July 2024
USDA Welcomes 2024 Class of E. Kika De La Garza Fellows
WASHINGTON, July 8, 2024 – The U.S. Department of Agriculture (USDA) today welcomed 32 faculty and staff from Hispanic-Serving Institutions and Hispanic-Serving School Districts around the nation to the 2024 class of E. Kika De La Garza (EKDLG) Fellows.
Stephen Curry wants to be a Warrior for life, but knows ‘things change quickly’
As the Western Conference continues to get better, it threatens to put the Warriors further from contention. Would Curry stick around for that?
Man suspected of assault at La Jolla hotel dies after driving into bay
Yahoo Sports AM: Meet the 2024 MLB All-Stars
In today’s edition: 2024 MLB All-Stars, Euro and Copa América semifinals are set, Hamilton wins at Silverstone, Baker’s Dozen, and more.
CISA and Partners join ASD’S ACSC to Release Advisory on PRC State-Sponsored Group, APT 40
CISA has collaborated with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) to release an advisory, People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action outlining a PRC state-sponsored cyber group’s activity. The following organizations also collaborated with ASD’s ACSC on the guidance:
- The National Security Agency (NSA);
- The Federal Bureau of Investigation (FBI);
- The United Kingdom’s National Cyber Security Centre (NCSC-UK);
- The Canadian Centre for Cyber Security (CCCS);
- The New Zealand National Cyber Security Centre (NCSC-NZ);
- The German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV);
- The Republic of Korea’s National Intelligence Service (NIS) and NIS’ National Cyber Security Center (NCSC); and
- Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Policy Agency (NPA).
The advisory is based on current ACSC-led incident response investigations and shared understanding of a PRC state-sponsored cyber group, APT40—also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk in industry reporting.
APT 40 has previously targeted organizations in various countries, including Australia and the United States. Notably, APT 40 possesses the ability to quickly transform and adapt vulnerability proofs of concept (POCs) for targeting, reconnaissance, and exploitation operations. APT 40 identifies new exploits within widely used public software such as Log4J, Atlassian Confluence and Microsoft Exchange to target the infrastructure of the associated vulnerability.
CISA urges all organizations and software manufacturers to review the advisory to help identify, prevent, and remediate APT 40 intrusions. Software vendors are also urged to incorporate Secure by Design principles into their practices to limit the impact of threat actor techniques and to strengthen the security posture of their products for their customers.
For more information on PRC state-sponsored threat actor activity, see CISA’s People’s Republic of China Cyber Threat. To learn more about secure by design principles and practices, visit CISA’s Secure by Design webpage.
Continued Progress Towards a Secure Open Source Ecosystem
This App Will Create Unique Daily Walking Loops for You
It doesn’t matter whether you’re visiting a new city or at home—sometimes you just want to take a walk, but you don’t know where to go. A new, free iPhone app called Strolly is the perfect solution. Open the app and it will create three walking routes, usually a loop, near your current location: one short, one long, and one in between. You can flip between the routes and choose the one you like.
That’s it—there are no turn-by-turn directions, and you only get three suggestions every day. The app aims to include local points of interest and to not go over the same road twice. The loops are created entirely on the device, meaning there’s no data about your current location being sent to a server somewhere.
There are also no ads, aside from a small button in the settings you can use to send a the developers a tip if you like. There may be advanced paid features later, according to their announcement post, but for now it’s one of those simple apps built for a specific person by only a couple of people (Natalia Panferova and Matthaus Woolard).
How Strolly works
Credit: Justin Pot
Once you do, you will see a few different options. I tried the app out in a few different locations, and typically it would serve me up one walk around 15 minutes, one walk around 30 minutes, and another around an hour, with some variation. If you know you’re not likely to want to take very long walks, you can adjust your settings so you will be given any combination of long, medium, and short walks.
Credit: Justin Pot
You can switch between the different randomly generated walks by flipping through the cards in the bottom-left corner. You can also tap and hold the cards to either pin a walk—saving it for later—or to wipe out the current walks and generate more. There’s also a feature that allows you to mark areas that aren’t actually great for walking, which will train the application not to include such areas going forward, though again, the information itself remains local to your device and is not uploaded to a server.
Overall, Strolly is a very simple app, but that’s the point. Give it a shot next time you want to take a walk and don’t know exactly where to go.