers:

  1. Enforce Multi-Factor Authentication: Make MFA mandatory for all accounts, particularly those with privileged access.
  2. Regularly Rotate Credentials: Ensure that all credentials are regularly updated to prevent long-term exposure from previous leaks.
  3. Implement Network Allow Lists: Restrict access to trusted IP addresses to minimize unauthorized access.
  4. Enhance Logging and Monitoring: Improve logging and monitoring capabilities to detect and respond to suspicious activities promptly.
Snowflake has also published indicators of compromise and steps for detecting and preventing unauthorized user access here. Cloud security firm Permiso has developed an open-source tool dubbed "YetiHunter" to detect and hunt for suspicious activity in Snowflake environments based on the IoCs shared by SnowflakeMandiantDataDog, and its own intelligence. Editor's Note: This blog will be updated as additional breach information from Snowflake and its customers becomes available or is claimed by threat actors on underground forums for sale. Links and data to any additional IoCs related to the Snowflake breach will be published here too.

How to Keep Your Pets Safe From Toxic Plants

While people don’t eat houseplants and rarely munch on shrubs or ground cover, your pets probably do. That's why you need to be really, really sure your pet won’t try to snack on your plants before installing a plant that might be toxic—and it turns out that a lot of plants are. 

Use apps to identify plants

Most people don’t know the name of every plant in their yard, but a plant ID app will help you close the loop. Snap a pic, and have the app identify it. Some of these apps will also tell you if plants are toxic to pets. If they don’t, you need to use a database to do a little digging. Rover has a new searchable database that will tell you if plants are toxic, and what symptoms to look for in a pet if ingested. Dogs and cats have different sensitivities, so what is toxic to dogs might be fine for cats and vice versa. 

Toxic vs. poisonous

Not all plants are toxic to pets; some are merely poisonous—and yes, there's a difference. Toxic plants can do harm in all kinds of ways—through surface contact or inhalation. Just being around them can be bad for your pet, even if they’re not likely to chew. Poisonous plants, on the other hand, have to be ingested to be dangerous, so they are mildly less problematic. That said, some plants are poisonous enough that they only need to be consumed once to have dire consequences, so you’d need to really trust that your pet is isolated from the plant or would never look at, for example, a hydrangea branch as a chew toy. Dan Teich, DVM, who runs District Veterinary Hospitals in Washington, DC, notes, "The good news is most plants will not cause permanent damage to your pet. Many are irritants, can cause excessive salivation, and upset stomach, but usually these signs will pass. This is common with philodendrons, poinsettias, pothos, and many common houseplants."

Avoid these common plants

Teich notes that the most common plant-related incidents they see involve a commonly gifted flower. "True lilies are the most dangerous of all plants for cats; even the pollen can be deadly. Lilies can lead to irreversible kidney failure in a cat within days. Calla lilies and peace lilies are not true lilies and may cause intestinal upset in your pet." He warns that if you suspect lily ingestion, you should seek immediate care for your cat.

Other plants present similar risks, according to Teich. Consuming large amounts of azalea leaves can lead to cardiac collapse, and even death. Ingesting sago palms—a popular outdoor and indoor plant—can be fatal, and any consumption by a pet should be treated as an emergency.

Foxglove, an easily spread outdoor flower, is also dangerous. Like lily of the valley and oleander, it can have a grave effect on your pet's heart.

If you are uncertain if a plant is dangerous to your pet, you may contact the ASPCA 24/7 Poison Control Hotline at 888-426-4435 or the Pet Poison Helpline at 855-764-7661.

Learn to recognize symptoms

The list of symptoms that pets can exhibit as a result of toxic exposure to plants is long and varied. There are extreme, easy-to-note symptoms like vomiting, diarrhea, trouble breathing, seizures, and excessive drooling. There are also symptoms that are harder to appreciate, like lack of appetite, lethargy, muscle tremors or uncoordinated movement, unusual bruising or bleeding and yellowing skin or eyes. Cats tend to exhibit more neurological symptoms, while dogs might experience more gastrointestinal symptoms. Since many of these symptoms can look like everyday living to a pet owner (pets routinely eat grass and vomit without there being any toxicity), it’s important to pay attention when the symptoms begin and take action if they continue. Your pet throwing up once might not be cause for alarm—continued vomiting is, regardless of the underlying reason.  If you're not sure or want advice, call either of the above hotlines. You'll pay a fee (which some pet insurance plans may cover), but as Teich points out, "compared to the potential consequences, it might be worth the investment."

Take action

While the cost of emergency veterinary care is daunting, you should not try to induce vomiting in your pet unless under consultation with your veterinarian—doing so can lead to esophageal problems. If you can identify the plant in question, or take a photo and/or sample of it with you to the vet, that will be helpful. Whether it should require emergency veterinary care versus waiting for your veterinarian to open is dependent on what was ingested, but the faster the care, the better.

When a pet with potential plant toxicity presents at the vet, Teich says the course of action depends on how fast the pet owner was able to act. "We first try to identify the plant to assess which treatment plan is best. If within an hour or two of ingestion, making the pet vomit up any remaining plant material is the first course of action. For certain plants, an activated charcoal slurry is then fed to the dog or cat, which absorbs remaining toxins in the stomach and intestines. Depending upon the plant and clinical signs noted, hospitalization in fluids with other supportive care may be necessary."

While not all plants are toxic enough to cause death, many can cause long-term effects, and that will carry with it costs for treatment, as well as pain for the animal. Your vet might have a community care program to help with emergency costs, and almost all animal treatment centers can help you obtain emergency credit specifically for care of your pet.

Prepare, just in case

If you want to be prepared ahead of the game, always have your vet’s information, as well as the name, location and number of your closest 24-hour veterinary emergency care location printed out somewhere easy to access, and on your phone. Having pet insurance in place can help soften the financial blow of events like this. Whether or not you have insurance, you may need to pay out of pocket before getting reimbursed, so having money set aside, or a credit card for this purpose, might be smart. When you view it all through this lens, spending a little time and money now to ensure you have pet-safe plants, or appropriate barriers to keep your pets away from toxic plants, makes a lot of financial sense.

Trump’s felony conviction may sap support among crucial voters, new poll shows – live

New Politico survey reveals 21% of independent voters are less likely to vote for Donald Trump in the 2024 election because of his felony conviction last month

Joe Biden spent the weekend fundraising with his former boss, Barack Obama, and the Hollywood stars who have increasingly lined up behind the Democratic president’s re-election effort. Here’s more, from the Associated Press:

Some of Hollywood’s brightest stars headlined a glitzy fundraiser for President Joe Biden, helping raise what his re-election campaign said was a record $30m-plus and hoping to energize would-be supporters for a November election that they argued was among the most important in the nation’s history.

Continue reading...

💾

© Photograph: Seth Wenig/AP

💾

© Photograph: Seth Wenig/AP

Paris loses spot as Europe’s largest equity market to London

Value of Euronext Paris stocks falls by about $258bn in week after Macron’s announcement of snap elections

Paris has lost its spot as Europe’s largest equity market to London, as investors reacted to political turmoil in France in the week since Emmanuel Macron called snap elections.

Stocks listed on Euronext Paris were collectively worth about $3.13tn after about $258bn was knocked off the market capitalisation of French companies last week, putting it behind the London Stock Exchange’s $3.18tn (£2.51tn), according to data compiled by Bloomberg. Separate data from Refinitiv, a subsidiary of the London Stock Exchange Group, also suggested the market value of UK-listed companies was bigger.

Continue reading...

💾

© Photograph: Éric Piermont/AFP/Getty Images

💾

© Photograph: Éric Piermont/AFP/Getty Images

Rory McIlroy faces huge challenge to overcome major US Open heartbreak | Ewan Murray

Painful near miss at Pinehurst after letting a two-shot lead late in the final round slip away could take a while to recover from

Amid the grumbling at Rory McIlroy’s sharp exit from the US Open, it is worth remembering that a picture can tell 1000 words. The scale of McIlroy’s devastation was so stark that it looked possible he could throw up all over the scoring area in which he was standing as Bryson DeChambeau holed out for victory at Pinehurst. Anyone who questions the extent to which McIlroy cares about his professional pursuits need only have looked at his face.

