7.1 C
New York
Wednesday, March 19, 2025
Home Blog

From Bamboo to Recycled Plastic: The Supplies Behind Inexperienced Pens


The manufacture of pens by means of sustainable strategies has turn out to be the main focus of the stationery business improvement. The manufacturing of inexperienced pens, similar to branded eco-pens comprised of bamboo and recycled plastic supplies, helps lower plastic contamination within the surroundings and helps shopper accountability.

The composition and benefits of recycled plastic pens, along with projections about forthcoming sustainable writing devices, are examined on this article.

The Significance of Sustainable Supplies in Pen Manufacturing

Pens exist all over the place as a result of they discover use all through colleges, workplaces, and residential areas. Many individuals fail to contemplate the environmental affect of pens. Widespread pen makes use of of virgin fossil-fuel-sourced plastics for his or her creation leading to plastic contamination that harms each pure sources and people. Various supplies allow corporations to scale back environmental harm by sustaining product utility.

Sustainable supplies utilized in pen manufacturing ship these important benefits:

  • The usage of recycled together with biodegradable sources reduces plastic waste, which prevents supplies from reaching each oceans and landfills.
  • The manufacturing of pens utilizing sustainable supplies results in decreased carbon emissions in comparison with common plastic manufacturing processes.
  • Bamboo, in addition to biodegradable supplies from cornstarch molecules, gives renewable benefits because of its fast regrowth functionality.

Environmental consciousness amongst customers has grown, so producers now produce branded eco-pens, which additionally leads them to undertake sustainable manufacturing practices.

Bamboo: A Renewable and Biodegradable Various

Many fashionable pens, similar to Save Your Ink, use bamboo as the first sustainable materials due to its potential to decompose naturally. Bamboo demonstrates sooner progress than conventional plastics as a result of it grows swiftly without having pesticides or fertilizers as cultivation inputs.

Benefits of bamboo pens:

  • These days, bamboo shows fast enlargement capabilities, which make this useful resource extremely sustainable.
  • The decomposition strategy of bamboo happens naturally, so the surroundings stays protected against deterioration.
  • Bamboo pens endure nicely and show enticing options that entice environmentally conscious patrons.
  • Minimal manufacturing facility necessities throughout bamboo pen manufacturing assist scale back power wants in comparison with making pens with plastic supplies, thus minimizing the environmental impact.

The refillable ink cartridges that bamboo pens make use of allow extended use and reduce the quantity of waste produced by these pens.

Recycled Plastics: Giving Waste a Second Life

The manufacturing of eco-friendly pens closely depends upon recycled plastic as a principal uncooked materials. The creation of sustainable pens by means of plastic waste administration from bottles and containers and extra post-consumer merchandise results in each decrease virgin plastic wants and fewer environmental contamination.

The method of pen manufacturing makes use of recycled plastic in two methods:

  • Put up-consumer plastic recycling prevents waste from getting into landfills so it may get a second life as a substitute of accumulating at landfills or in oceans.
  • The manufacturing strategy of recycled plastic pens makes use of decrease quantities of power when in comparison with typical plastic manufacturing.
  • A round financial system emerges when supplies are reused persistently as a part of the offered methodology.
  • Recycled plastic pens retain their sturdiness the identical as customary plastic writing implements and concurrently minimize down on environmental penalties.

Nonetheless, these recycled plastic pens succeed as they reduce each plastic manufacturing necessities and the quantity of waste within the surroundings as a result of they persist regardless of their non-biodegradability attribute.

Different Eco-Pleasant Supplies Utilized in Inexperienced Pens

Numerous different supplies other than bamboo and recycled plastics have emerged for eco-friendly pens. The supplies assist create sustainable merchandise that serve the assorted wants of environmentally aware prospects.

Cornstarch-Based mostly Bioplastics

The rising market of plastic merchandise produced from cornstarch gives a possible substitute for normal plastics. Bioplastics comprised of cornstarch have the flexibility to decompose robotically when positioned in composting environments, thus minimizing air pollution.

