Martian Meteorites Offer Clues to Red Planet’s Volcanic History

Of the over 74,000 known meteorites, only around 385 originate from Mars. Scientists have long been able to identify these Martian meteorites due to their unique composition and the presence of specific minerals. One such mineral is oxygen, which has a distinct isotopic signature on Mars. These meteorites provide valuable insights into Mars’ geological history, … Read more

Underground Water Reservoir Discovered on Mars

Data from NASA’s InSight lander has revealed evidence of an underground reservoir of water deep beneath the surface of Mars, according to new research. The study found that there may be enough water trapped in tiny cracks and pores of rock in the Martian crust to fill oceans on the planet’s surface. The data came … Read more

Qilin Ransomware Steals Chrome Credentials, Raises Concerns for Defenders

The Qilin ransomware group has been observed deploying a custom credential stealer to pilfer account credentials stored in Google Chrome browsers. This new tactic marks an alarming shift on the ransomware scene, as reported by Sophos X-Ops researchers. The attack began with Qilin gaining access to a network using compromised VPN credentials without multi-factor authentication … Read more

Curiosity Rover Discovers Pure Sulfur Rocks on Mars

NASA’s Curiosity rover has made a groundbreaking discovery on Mars, finding rocks made of pure sulfur in the Red Planet’s Gediz Vallis channel. The finding is a first for the Martian surface and provides new insights into the planet’s geological history. The rover discovered the yellow sulfur crystals on May 30 after driving over a … Read more

Hackers Steal Banking Creds from iOS, Android Users via PWA Apps

Hackers are using progressive web applications (PWAs) to impersonate banking apps and steal credentials from Android and iOS users. PWAs are cross-platform applications that can be installed directly from the browser, offering a native-like experience through features like push notifications, access to device hardware, and background data syncing. Threat actors use this technique in phishing … Read more