Weekly Unfoldings: March 10-15, 2024

5 min read
Weekly Unfoldings: March 10-15, 2024

Stay informed with our weekly roundup of top 10 key happenings in tech, cyber and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.

💡
The links provided in this content direct to third-party websites. We do not control or endorse the content on these external sites, and therefore cannot guarantee the accuracy, completeness, or reliability of the information they provide. We are not affiliated with these sites, and any opinions or claims made on them are solely those of the respective site owners. Users are encouraged to verify the information independently before relying on it.
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Cyber Expert Hired for Probe Caught Looting Rs 41 Lakh in Cryptocurrency During Raid

Cyber expert Devendra Patel, assisting in a call centre fraud investigation, was caught stealing Rs 41 lakh in cryptocurrency during a police raid. He falsely claimed no evidence was found but later transferred funds to his account. Arrested and remanded to custody, Patel faces multiple fraud charges.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Cyber Attack at Raymond: IT Teams, Authorities Probe Massive Breach

Raymond Limited confirmed a cyberattack on its IT infrastructure on February 19. The company isolated affected systems, ensuring no disruption to retail or store operations. While no ransomware involvement is confirmed, forensic analysis is underway. India CERT-In has been notified, and Raymond assured compliance with cybersecurity regulations.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks

Blind Eagle, an APT group, has targeted Colombian institutions using NTLM flaws, RATs, and GitHub-based attacks. Exploiting CVE-2024-43451, they trick victims via phishing emails, using Remcos RAT and HeartCrypt. A GitHub error exposed 1,634 credentials, revealing the threat actor UTC-5 timezone, indicating South American origins.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

GreyNoise warns of a massive SSRF vulnerability exploitation surge by over 400 IPs targeting multiple platforms worldwide. Affected systems include VMware, GitLab, Zimbra, and Ivanti. Attack patterns suggest structured automation, posing risks to cloud services. Users are urged to apply patches and monitor suspicious network requests.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Android Find My Device App Can Now Show You Where People Are, Too

Google Find My Device app now includes location-sharing for friends and family, integrating Google Maps data. Users can see contacts on a map, manage sharing duration, and switch between people and devices. The update, mirroring Apple Find My, enhances tracking capabilities on Android.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
WinRing0: Why Windows is Flagging Your PC Monitoring and Fan Control Apps as a Threat

Windows Defender is flagging WinRing0, a kernel-level driver used in PC monitoring apps, as a security risk. This has disrupted popular tools like Fan Control, MSI Afterburner, and OpenRGB. Developers argue that Microsoft driver signing costs hinder fixes, leaving users to choose between security and functionality. Some companies, like iBuyPower, are working on solutions.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
Golf Bag of Robots Will Tackle Hazardous Environments

UK researchers have developed robotic solutions for handling hazardous CBRN environments, securing £2M in funding. Innovations include AI-driven sample collection, contamination-testing drones, and autonomous decontamination systems. These technologies aim to remove humans from dangerous tasks, supporting UK defense and environmental remediation. The project also advances robotics research while preserving over 100 specialized jobs.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
Gemini Robotics: Google DeepMind Aims for Helpful AI Robots

Google DeepMind Gemini Robotics integrates AI with robotics to enable real-world tasks. Built on Gemini 2.0, it enhances adaptability, interactivity, and dexterity. It can control robots, perform complex actions, and generalize across environments. Collaborations with Apptronik and others expand its applications. Safety remains a priority, with advanced reasoning ensuring secure operations in dynamic settings.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Is It Time for a European SACEUR in NATO?

NATO leadership faces uncertainty as President Trump signals a shift in U.S. defense commitments. With Gen. Christopher Cavoli term ending, debates arise over a European Supreme Allied Commander. Historical parallels, Kissinger 1984 proposal, and European military responses suggest a potential power transition, but challenges remain in maintaining deterrence against Russia.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Kra Canal: The Impossible Dream of Southeast Asia Shipping

The Kra Canal, a long-debated alternative to the Malacca Strait, faces renewed geopolitical and economic scrutiny. While China sees it as a key Belt and Road Initiative project, Thailand prioritizes a $28 billion land bridge. Concerns over security, sovereignty, and environmental impact keep the project in limbo as regional tensions persist.

Read more

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2025 CYUN. All rights reserved.