Stay informed with our weekly roundup of top 10 key happenings in tech, cyber and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.
Thai Monks Scammed in Billion-Baht Fraud: Over Rs 230 Crore Vanishes in Shocking Pyramid Scheme
Thailands National Office of Buddhism (NOB) is investigating the Ban Share Nong Carrot pyramid scheme, which defrauded monks and villagers out of over 1 billion baht (INR 230 crore). The scheme lured participants with promises of profit, only to halt withdrawals and demand more funds after claiming losses. The NOB and police are now under pressure to ensure justice for the victims.
Read moreThe Dark Side of Holiday Discounts—How 86 Million Fake Items Flooded the EU Market
Europol and the EUIPO report highlights the growing threat of intellectual property (IP) crime in Europe, with counterfeit goods worth €2 billion seized in 2022. Fake items, produced mainly in China, Hong Kong, and Turkiye, harm consumers health, fuel cybercrime, and damage the environment. The report urges consumer caution to avoid counterfeit products and reduce criminal networks influence.
Read moreCERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
CERT-UA has identified a new email-based cyberattack campaign targeting Ukrainian government, military, and businesses. Using malicious Remote Desktop Protocol (.rdp) files, the emails grant attackers remote access, enabling data theft and malware installation. The threat actors, APT29 and APT28, linked to Russia, also employ phishing schemes and PowerShell scripts for data exfiltration and network compromise.
Read moreLazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices
The Lazarus Group, a North Korean threat actor, exploited a zero-day vulnerability (CVE-2024-4947) in Google Chrome to target cryptocurrency professionals via a fake game website. The attack uses social engineering and a malicious DeTankZone game download to install the Manuscrypt backdoor. Lazarus tactics, including generative AI use, suggest a highly adaptive approach to financial cybercrime.
Read moreIntels Core Ultra 9 285K CPU is one step forward, one step back for PC gaming
Intels Core Ultra 9 285K CPU offers improved efficiency, running cooler with lower power consumption than the Core i9-14900K. It includes an NPU for AI tasks and uses the new LGA 1851 socket, boosting multithreaded performance in productivity. However, its gaming performance lags behind, especially against AMDs Ryzen 7800X3D, with Intels platform also limiting future upgrades. For gaming, AMD remains the better choice.
Read moreAndroid 16 could get iPhone-like ongoing notifications
Android 16 might introduce Rich Ongoing Notifications, allowing developers to keep persistent notifications in the Android status bar. As discovered by Mishaal Rahman in Android 15 beta code, this feature enables adding a pill-shaped icon with custom text and color, ideal for showing real-time updates, like Uber arrival times. This resembles iOSs Live Activities, which shows updates like scores or timers in Dynamic Island on iPhone 14 Pro models.
Read moreDrone swarms interest surges amid Russia-Ukraine war
The development of AI-powered drone swarms has rapidly advanced, especially during Russias invasion of Ukraine. Innovations now enable drones to operate autonomously, sharing target data and making decisions independently. Companies like Thales and startups are leading this growth, applying drone technology in defense and telecom sectors for various applications, including network optimization and last-mile delivery.
Read moreNearly 80% of US motorists want AI voice assistants
Motorists are increasingly adopting AI voice assistants, with 76% expressing interest in using them while driving, according to a SoundHound survey. Interest in advanced features rose by 52% year-over-year, especially among younger drivers. Notably, 81% of potential vehicle buyers prioritize AI features, while 74% are willing to pay for them. Use cases include food ordering and vehicle management.
Read moreThe Egypt-Eritrea-Somalia Alliance: A Strategic Counterbalance to Ethiopia
On October 10, 2024, Egypt, Eritrea, and Somalia formed a regional alliance aimed at countering Ethiopias influence in the Horn of Africa. This trilateral summit signifies a shift in Eastern Africas geopolitics, particularly regarding Ethiopias naval expansion and the Grand Ethiopian Renaissance Dams impact on Egyptian water security. The alliance includes a joint committee to enhance military and diplomatic cooperation, addressing key regional concerns.
Read moreThe Benin Model: Chinas Africa Strategy in Action
In late August, Benin accepted a military donation from China, primarily artillery, amid struggles against Islamic extremism. This reflects Chinas broader strategy in Africa, combining economic investments with military support to bolster influence. Through initiatives like the Belt and Road Initiative, China integrates into African political and economic frameworks. This growing dependency poses geopolitical risks for Benin, necessitating diversified international partnerships.
Read moreWant to write a blog?
Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!