Costa Rica has declared a state of emergency after ransomware hackers crippled computer networks across multiple government agencies, including the Finance Ministry.
The official declaration, published on a government website Wednesday, said that the attack was “unprecedented in the country” and that it interrupted the country’s tax collection and exposed citizens’ personal information.
The hackers initially broke into the Finance Ministry on April 12, it said. They were able to spread to other agencies, including the Ministry of Science, Technology and Telecommunications and the National Meteorological Institute.
Alex Pourbaix, the CEO of Cenovus, Canada’s second-largest oil and gas company, spoke up in a call with industry analysts where he criticized the plan and the money being offered to the industry. He called for a much large commitment from governments if the industry were to build large-scale CCUS. Pourbaix suggested that there were examples from other countries where the industry was being given up to 70% of the capital costs on new CCUS projects and was receiving additional money to offset operating costs.
While Pourbaix was complaining about the lack of money to build CCUS projects, he also announced to analysts that Cenovus had earned a seven-fold jump in its quarterly profits, and was tripling dividend payments to shareholders. This wasn’t mentioned in Jones’ article but did appear in the same edition of the paper, two pages later, tucked away well below the fold. It reported Cenovus had announced per-share dividends rising from $0.14 US to $0.42, with earnings exceeding analyst estimates at $0.79 per share. In the same report, Cenovus announced production output of synthetic crude from oil sands operations growing from over 769 to almost 800,000 barrels a day. There was no mention of GHG emissions contributions. And when I went to look at the company’s annual and quarterly reports, there was no reporting on GHG emissions or even intensity per barrel or per cubic metre related to production although there was a pledge to sustainability and best ESG practices. A 2020 Bloomsberg report states that GHG emissions at Cenovus continue to rise.
Cenovus is one of the founding members of the Clean Resource Innovation Network (CRIN). Its mission is to keep Canadian oil and natural gas companies competitive in world markets. Other members are fossil fuel companies, think tanks, academics, and government departments. CRIN acknowledges a low-carbon future but seems to lack a roadmap to get there. As I perused the website there was little information on strategies for carbon emission reductions. There was content related to intensity per unit of production as well as discussion about cleaner fuel standards. But I found nothing about CCUS.
Making the future of medicine possible by rethinking how medicines are made — olivia zetter, head of government affairs & AI strategy, resilience.
Olivia Zetter is Head of Government Affairs and AI Strategy at National Resilience, Inc. (https://resilience.com/) a first-of-its-kind manufacturing and technology company dedicated to broadening access to complex medicines and protecting bio-pharmaceutical supply chains against disruption.
Founded in 2020, National Resilience, Inc. is building a sustainable network of high-tech, end-to-end manufacturing solutions to ensure the medicines of today, and tomorrow, can be made quickly, safely, and at scale.
Olivia brings extensive experience in national security spanning diplomacy, defense, and development, along with emerging technology issues. Olivia has held multiple positions in government, most recently as a Director of Research and Analysis at the National Security Commission on Artificial Intelligence, an independent federal commission established by Congress to examine the impact of artificial intelligence on national security and defense.
Olivia previously served at the Department of State as a Foreign Affairs Officer in the Office of the Coordinator for Cyber Issues, where her work spanned a diverse range of cyber policy areas. She also served as the Special Advisor on Trans-Regional Issues to the Special Presidential Envoy for the Global Coalition to Counter ISIS, where she coordinated efforts to counter the terrorist organization’s financing, foreign terrorist fighter flows, and external operations.
Joe Biden has been accused of having “no idea” after he misunderstood a journalist’s question about the public health authority ‘Title 42’ and instead begun speaking about a Department of Justice appeal of airplane mask mandates.
“Britain moves closer to a self-driving revolution,” said a perky message from the Department for Transport that popped into my inbox on Wednesday morning. The purpose of the message was to let us know that the government is changing the Highway Code to “ensure the first self-driving vehicles are introduced safely on UK roads” and to “clarify drivers’ responsibilities in self-driving vehicles, including when a driver must be ready to take back control”.