Recycled Paper and Cardboard

Reclaimed paper and cardboard barrels in pens lower plastic utilization with out affecting their environment friendly dimensions. After use, these pens turn out to be appropriate for biodegradation and recycling.

Wooden

Sustainable wooden provides function a plastic different as a result of these pens degrade naturally over time. The environmental focus of customers attracts them to pens outfitted with rustic, pure designs.

Steel

Plastic pens created with recycled aluminum or chrome steel have glorious sturdiness in addition to reusability, although they continue to be non-biodegradable supplies. Reusable steel pens operate as a sturdy pen answer that substitutes conventional single-use plastic pens.

volunteer

Pixabay

The Way forward for Sustainable Pens

Eco-friendly product demand progress creates favorable situations for sustainable pens within the coming years. The next patterns will direct the trail of environmentally pleasant pens:

  • The event of novel plant-based bioplastics and compostable merchandise by means of scientific investigations will create higher environmentally sustainable pen options.
  • Refillable pen designs with modular parts assist folks keep their writing devices as a substitute of throwing them away after a single utilization, thus minimizing waste era.
  • Companies are creating closed-loop recycling schemes which have devoted take-back procedures for replenishing pens into new manufacturing merchandise.

Enterprise ventures now enhance their sustainability branding by means of the choice of environmentally pleasant pens as promotional gadgets, which raises market demand for eco-friendly choices.

Conclusion

The transition to manufacturing sustainable and reusable pens serves as a basic course of to reduce plastic waste, along with its help for environmental accountability. Three appropriate choices for environmentally pleasant writing instruments embody bamboo, recycled plastics, and biodegradable alternate options.

Client choice of pens containing sustainable supplies permits them to help environmental sustainability in long-term views. The stationery business will progressively undertake environmentally sustainable pen requirements, which is able to emerge as the brand new customary writing device.

Crucial mySCADA myPRO Flaws May Let Attackers Take Over Industrial Management Methods

0


Mar 19, 2025Ravie LakshmananVulnerability / Community Safety

Crucial mySCADA myPRO Flaws May Let Attackers Take Over Industrial Management Methods

Cybersecurity researchers have disclosed particulars of two crucial flaws impacting mySCADA myPRO, a Supervisory Management and Information Acquisition (SCADA) system utilized in operational know-how (OT) environments, that would permit malicious actors to take management of inclined techniques.

“These vulnerabilities, if exploited, may grant unauthorized entry to industrial management networks, doubtlessly resulting in extreme operational disruptions and monetary losses,” Swiss safety firm PRODAFT stated.

The listing of shortcomings, each rated 9.3 on the CVSS v4 scoring system, are under –

  • CVE-2025-20014 – An working system command injection vulnerability that would allow an attacker to execute arbitrary instructions on the affected system through specifically crafted POST requests containing a model parameter
  • CVE-2025-20061 – An working system command injection vulnerability that would allow an attacker to execute arbitrary instructions on the affected system through specifically crafted POST requests containing an electronic mail parameter

Profitable exploitation of both of the 2 flaws may allow an attacker to inject system instructions and execute arbitrary code. The problems have been addressed within the following variations –

  • mySCADA PRO Supervisor 1.3
  • mySCADA PRO Runtime 9.2.1
Cybersecurity

In line with PRODAFT, each vulnerabilities stem from a failure to sanitize person inputs, thereby opening the door to a command injection.

“These vulnerabilities spotlight the persistent safety dangers in SCADA techniques and the necessity for stronger defenses,” the corporate stated. “Exploitation may result in operational disruptions, monetary losses, and security hazards.”

