Saturday☕️

Saturday☕️

Trending:

  • CENTCOM Activity
  • Cylance Cyberattack

Markets:

  • Yesterday’s U.S. stock market:
TradingView
  • Today’s commodity market:
TradingView @12:26 AM EST
  • Today’s crypto market:
TradingView @12:26 AM EST

CENTCOM Activity:

  • In the past 24 hours, U.S. Central Command (CENTCOM) forces successfully destroyed two Houthi uncrewed surface vessels (USVs) and one uncrewed aerial system (UAS) in the Red Sea. These unmanned vessels and aerial systems, launched from Houthi-controlled areas in Yemen, posed a significant threat to U.S., coalition forces, and merchant vessels. Additionally, CENTCOM forces destroyed seven Houthi radars in Yemen, which were used to target maritime vessels and jeopardized commercial shipping. These actions were taken to ensure the safety and security of international waters and protect freedom of navigation.
  • On June 12, the Houthis attacked the M/V Tutor, a Liberian-flagged, Greek-owned bulk cargo carrier, causing severe flooding and damage. One crew member remains missing following the attack. The crew abandoned the ship and was rescued by the USS Philippine Sea and partner forces. On June 13, the Houthis struck the M/V Verbena, a Palauan-flagged, Ukrainian-owned bulk carrier, with two missile attacks, resulting in fires and injuries. The crew managed to extinguish the fires and continue their journey. These aggressive actions by the Houthis threaten regional stability and disrupt international maritime commerce, complicating the delivery of humanitarian aid to Yemen and Gaza.
  • CENTCOM has been actively involved in humanitarian efforts, delivering approximately 2,500 metric tons of aid through the maritime corridor since June 7. Since May 17, over 3,500 metric tons of aid have been delivered. On June 9, CENTCOM conducted a humanitarian airdrop in Northern Gaza, providing over 1,050 metric tons of relief to civilians affected by the conflict. Due to expected high seas, the temporary pier in Gaza is being temporarily relocated to Ashdod, Israel, to prevent damage. It will be re-anchored once the seas calm to continue facilitating aid deliveries to Gaza.

Cylance Cyberattack:

  • Cybersecurity firm Cylance has confirmed that it has fallen victim to a cyberattack, and the data being sold on the dark web is legitimate. The company lost 34 million emails and other personally identifiable information (PII) belonging to customers, employees, and partners. This database is being sold for $750,000 by a seller named Sp1d3r, who is also responsible for a recent breach of Advance Auto Parts, where sensitive information from 380 million customer profiles was stolen and offered for $1.5 million.
  • Cylance clarified that the breach is not related to Snowflake, a major cloud service provider linked to other recent data breaches. In a statement to BleepingComputer, BlackBerry Cylance mentioned that the data being sold is relatively old, and they are “aware and investigating” the claims. The company assured that no BlackBerry data and systems related to customers, products, or operations have been compromised.
  • Furthermore, BlackBerry Cylance noted that no current Cylance customers are impacted, and no sensitive information is involved. The compromised data was accessed from a third-party platform unrelated to BlackBerry and appears to be from 2015-2018, before BlackBerry acquired the Cylance product portfolio.

Statistic:

  • Year companies were founded:
  • 🇫🇮 Nokia: 1865
  • 🇯🇵 Toshiba: 1875
  • 🇯🇵 Nintendo: 1889
  • 🇺🇸 IBM: 1911
  • 🇯🇵 Panasonic: 1918
  • 🇺🇸 Disney: 1923
  • 🇺🇸 Motorola: 1928
  • 🇰🇷 Samsung: 1938
  • 🇺🇸 HP: 1939
  • 🇯🇵 Sony: 1946
  • 🇺🇸 Microsoft: 1975
  • 🇺🇸 Apple: 1976
  • 🇺🇸 Dell: 1984
  • 🇨🇳 Huawei: 1987
  • 🇺🇸 Amazon: 1994
  • 🇺🇸 Netflix: 1997
  • 🇺🇸 Google: 1998
  • 🇺🇸 Salesforce: 1999
  • 🇺🇸 SpaceX: 2002
  • 🇺🇸 Tesla: 2003
  • 🇺🇸 Facebook: 2003
  • 🇺🇸 YouTube: 2005
  • 🇺🇸 Reddit: 2005
  • 🇺🇸 Twitter: 2006
  • 🇺🇸 Airbnb: 2008
  • 🇺🇸 WhatsApp: 2009
  • 🇺🇸 Instagram: 2010
  • 🇺🇸 Zoom: 2011
  • 🇺🇸 Twitch: 2011
  • 🇺🇸 OpenAl: 2015
  • 🇨🇳 TikTok: 2016

Article Links:

Encryption Explained
Encryption is a significant area of cybersecurity, an essential tool in protecting information in the age of the internet. At its core, encryption is the process of converting data or information into a code to prevent unauthorized access. This process transforms readable data, known as plaintext, into an encoded form,
AI Prompting Explained
The advent of artificial intelligence (AI) has catalyzed transformative changes across various sectors. A fundamental aspect of this revolution is AI prompting. This article will serve as a comprehensive guide to AI prompting, illustrating the importance of not only ‘what you ask’ but more importantly ‘how you ask’. We will
The Dark Web
The dark web is a complex segment of the internet, often associated with anonymity and illicit activities. This analysis delves deeply into its technological infrastructure, the nature of its security threats, and the crucial role of dark web intelligence platforms for security. The origins of the dark web are closely

Thanks for reading!

TIME IS MONEY: Your Free Daily Scoop of Markets📈, Business💼, Tech📲🚀, and Global 🌎 News.

The news you need, the time you want.

TIME IS MONEY
TIME IS MONEY: A Free Daily Email Newsletter of Markets📈, Business💼, Tech📲🚀, and Global 🌎 News.

Support/Suggestions Emails:

timeismoney@timeismon.news