Connect with us

Innovation and Technology

NASA Closes Chief Scientist’s Office

Published

on

NASA Closes Chief Scientist’s Office

NASA Cuts and Job Losses, Gene Therapy Breakthroughs, and More: The Week in Science and Tech

NASA Closed Three Offices, Laying Off 23 Employees

NASA’s Chief Scientist, Katherine Calvin, was laid off this week, and the agency closed three offices, including the office of the Chief Scientist, which advised NASA leadership on science programs and strategic planning. This is a prelude to plans for a greater reduction in force to comply with President Trump’s executive orders. The agency has not yet announced how many people might be affected.

Gene Therapy Breakthrough: Bioengineered Blood Cells

Immusoft, a Seattle-based startup, is using bioengineered blood cells to deliver gene therapies. The company’s B cells can be programmed to produce specific proteins that treat diseases, eliminating the need for a "preconditioning regime" of drugs that can have harmful side effects. In a recent clinical trial, patients with a genetic disorder called mucopolysaccharidosis type I showed significant improvement in their condition without experiencing any side effects.

Quantum Supremacy: A New Milestone?

D-Wave, a quantum computing company, claims to have achieved "quantum supremacy" by solving a complex physics problem that would take a conventional computer hundreds of years to solve. However, two separate research groups published findings that used conventional computers to solve subsets of the same problem, suggesting that there may not be an advantage to using quantum computers.

NASA’s New Space Telescope

NASA launched its SPHEREx space telescope into Earth orbit, which will survey the sky at infrared wavelengths, enabling astronomers to collect data about the chemistries of asteroids, galaxies, and other astronomical objects. This includes information about oxygen, carbon dioxide, and other chemicals that could indicate the presence of life.

Other News and Trends

  • Graphitic Energy has developed a way to generate hydrogen that is clean and affordable, producing valuable graphite in the process.
  • Greenhouse gas emissions not only warm the Earth, but they are also shrinking the upper atmosphere, which could reduce the number of satellites that can safely operate in low Earth orbit by as much as 66%.
  • Recycling plastic can be made less expensive by taking advantage of the moisture in the air, new research shows.
  • Scientists at MIT successfully turned mice skin cells into neurons, without having to convert them into stem cells first, which could be used to scale treatment of neurodegenerative diseases or spinal cord injuries.

Pro Science Tip: Good Sleep Protects You from Conspiracy Theories

New research suggests that not getting enough sleep can make people more likely to believe in conspiracy theories. Researchers from the University of Nottingham found that those with recent poor sleep quality and insomnia were more likely to endorse new conspiracy theories.

Entertainment and More

  • Marvel has reunited the original cast of its Netflix series Daredevil and launched a new show, Daredevil: Born Again, on Disney+.
  • The federal government is making massive cuts to the National Weather Service, and companies might be forced to fill the gaps.
  • Cognixion, a startup, has developed a brain-computer interface that doesn’t require anything to be implanted in your head and is starting clinical trials with ALS patients.

Conclusion

This week’s news highlights significant developments in the fields of space exploration, gene therapy, and quantum computing. NASA’s plans for a greater reduction in force are a cause for concern, while Immusoft’s breakthrough in gene therapy shows promise for treating a range of diseases. The achievement of quantum supremacy by D-Wave is a milestone in the field of quantum computing, and NASA’s new space telescope is set to expand our understanding of the universe.

FAQs

  • What is the impact of NASA’s layoffs on the space agency’s research efforts?
  • How does Immusoft’s gene therapy approach differ from traditional methods?
  • What are the implications of D-Wave’s achievement of quantum supremacy for the field of quantum computing?
  • What is the purpose of NASA’s new space telescope, SPHEREx?
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Innovation and Technology

The Virtual Mentor: How Technology is Enabling More Effective Leadership Development and Coaching

Published

on

The Virtual Mentor: How Technology is Enabling More Effective Leadership Development and Coaching

In today’s fast-paced and ever-changing business landscape, effective leadership is more crucial than ever. As a result, organizations are seeking innovative ways to develop and coach their leaders to succeed. Enter virtual mentorship – a technology-enabled approach to leadership development that is revolutionizing the way we think about mentorship and coaching.

What is Virtual Mentorship?

Virtual mentorship is a form of mentorship that takes place online, where a mentor and mentee connect virtually to discuss goals, share experiences, and work together to achieve specific objectives. This approach has gained popularity due to its flexibility, accessibility, and ability to reach a wider audience. With virtual mentorship, individuals can access expert guidance and support from anywhere in the world, at any time. This is particularly beneficial for those who may not have access to traditional mentorship opportunities or face geographical barriers.