Organizations are really useful to use the most recent patches, implement community segmentation by isolating SCADA techniques from IT networks, implement robust authentication, and monitor for suspicious exercise.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



ios – CGImage to vImage buffer conversion results in improper colours


I’m changing an UIImage to a Vimage_Buffer. The code appears to be like as follows:

    CGImageRef originalImageRef = [image CGImage];
    CGColorSpaceRef originalColorSpace = CGImageGetColorSpace(originalImageRef);
    CGColorRenderingIntent intent = CGImageGetRenderingIntent(originalImageRef);
    
    vImage_CGImageFormat inputImageFormat =
    {
        .bitsPerComponent = (uint32_t) CGImageGetBitsPerComponent(originalImageRef),
        .bitsPerPixel = (uint32_t) CGImageGetBitsPerComponent(originalImageRef) * (uint32_t)(CGColorSpaceGetNumberOfComponents(originalColorSpace) + (kCGImageAlphaNone != CGImageGetAlphaInfo(originalImageRef))),
        .colorSpace = originalColorSpace,
        .bitmapInfo = CGImageGetBitmapInfo(originalImageRef),
        .model = 0,
        .decode = NULL,
        .renderingIntent = kCGRenderingIntentDefault
    };
    
    vImage_Error error = vImageBuffer_InitWithCGImage(inputImageBuffer, &inputImageFormat, NULL, originalImageRef, kvImageNoFlags);
    if (error  == kvImageNoError) {
        NSLog(@"picture to vimage buffer conversion full");
    } else {
        NSLog(@"picture to vimage buffer conversion failed");
    }

However the ensuing buffer colours are all completely different. All of the Blue tones develop into Yellow and so forth. I attempted the next code as properly:

   CGImageRef sourceRef = [image CGImage];
   NSUInteger sourceWidth = CGImageGetWidth(sourceRef);
   NSUInteger sourceHeight = CGImageGetHeight(sourceRef);

   CGDataProviderRef supplier = CGImageGetDataProvider(sourceRef);
   CFDataRef bitmapData = CGDataProviderCopyData(supplier);

   unsigned char *sourceData = (unsigned char*)calloc(sourceHeight * sourceWidth * 4, sizeof(unsigned char));
   NSUInteger bytesPerPixel = 4;
   NSUInteger sourceBytesPerRow = bytesPerPixel * sourceWidth;

   CFDataGetBytes(bitmapData, CFRangeMake(0, CFDataGetLength(bitmapData)), sourceData);

   vImage_Buffer v_image = {
       .information = (void *)sourceData,
       .top = sourceHeight,
       .width = sourceWidth,
       .rowBytes = sourceBytesPerRow
   };

   CFRelease(bitmapData);

However this additionally appears to have identical downside. Any assist on this regard is very appreciated.

Home windows File Explorer Vulnerability Permits Community Spoofing Assaults: PoC Launched

0


A crucial vulnerability in Home windows File Explorer has been found, permitting attackers to seize NTLM hashes and probably exploit them for community spoofing assaults.

The vulnerability, recognized as CVE-2025-24071, includes the automated processing of specifically crafted .library-ms information inside compressed archives like RAR or ZIP.

When these information, containing paths to attacker-controlled SMB servers, are extracted, Home windows Explorer initiates an implicit NTLM authentication handshake, leaking delicate credentials with out requiring person interplay, as per a report by CTI monster.

CVE-2025-24071: Overview of the Vulnerability

CVE-2025-24071 is a major problem in Home windows File Explorer that exploits the automated processing of .library-ms information.

These XML-based information outline search and library areas and are trusted by Home windows Explorer.

When a .library-ms file containing an SMB path is extracted from a compressed archive, Home windows Explorer makes an attempt to resolve this path routinely to assemble metadata and index file data.

This course of triggers an NTLM authentication handshake with the attacker-controlled SMB server, leaking the sufferer’s NTLMv2 hash with none express person interplay.