Even for those with a loose attachment to his career, the denouement to the 124th US Open was gut wrenching to watch. This was a loss so sore that McIlroy felt unable to detail his thoughts to the wider world. He should be given a pass there; not only is the Northern Irishman generous with his time to the media, it seems impossible he could have adequately articulated what heartbreak had transpired over the previous hour. McIlroy didn’t hang about, either, for the cheesy shaking of DeChambeau’s hand in front of cameras. This is a sportsman who had the ending of a painful, apparently interminable run within his grasp and cracked. No wonder McIlroy wanted off the property as quickly as possible. Golf’s pals act is contrived nonsense anyway. McIlroy could have offered platitudes to DeChambeau so everybody could say what a wonderful guy he is but this would bely raw emotion.

Continue reading...

💾

© Photograph: US Open

💾

© Photograph: US Open

Spanish drivers hired to deliver Amazon parcels in UK take legal action over pay

Exclusive: Some of the drivers say they were not paid in full and in some cases billed thousands for vehicle damage

A group of drivers hired in Spain and brought to the UK to deliver Amazon packages to British households in the run-up to Christmas are taking legal action against the company and one of its subcontractors.

The drivers claim the subcontractor promised them earnings of more than £100 a day, free housing, van rental, insurance and free return flights via an online meeting in Spanish.

Continue reading...

💾

© Photograph: supplied

💾

© Photograph: supplied

Can the USMNT prove they are among the world’s best at Copa América?

The US has a squad full of players from Europe’s top leagues. But Gregg Berhalter’s side have continually struggled against top competition

The theory always was that what the USMNT needed was for more of their players to be playing with the best in Europe. Good, tough, regular competition, proper professional training, exposure to best practice at the highest level the game has ever known. That was what would transform the raw material the US produces into a genuinely top-level side that might be able to compete regularly with the world’s elite. Practice is never that straightforward.

The friendly against Colombia earlier this month was the first time the US had been able to field a starting XI all of whom play in the top flight of the Big Five European leagues (there’s a quibble over whether France can really be included in that grouping or whether Portugal or the Netherlands is more worthy, but let’s go with it for now as a useful shorthand to denote high European level). Was this then to be the breakout, the moment at which the US finally became a major world power in the men’s game?

This is an extract from Soccer with Jonathan Wilson, a weekly look from the Guardian US at the game in Europe and beyond. Subscribe for free here. Have a question for Jonathan? Email soccerwithjw@theguardian.com, and he’ll answer the best in a future edition

Continue reading...

💾

© Composite: Getty

💾

© Composite: Getty

Tongan Olympic kitefoiler JJ Rice dies in diving accident at age of 18

  • US-born teenager was set for sport’s Olympic debut
  • Sister pays tribute to ‘the most amazing brother’

JJ Rice, who had been chosen to represent Tonga at the Paris Olympics, has died in a diving accident. He was 18.

Rice’s father, Darren, confirmed his son’s death on Monday to the Matangi Tonga newspaper.

Continue reading...

💾

© Photograph: Courtesy Rice Family

💾

© Photograph: Courtesy Rice Family

Tesco installs smoke machines in stores at high risk of break-ins

Devices used after opening hours at some London branches amid rise in shoplifting and attacks on staff

Tesco has installed smoke machines in some of its stores to stop people from stealing goods after night-time break-ins.

Britain’s biggest supermarket chain uses the 4ft-high security devices in some stores at high risk of burglary outside opening hours.

Continue reading...

💾

© Photograph: Tolga Akmen/AFP/Getty Images

💾

© Photograph: Tolga Akmen/AFP/Getty Images

Ubuntu 23.10 Reaches End of Life on July 11, 2024

Ubuntu 23.10, codenamed “Mantic Minotaur,” was released on October 12, 2023, nearly nine months ago. Since it is an interim release, its support period is now approaching with the end of life scheduled on July 11, 2024. After this date, Ubuntu 23.10 will no longer receive software and security updates from Canonical. As a result, […]

The post Ubuntu 23.10 Reaches End of Life on July 11, 2024 appeared first on TuxCare.

The post Ubuntu 23.10 Reaches End of Life on July 11, 2024 appeared first on Security Boulevard.

nm/sqrt(nm)

Nearly a year and a half ago, Joseph Newton did an excellent video about Cursed units. Now he's back with Cursed Units 2: Curseder Units! From fuel efficiency in square millimetres to the barrer, the definition of which has cm appear no less than four times, you're sure to encounter some weird (metric) units you'd not heard of. [2LYT]
❌