How is Virtual Mentorship Changing the Game?

Virtual mentorship is transforming the way we approach leadership development and coaching. Here are a few ways in which technology is enabling more effective virtual mentorship:

Accessibility

Virtual mentorship eliminates geographical barriers, making it possible for individuals to access mentorship opportunities from anywhere in the world. This is particularly beneficial for those who may not have access to traditional mentorship opportunities or face geographical constraints.

Flexibility

Virtual mentorship offers flexibility in terms of scheduling and communication. Mentors and mentees can communicate at a time that suits them best, making it easier to balance work and personal responsibilities.

Personalization

Virtual mentorship allows for personalized coaching and guidance. Mentors can tailor their approach to the individual’s needs, preferences, and learning style, ensuring a more effective and engaging experience.

Cost-Effective

Virtual mentorship can be more cost-effective than traditional mentorship. With virtual mentorship, organizations can reduce costs associated with travel, accommodation, and equipment, making it a more feasible option for companies with limited budgets.

Benefits of Virtual Mentorship

Virtual mentorship offers numerous benefits, including:

Improved Leadership Development

Virtual mentorship provides opportunities for individuals to develop their leadership skills, gain confidence, and build their professional network.

Increased Accessibility

Virtual mentorship ensures that everyone, regardless of geographical location, has access to mentorship opportunities, leveling the playing field and promoting greater diversity and inclusion.

Enhanced Collaboration

Virtual mentorship fosters collaboration and knowledge sharing, enabling mentors and mentees to learn from each other’s experiences and expertise.

Conclusion

Virtual mentorship is revolutionizing the way we approach leadership development and coaching. By leveraging technology, organizations can provide their leaders with the guidance, support, and resources they need to succeed. With its accessibility, flexibility, personalization, and cost-effectiveness, virtual mentorship is an invaluable tool for any organization looking to develop and retain top talent.

FAQs

What is the difference between virtual mentorship and traditional mentorship?

Virtual mentorship takes place online, whereas traditional mentorship occurs in person. Virtual mentorship offers greater flexibility, accessibility, and personalization, whereas traditional mentorship provides face-to-face interaction and socialization.

How does virtual mentorship work?

Virtual mentorship typically involves regular online meetings, phone calls, or video conferencing between a mentor and mentee. The mentor provides guidance, support, and feedback to help the mentee achieve their goals and develop their skills.

Is virtual mentorship suitable for everyone?

Virtual mentorship is suitable for anyone who is willing to learn and develop their skills. However, it may not be suitable for individuals who prefer face-to-face interaction or require a more structured approach to learning.

What are the benefits of virtual mentorship?

Virtual mentorship offers several benefits, including improved leadership development, increased accessibility, and enhanced collaboration. It also provides a more personalized and cost-effective approach to mentorship.

Continue Reading

Innovation and Technology

iOS 18.3.2 Deadline—You Have 19 Days To Update Your iPhone

Published

on

iOS 18.3.2 Deadline—You Have 19 Days To Update Your iPhone

The U.S. Cybersecurity and Infrastructure Security Agency has added the issue patched in iOS 18.3.2 to its known exploited vulnerabilities (KEV) catalog. The agency has given a deadline of Apr. 3 for iPhone users to comply.

iOS 18.3.2: A Critical Update to Protect Your iPhone

Apple’s iOS 18.3.2 has arrived, including an emergency patch for an iPhone vulnerability already being exploited in real-life attacks. Following the release of iOS 18.3.2, experts weighed in to highlight the importance of updating your iPhone immediately.

CISA’s Warning: Update Your iPhone by Apr. 3

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued its own warning, after adding the flaw patched in iOS 18.3.2 to its known exploited vulnerabilities (KEV) catalog. The agency has given a deadline of Apr. 3 for iPhone users to comply.

The Flaw: An Out-of-Bounds Write Vulnerability in WebKit

The CISA alert covers an out-of-bounds write vulnerability in WebKit, the engine that underpins the Safari browser, which is tracked as CVE-2025-24201.

The Impact: Multiple Apple Products and Third-Party Browsers

The flaw fixed in iOS 18.3.2 is present in multiple Apple products. "Apple iOS, iPadOS, macOS, and other Apple products contain an out-of-bounds write vulnerability in WebKit that may allow maliciously crafted web content to break out of Web Content sandbox," CISA said.