Translation from Russian for the threat actor's postTranslation from Russian for the threat actor's post
Translation from Russian for the risk actor’s put up

The vulnerability is especially harmful as a result of it doesn’t require the person to open or execute the extracted file; merely extracting it from the archive is sufficient to set off the NTLM hash leak.

This makes it a strong software for attackers looking for to compromise community safety via pass-the-hash assaults or offline NTLM hash cracking.

Technical Rationalization

  1. Automated File Processing: Upon extraction from a compressed archive, Home windows Explorer and the SearchProtocolHost.exe service routinely course of the .library-ms file. This includes opening the file, studying its contents to extract metadata, and querying file data. These operations happen with none express person interplay and might be noticed utilizing instruments like Procmon.
  2. SMB Communication: The extraction course of triggers SMB communication makes an attempt. Utilizing Wireshark with an SMB filter, researchers can seize the SMB2 Negotiate Protocol Request and the SMB2 Session Setup Request, which clearly present the initiation of an NTLM authentication handshake between the sufferer’s system and the attacker-controlled SMB server.

Proof of Idea (PoC)

A Proof of Idea (PoC) for CVE-2025-24071 has been launched on GitHub.

It demonstrates how attackers can exploit this vulnerability to seize NTLM hashes by making a specifically crafted .library-ms file and embedding it inside a RAR or ZIP archive.

The PoC might be executed utilizing Python, requiring minimal enter such because the goal file identify and the attacker’s IP handle.

python poc.py

# Enter file identify: your_file_name

# Enter IP: attacker_IP

CVE-2025-24071 is reportedly being exploited within the wild. Based on data from boards like xss.is, risk actors are using this vulnerability for credential theft.

The risk actor often called “Krypt0n” is linked to its exploitation and has developed malware often called “EncryptHub Stealer.”

The vulnerability’s potential for exploitation is underscored by its provide on the market on darkish net boards, additional emphasizing the urgency of patching affected programs.

Mitigation and Patch

Microsoft addressed CVE-2025-24071 in its March Patch Tuesday replace. Customers are suggested to make sure their Home windows programs are up to date with the most recent safety patches to forestall exploitation.

Because the vulnerability is actively being exploited, quick motion is essential to guard towards potential community spoofing assaults.

The invention and exploitation of CVE-2025-24071 spotlight the continued challenges in securing Home windows programs towards subtle threats.

By understanding how vulnerabilities like this one are exploited and taking proactive steps to patch and defend programs, customers can considerably cut back the chance of falling sufferer to such assaults.

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get dwell Entry with ANY.RUN -> Begin Now for Free. 

Is Generative AI a Blessing or a Curse? Tackling AI Threats in Examination Safety

0


Because the technological and financial shifts of the digital age dramatically shake up the calls for on the worldwide workforce, upskilling and reskilling have by no means been extra vital. Because of this, the necessity for dependable certification of latest abilities additionally grows.

Given the quickly increasing significance of certification and licensure checks worldwide, a wave of providers tailor-made to serving to candidates cheat the testing procedures has naturally occurred. These duplicitous strategies don’t simply pose a risk to the integrity of the talents market however may even pose dangers to human security; some licensure checks relate to vital sensible abilities like driving or working heavy equipment. 

After companies started to catch on to standard, or analog, dishonest utilizing actual human proxies, they launched measures to stop this – for on-line exams, candidates started to be requested to maintain their cameras on whereas they took the take a look at. However now, deepfake expertise (i.e., hyperrealistic audio and video that’s usually indistinguishable from actual life) poses a novel risk to check safety. Available on-line instruments wield GenAI to assist candidates get away with having a human proxy take a take a look at for them. 

By manipulating the video, these instruments can deceive companies into pondering that a candidate is taking the examination when, in actuality, another person is behind the display (i.e., proxy testing taking). Standard providers enable customers to swap their faces for another person’s from a webcam. The accessibility of those instruments undermines the integrity of certification testing, even when cameras are used.

Different types of GenAI, in addition to deepfakes, pose a risk to check safety. Giant Language Fashions (LLMs) are on the coronary heart of a world technological race, with tech giants like Apple, Microsoft, Google, and Amazon, in addition to Chinese language rivals like DeepSeek, making large bets on them.

Many of those fashions have made headlines for his or her capacity to move prestigious, high-stakes exams. As with deepfakes, unhealthy actors have wielded LLMs to use weaknesses in conventional take a look at safety norms.

Some corporations have begun to supply browser extensions that launch AI assistants, that are laborious to detect, permitting them to entry the solutions to high-stakes checks. Much less subtle makes use of of the expertise nonetheless pose threats, together with candidates going undetected utilizing AI apps on their telephones whereas sitting exams.

Nonetheless, new take a look at safety procedures can supply methods to make sure examination integrity towards these strategies.

The right way to Mitigate Dangers Whereas Reaping the Advantages of Generative AI

Regardless of the quite a few and quickly evolving purposes of GenAI to cheat on checks, there’s a parallel race ongoing within the take a look at safety business.

The identical expertise that threatens testing may also be used to guard the integrity of exams and supply elevated assurances to companies that the candidates they rent are certified for the job. Because of the always altering threats, options should be inventive and undertake a multi-layered method.

One modern means of lowering the threats posed by GenAI is dual-camera proctoring. This system entails utilizing the candidate’s cell system as a second digicam, offering a second video feed to detect dishonest. 

With a extra complete view of the candidate’s testing atmosphere, proctors can higher detect using a number of screens or exterior gadgets that is likely to be hidden exterior the standard webcam view.

It could actually additionally make it simpler to detect using deepfakes to disguise proxy test-taking, because the software program depends on face-swapping; a view of all the physique can reveal discrepancies between the deepfake and the particular person sitting for the examination.

Refined cues—like mismatches in lighting or facial geometry—turn out to be extra obvious when put next throughout two separate video feeds. This makes it simpler to detect deepfakes, that are usually flat, two-dimensional representations of faces.

The additional benefit of dual-camera proctoring is that it successfully ties up a candidate’s cellphone, which means it can’t be used for dishonest. Twin-camera proctoring is even additional enhanced by means of AI, which improves the detection of dishonest on the dwell video feed.

AI successfully gives a ‘second set of eyes’ that may always give attention to the live-streamed video. If the AI detects irregular exercise on a candidate’s feed, it points an alert to a human proctor, who can then confirm whether or not or not there was a breach in testing rules. This extra layer of oversight gives added safety and permits hundreds of candidates to be monitored with further safety protections.

Is Generative AI a Blessing or a Curse?

Because the upskilling and reskilling revolution progress, it has by no means been extra vital to safe checks towards novel dishonest strategies. From deepfakes disguising test-taking proxies to using LLMs to offer solutions to check questions, the threats are actual and accessible. However so are the options. 

Happily, as GenAI continues to advance, take a look at safety providers are assembly the problem, staying on the reducing fringe of an AI arms race towards unhealthy actors. By using modern methods to detect dishonest utilizing GenAI, from dual-camera proctoring to AI-enhanced monitoring, take a look at safety companies can successfully counter these threats. 

These strategies present companies with the peace of thoughts that coaching applications are dependable and that certifications and licenses are veritable. By doing so, they will foster skilled development for his or her staff and allow them to excel in new positions. 

After all, the character of AI signifies that the threats to check safety are dynamic and ever-evolving. Due to this fact, as GenAI improves and poses new threats to check integrity, it’s essential that safety companies proceed to spend money on harnessing it to develop and refine modern, multi-layered safety methods.

As with every new expertise, individuals will attempt to wield AI for each unhealthy and good ends. However by leveraging the expertise for good, we will guarantee certifications stay dependable and significant and that belief within the workforce and its capabilities stays robust. The way forward for examination safety is not only about maintaining – it’s about staying forward.