The changes will specify that while travelling in self-driving mode, motorists must be ready to resume control in a timely way if they are prompted to, such as when they approach motorway exits. They also signal a puzzling change to current regulations, allowing drivers “to view content that is not related to driving on built-in display screens while the self-driving vehicle is in control”. So you could watch Gardeners’ World on iPlayer, but not YouTube videos of F1 races? Reassuringly, though, it will still be illegal to use mobile phones in self-driving mode, “given the greater risk they pose in distracting drivers as shown in research”.
NASA has pickedSpaceX, Amazon and four other American companies to develop the next generation of near-Earth space communication services meant to support its future missions. The agency started looking for partners under the Communication Services Project (CSP) in mid-2021, explaining that the use of commercially provided SATCOM will reduce costs and allow it to focus its efforts on deep space exploration and science missions.
“Adopting commercial SATCOM capabilities will empower missions to leverage private sector investment that far exceeds what government can do,” NASA wrote in the official project page. By using technology developed by commercial companies, the agency will have continued access to any innovation they incorporate into the system. At the moment, NASA relies on its Tracking and Data Relay Satellite (TDRS) system for near-Earth space communications. Many of its satellites were launched in the 80’s and 90’s, though, and it’s set to be decommissioned in the coming years.
The funded agreements under NASA’s Communication Services Project has a combined value of $278.5 million, with SpaceX getting the highest cut. NASA expects the companies to match and exceed its contribution during the five-year development period. SpaceX, which proposed a “commercial optical low-Earth orbiting relay network for high-rate SATCOM services,” has been awarded $69.95 million. Amazon’s Project Kuiper is getting the second-highest cut and has been awarded $67 million, while Viasat Incorporated has been awarded $53.3 million. The other three awardees are Telesat US Services ($30.65 million), SES Government Solutions ($28.96 million) and Inmarsat Government Inc. ($28.6 million).
The US government has detailed how North Korean state-sponsored attackers have been hacking cryptocurrency firms using phishing, malware and exploits to steal funds and initiate fraudulent blockchain transactions.
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) have issued a joint cybersecurity advisory to warn all businesses in cryptocurrency to watch out for attacks from North Korean state-sponsored hackers.
The Force was strong in him. One of Enzo Romero’s favorite activities is playing the guitar, which he effortlessly does with his bright blue hand. Initially, it used to hurt, as he used his handless right arm to press down on chords. But now, with fingers on the end, he can play music painlessly.
Though controversial upon release, the film has proved to be the most popular film in the series among fans and critics and is now widely regarded as one of the best sequel films of all time, as well as one of the greatest films of all time. It was re-released with changes in 1997 and on DVD in 2004. The film was re-released on Blu-ray format in September of 2011. A radio adaptation was broadcast on National Public Radio in the U.S.A. in 1983. The film was selected in 2010 to be preserved by the Library of Congress as part of its National Film Registry.
“This is the most expansive industrial control system attack tool that anyone has ever documented,” says Sergio Caltagirone, the vice president of threat intelligence at industrial-focused cybersecurity firm Dragos, which contributed research to the advisory and published its own report about the malware. Researchers at Mandiant, Palo Alto Networks, Microsoft, and Schneider Electric also contributed to the advisory. “It’s like a Swiss Army knife with a huge number of pieces to it.”
Dragos says the malware has the ability to hijack target devices, disrupt or prevent operators from accessing them, permanently brick them, or even use them as a foothold to give hackers access to other parts of an industrial control system network. He notes that while the toolkit, which Dragos calls “Pipedream,” appears to specifically target Schneider Electric and OMRON PLCs, it does so by exploiting underlying software in those PLCs known as Codesys, which is used far more broadly across hundreds of other types of PLCs. This means that the malware could easily be adapted to work in almost any industrial environment. “This toolset is so big that it’s basically a free-for-all,” Caltagirone says. “There’s enough in here for everyone to worry about.”
The CISA advisory refers to an unnamed “APT actor” that developed the malware toolkit, using the common acronym APT to mean advanced persistent threat, a term for state-sponsored hacker groups. It’s far from clear where the government agencies found the malware, or which country’s hackers created it—though the timing of the advisory follows warnings from the Biden administration about the Russian government making preparatory moves to carry out disruptive cyberattacks in the midst of its invasion of Ukraine.