Weekly Unfoldings: October 21-26, 2024

5 min read
Weekly Unfoldings: October 21-26, 2024

Stay informed with our weekly roundup of top 10 key happenings in tech, cyber and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.

💡
The links provided in this content direct to third-party websites. We do not control or endorse the content on these external sites, and therefore cannot guarantee the accuracy, completeness, or reliability of the information they provide. We are not affiliated with these sites, and any opinions or claims made on them are solely those of the respective site owners. Users are encouraged to verify the information independently before relying on it.
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Thai Monks Scammed in Billion-Baht Fraud: Over Rs 230 Crore Vanishes in Shocking Pyramid Scheme

Thailands National Office of Buddhism (NOB) is investigating the Ban Share Nong Carrot pyramid scheme, which defrauded monks and villagers out of over 1 billion baht (INR 230 crore). The scheme lured participants with promises of profit, only to halt withdrawals and demand more funds after claiming losses. The NOB and police are now under pressure to ensure justice for the victims.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
The Dark Side of Holiday Discounts—How 86 Million Fake Items Flooded the EU Market

Europol and the EUIPO report highlights the growing threat of intellectual property (IP) crime in Europe, with counterfeit goods worth €2 billion seized in 2022. Fake items, produced mainly in China, Hong Kong, and Turkiye, harm consumers health, fuel cybercrime, and damage the environment. The report urges consumer caution to avoid counterfeit products and reduce criminal networks influence.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities

CERT-UA has identified a new email-based cyberattack campaign targeting Ukrainian government, military, and businesses. Using malicious Remote Desktop Protocol (.rdp) files, the emails grant attackers remote access, enabling data theft and malware installation. The threat actors, APT29 and APT28, linked to Russia, also employ phishing schemes and PowerShell scripts for data exfiltration and network compromise.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

The Lazarus Group, a North Korean threat actor, exploited a zero-day vulnerability (CVE-2024-4947) in Google Chrome to target cryptocurrency professionals via a fake game website. The attack uses social engineering and a malicious DeTankZone game download to install the Manuscrypt backdoor. Lazarus tactics, including generative AI use, suggest a highly adaptive approach to financial cybercrime.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Intels Core Ultra 9 285K CPU is one step forward, one step back for PC gaming

Intels Core Ultra 9 285K CPU offers improved efficiency, running cooler with lower power consumption than the Core i9-14900K. It includes an NPU for AI tasks and uses the new LGA 1851 socket, boosting multithreaded performance in productivity. However, its gaming performance lags behind, especially against AMDs Ryzen 7800X3D, with Intels platform also limiting future upgrades. For gaming, AMD remains the better choice.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Android 16 could get iPhone-like ongoing notifications

Android 16 might introduce Rich Ongoing Notifications, allowing developers to keep persistent notifications in the Android status bar. As discovered by Mishaal Rahman in Android 15 beta code, this feature enables adding a pill-shaped icon with custom text and color, ideal for showing real-time updates, like Uber arrival times. This resembles iOSs Live Activities, which shows updates like scores or timers in Dynamic Island on iPhone 14 Pro models.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
Drone swarms interest surges amid Russia-Ukraine war

The development of AI-powered drone swarms has rapidly advanced, especially during Russias invasion of Ukraine. Innovations now enable drones to operate autonomously, sharing target data and making decisions independently. Companies like Thales and startups are leading this growth, applying drone technology in defense and telecom sectors for various applications, including network optimization and last-mile delivery.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
Nearly 80% of US motorists want AI voice assistants

Motorists are increasingly adopting AI voice assistants, with 76% expressing interest in using them while driving, according to a SoundHound survey. Interest in advanced features rose by 52% year-over-year, especially among younger drivers. Notably, 81% of potential vehicle buyers prioritize AI features, while 74% are willing to pay for them. Use cases include food ordering and vehicle management.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
The Egypt-Eritrea-Somalia Alliance: A Strategic Counterbalance to Ethiopia

On October 10, 2024, Egypt, Eritrea, and Somalia formed a regional alliance aimed at countering Ethiopias influence in the Horn of Africa. This trilateral summit signifies a shift in Eastern Africas geopolitics, particularly regarding Ethiopias naval expansion and the Grand Ethiopian Renaissance Dams impact on Egyptian water security. The alliance includes a joint committee to enhance military and diplomatic cooperation, addressing key regional concerns.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
The Benin Model: Chinas Africa Strategy in Action

In late August, Benin accepted a military donation from China, primarily artillery, amid struggles against Islamic extremism. This reflects Chinas broader strategy in Africa, combining economic investments with military support to bolster influence. Through initiatives like the Belt and Road Initiative, China integrates into African political and economic frameworks. This growing dependency poses geopolitical risks for Benin, necessitating diversified international partnerships.

Read more

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2024 CYUN. All rights reserved.