Why You Should Heed CISA’s iOS 18.3.2 Warning

In case you don’t know already, CISA assigns due dates for patching vulnerabilities listed in its KEV catalog, and these vary depending on the specific flaw. CISA assigns due dates for federal agencies to remediate these vulnerabilities and these should also be used as a benchmark for patching by other organizations.

Conclusion

In conclusion, the U.S. Cybersecurity and Infrastructure Security Agency has added the issue patched in iOS 18.3.2 to its known exploited vulnerabilities (KEV) catalog, and has given a deadline of Apr. 3 for iPhone users to comply. It is essential to update your iPhone to iOS 18.3.2 as soon as possible to protect yourself from potential attacks.

Frequently Asked Questions

  1. What is the issue patched in iOS 18.3.2?
    The issue is an out-of-bounds write vulnerability in WebKit, which is tracked as CVE-2025-24201.
  2. How long do I have to update my iPhone?
    The deadline is Apr. 3.
  3. What other products are affected by this issue?
    The issue affects multiple Apple products, including iOS, iPadOS, macOS, and other products that use WebKit.
  4. What does CISA recommend?
    CISA recommends applying mitigations per vendor instructions, following applicable BOD 22-01 guidance for cloud services, or discontinuing use of the product if mitigations are unavailable.
Continue Reading

Innovation and Technology

Ransomware Group Create Automated VPN and Firewall Brute Force Attack Tool

Published

on

Ransomware Group Create Automated VPN and Firewall Brute Force Attack Tool

Recently leaked chat logs from the Black Basta ransomware group have revealed many things, including that passwords and stolen 2FA codes are driving many attacks. That’s not exactly a shocking revelation, it has to be said. Nor, for that matter, that these stolen credentials were used in brute force credential-stuffing attacks against enterprise targets.

Newly Published Research Confirms Brute Forcing Framework

New research by Arda Büyükkaya, a cyber threat intelligence analyst at EclecticIQ, has now confirmed “a previously unknown brute forcing framework” that has been used by the Black Basta gang to automate the process of gaining access to enterprise VPNs and firewalls. The tool, called Bruted, is designed to automate the process of gaining access to enterprise VPNs and firewalls by scanning for valid hostnames and IP addresses, and then using locally generated guesses to perform bulk authentication attempts.

How Ransomware Actors Employ the Bruted Brute Force Tool

The Bruted script is written in PHP and applies specialized brute-force logic for every individual attack platform, using tailored user-agent strings, endpoint paths, and success checks. The tool works by automating subdomain enumeration and IP resolution for any given domain to scan for potentially valid hostnames and IP addresses. It reports any discovered hosts back to a remote command-and-control endpoint, and then collates likely passwords from a remote server and combines them with locally generated guesses to perform bulk authentication attempts.

Targeted Vendors and Technologies

The tool is configured to attack a range of known targets, including SonicWall NetExtender, Palo Alto GlobalProtect, Cisco AnyConnect, Fortinet SSL VPN, Citrix NetScaler (Citrix Gateway), Microsoft RDWeb, and WatchGuard SSL VPN.

Mitigation Strategies

To mitigate these ransomware attacks, Büyükkaya recommended ensuring all devices are fully patched and up to date, password and login policies are strengthened, and unnecessary services and features are disabled.

Conclusion

The rise of automated brute force attacks against enterprise VPNs and firewalls is a growing concern for organizations looking to protect themselves against ransomware attacks. The Bruted tool is a sophisticated solution that enables attackers to gain initial access to target networks and then deploy ransomware. It is essential for organizations to stay vigilant and implement robust security measures to prevent these attacks.

Frequently Asked Questions

Q: What is the Bruted tool?
A: The Bruted tool is a PHP-based brute forcing framework used by the Black Basta ransomware group to automate the process of gaining access to enterprise VPNs and firewalls.

Q: What is the purpose of the Bruted tool?
A: The purpose of the Bruted tool is to automate the process of gaining access to enterprise VPNs and firewalls by scanning for valid hostnames and IP addresses, and then using locally generated guesses to perform bulk authentication attempts.

Q: What are the targeted vendors and technologies?
A: The targeted vendors and technologies include SonicWall NetExtender, Palo Alto GlobalProtect, Cisco AnyConnect, Fortinet SSL VPN, Citrix NetScaler (Citrix Gateway), Microsoft RDWeb, and WatchGuard SSL VPN.

Continue Reading
Advertisement

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending