4.8 C
New York
Friday, March 21, 2025
Home Blog Page 9

The 25 Greatest Promoting Electrical Automobiles & Vehicles in California — CHART



Join day by day information updates from CleanTechnica on e mail. Or comply with us on Google Information!


Humorous factor — I wrote about California’s total electrical car market and stats in addition to market leaders, and I wrote about electrical autos topping the charts in varied car courses, however I uncared for to provide and share in all probability the obvious chart of all from this market. That may be a chart on the 25 high promoting electrical car fashions.

A few fast notes right here: 1) The California New Automotive Sellers Affiliation (CNCDA) consists of full electrics (ZEVs) and plugin hybrids (PHEVs) on this rating, in order that’s what I’m together with on this case (I may simply exclude the PHEVs, in fact, however I really do prefer to see how they examine, so I’m together with them right here), and a couple of) Tesla’s high two fashions are to date above different fashions in gross sales, particularly the Tesla Mannequin Y, that it makes the chart much less attention-grabbing and enjoyable in relation to these different fashions, however that’s the truth we’re in. Hopefully different electrical fashions can scale up far more in 2025….

Clearly, Tesla’s high two fashions dominate. The primary shock is that the Hyundai IONIQ 5 is definitely setting itself aside in California in third. Not dangerous. Now are you able to double or triple that, Hyundai?

The Ford Mustang Mach-E held robust for 4th, the one different mannequin above 10,000 gross sales, however, once more, it could be good to see Ford double, triple, or quadruple these gross sales. We’ll see what occurs in 2025 as Tesla continues to endure extreme model injury from Elon Musk.

A pleasant shock is that solely two plugin hybrid fashions ranked within the high 25. The Toyota Prius Prime takes fifth place, however what would a completely electrical model of the extraordinarily in style mannequin do in gross sales? Additionally, how a lot is Toyota really making an attempt to promote its plugin fashions in California, versus doing the naked minimal? One has to surprise.

The, humorous sufficient, the Tesla Cybertruck and Rivian R1S are proper subsequent to one another, and the Tesla Mannequin X proper on their tail. I ponder if Rivian will shoot above the 2 largest Tesla fashions this 12 months?

Another ideas or questions from this California EV gross sales rating?

Whether or not you may have solar energy or not, please full our newest solar energy survey.



Chip in a number of {dollars} a month to assist help unbiased cleantech protection that helps to speed up the cleantech revolution!


Have a tip for CleanTechnica? Wish to promote? Wish to recommend a visitor for our CleanTech Speak podcast? Contact us right here.


Join our day by day e-newsletter for 15 new cleantech tales a day. Or join our weekly one if day by day is just too frequent.


Commercial



 


CleanTechnica makes use of affiliate hyperlinks. See our coverage right here.

CleanTechnica’s Remark Coverage




YouTube Sport Cheats Unfold Arcane Stealer Malware to Russian-Talking Customers

0


Mar 20, 2025Ravie LakshmananMalware / Menace Evaluation

YouTube Sport Cheats Unfold Arcane Stealer Malware to Russian-Talking Customers

YouTube movies selling recreation cheats are getting used to ship a beforehand undocumented stealer malware referred to as Arcane seemingly focusing on Russian-speaking customers.

“What’s intriguing about this malware is how a lot it collects,” Kaspersky stated in an evaluation. “It grabs account data from VPN and gaming purchasers, and all types of community utilities like ngrok, Playit, Cyberduck, FileZilla, and DynDNS.”

The assault chains contain sharing hyperlinks to a password-protected archive on YouTube movies, which, when opened, unpacks a begin.bat batch file that is chargeable for retrieving one other archive file by way of PowerShell.

The batch file then makes use of PowerShell to launch two executables embedded inside the newly downloaded archive, whereas additionally disabling Home windows SmartScreen protections and each drive root folder to SmartScreen filter exceptions.

Cybersecurity

Of the 2 binaries, one is a cryptocurrency miner and the opposite is a stealer dubbed VGS that is a variant of the Phemedrone Stealer malware. As of November 2024, the assaults have been discovered to interchange VGS with Arcane.

“Though a lot of it was borrowed from different stealers, we couldn’t attribute it to any of the recognized households,” the Russian cybersecurity firm famous.

Apart from stealing login credentials, passwords, bank card information, and cookies from varied Chromium- and Gecko-based browsers, Arcane is supplied to reap complete system information in addition to configuration recordsdata, settings, and account data from a number of apps similar to follows –

  • VPN purchasers: OpenVPN, Mullvad, NordVPN, IPVanish, Surfshark, Proton, hidemy.identify, PIA, CyberGhost, and ExpressVPN
  • Community purchasers and utilities: ngrok, Playit, Cyberduck, FileZilla, and DynDNS
  • Messaging apps: ICQ, Tox, Skype, Pidgin, Sign, Ingredient, Discord, Telegram, Jabber, and Viber
  • E mail purchasers: Microsoft Outlook
  • Gaming purchasers and providers: Riot Consumer, Epic, Steam, Ubisoft Join (ex-Uplay), Roblox, Battle.internet, and varied Minecraft purchasers
  • Crypto wallets: Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, Atomic, Guarda, and Coinomi
YouTube Game Cheats

Moreover, Arcane is designed to take screenshots of the contaminated machine, enumerate working processes, and checklist saved Wi-Fi networks and their passwords.

“Most browsers generate distinctive keys for encrypting delicate information they retailer, similar to logins, passwords, cookies, and so forth.,” Kaspersky stated. “Arcane makes use of the Information Safety API (DPAPI) to acquire these keys, which is typical of stealers.”

Cybersecurity

“However Arcane additionally comprises an executable file of the Xaitax utility, which it makes use of to crack browser keys. To do that, the utility is dropped to disk and launched covertly, and the stealer obtains all of the keys it wants from its console output.”

Including to its capabilities, the stealer malware implements a separate technique for extracting cookies from Chromium-based browsers launching a duplicate of the browser by means of a debug port.

The unidentified risk actors behind the operation have since expanded their choices to incorporate a loader named ArcanaLoader that is ostensibly meant to obtain recreation cheats, however delivers the stealer malware as a substitute. Russia, Belarus, and Kazakhstan have emerged as the first targets of the marketing campaign.

“What’s fascinating about this explicit marketing campaign is that it illustrates how versatile cybercriminals are, all the time updating their instruments and the strategies of distributing them,” Kasperksy stated. “Apart from, the Arcane stealer itself is fascinating due to all of the completely different information it collects and the tips it makes use of to extract the knowledge the attackers need.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Dragon RaaS Main “5 Households” Crimeware with New Preliminary Entry & Exploitation Techniques

0


Dragon RaaS, a ransomware group identified for its mix of hacktivism and cybercrime, has emerged as a major participant within the “5 Households” crimeware syndicate.

This group, which incorporates ThreatSec, GhostSec, Blackforums, and SiegedSec, has been making waves since its inception in July 2024 as an offshoot of the Stormous group.

Dragon RaaS markets itself as a classy Ransomware-as-a-Service (RaaS) operation, although its assaults usually deal with defacements and opportunistic strikes slightly than large-scale ransomware extortion.

Origins and Evolution

Dragon RaaS’s origins are deeply rooted within the pro-Russian Stormous group, which gained notoriety for concentrating on organizations perceived as hostile to Russia.

Stormous is a part of the broader “5 Households” syndicate, which has been concerned in varied ransomware operations, together with GhostLocker and StormCry.

In July 2024, Dragon RaaS launched its Telegram channel, saying a forthcoming ransomware platform.

Dragon RaaSDragon RaaS
Dragon RaaS Platform launch announcement through Telegram

The group’s first substantive postings occurred in October 2024, with the announcement of a ransomware assault towards Al-Saeeda College in Yemen.

This marked the start of Dragon RaaS’s energetic marketing campaign, which continues to focus on smaller organizations with weak safety postures, primarily in america, Israel, the UK, France, and Germany.

Preliminary Entry and Exploitation Strategies

Dragon RaaS employs a variety of techniques to realize preliminary entry to focus on methods.

These embody exploiting vulnerabilities in public-facing purposes, brute-force credential assaults, and leveraging compromised credentials from infostealer logs.

The group often targets WordPress themes and plugins, LiteSpeed HTTP servers, and cPanel interfaces.

Particular vulnerabilities exploited by Dragon RaaS embody these within the Porto WP Theme (CVE-2024-3806 to CVE-2024-3809) and LiteSpeed HTTP servers (CVE-2022-0073 and CVE-2022-0074).

As soon as entry is gained, Dragon RaaS deploys a PHP webshell that gives backdoor performance and chronic ransomware capabilities.

Dragon RaaSDragon RaaS
Dragon Group ransom word (.txt model)

In keeping with SentinelOne Report, this webshell permits attackers to govern and encrypt recordsdata utilizing strategies comparable to OpenSSL, XOR, or mCrypt.

To guard towards Dragon RaaS and comparable teams, organizations ought to prioritize securing public-facing purposes by frequently updating and patching companies like WordPress and cPanel.

Implementing robust password insurance policies, together with multi-factor authentication, can be essential.

Deploying superior endpoint safety options can assist detect and forestall malicious techniques, strategies, and procedures (TTPs) related to these teams.

Monitoring for indicators of compromise and auditing methods for suspicious webshell exercise are important steps in sustaining a sturdy safety posture.

By specializing in these measures, organizations can considerably cut back their vulnerability to Dragon RaaS and different crimeware syndicates.

Examine Actual-World Malicious Hyperlinks & Phishing Assaults With Menace Intelligence Lookup – Attempt for Free

Why Software program Testing is Essential for Horse Racing Apps


In an business the place monetary transactions, private information, and stay betting are integral, the reliability and safety of horse racing apps should be hermetic.

One of the simplest ways to attain this? Rigorous software program testing. With out thorough testing, these apps danger exposing delicate consumer information, malfunctioning at essential betting moments, and even failing compliance checks.

Horse racing apps are multifaceted platforms that deal with consumer registration, cost processing, live-streaming, and betting transactions. If any of those elements fail, customers can undergo monetary losses or safety breaches. That is why testing protocols aren’t only a luxurious however a necessity.

Sorts of Software program Testing for Horse Racing Apps

To make sure a seamless and safe expertise, builders implement a number of testing strategies:

1. Purposeful Testing

Purposeful testing verifies whether or not the app operates based on its meant options. This contains:

  • Making certain the betting course of features accurately from inserting a wager to processing payouts.
  • Testing the accuracy of stay race outcomes and odds updates.
  • Checking if the consumer authentication and registration system are working easily.

Why Software program Testing is Essential for Horse Racing Apps

2. Safety Testing

Since horse racing apps take care of monetary transactions and delicate consumer information, safety testing is crucial. Safety checks establish vulnerabilities that would result in breaches. Key areas embrace:

  • Penetration Testing: Simulating hacker assaults to establish weak factors.
  • Information Encryption Testing: To start with, the information is encrypted, and they’re utilizing SSL expertise to maintain every little thing secure. Which means that even when information will get leaked, it’s unusable for hackers except they decode it.
  • Verifying that delicate information (bank card numbers, addresses, and betting historical past) is securely encrypted.
  • Two-Issue Authentication (2FA) Testing: Making certain further login safety features work accurately.

3. Efficiency Testing

A horse racing app should have the ability to deal with hundreds of simultaneous customers, particularly throughout main occasions, like if you find yourself participating in Kentucky Derby betting 2025. Efficiency testing ensures:

  • The app doesn’t crash beneath heavy visitors.
  • Betting transactions course of rapidly with out lag.
  • Dwell streaming options stay secure and don’t buffer excessively.

4. Usability Testing

Consumer expertise is simply as vital as safety and efficiency. Usability testing ensures:

  • Navigation is intuitive and easy.
  • The interface is mobile-friendly and accessible to all customers.
  • Fee strategies and withdrawal choices are simple to make use of.

5. Regression Testing

Every time a brand new replace is made to the app, regression testing ensures that present options aren’t damaged. This prevents surprising errors that would have an effect on betting, withdrawals, or safety settings.

Frequent Points That Testing Helps Stop

With out thorough software program testing, horse racing apps can face main setbacks, together with:

  • Information Breaches: Weak safety measures may permit hackers to steal private and monetary information.
  • Glitches in Betting: Incorrect odds calculations or malfunctioning betting options can frustrate customers and lead to authorized points.
  • Fee Failures: Poorly examined cost gateways may end up in failed deposits or withdrawals, resulting in buyer dissatisfaction.
  • Dwell Streaming Points: If a stream lags or freezes as a result of untested infrastructure, it impacts the general consumer expertise.

How Main Horse Racing Apps Deal with Testing

Again in 2022, a sports activities betting website bought hit, leaking hundreds of consumer data.

Horse racing apps haven’t had an enormous scandal but, however with extra of us leaping in (thanks, 2025 racing hype!), the stakes are increased. It’s like how horses used to only race for glory-now it’s large cash, and the apps are enjoying catch-up to guard us. Main horse racing apps make investments closely in software program testing to keep up reliability and safety.

As an illustration:

  • Churchill Downs’ platforms bear frequent safety audits and efficiency checks to forestall downtime throughout main occasions.
  • TwinSpires and TVG conduct intensive penetration testing to safeguard monetary transactions.
  • Builders rent moral hackers to check vulnerabilities earlier than launching new options.

Greatest Practices for Customers: Keep Protected

Whereas software program testing improves app safety, customers may also take steps to guard themselves:

  • Use robust passwords and allow two-factor authentication (2FA).
  • Keep away from clicking on suspicious hyperlinks or downloading unofficial apps.
  • Repeatedly replace your app to make sure you have the newest safety fixes.
  • Follow well-known, extremely rated apps with established safety protocols.

Conclusion

Horse racing apps proceed to evolve, offering extra options and comfort to customers. Nonetheless, the spine of their reliability lies in rigorous software program testing. By conducting common purposeful, safety, and efficiency checks, builders can stop pricey errors and information breaches. Whether or not you’re an informal bettor or a seasoned punter, selecting a well-tested app could make all of the distinction in guaranteeing a seamless and safe expertise.

how a pizza dough producer tackled palletizing challenges

0


Palletizing could appear easy—till you’re lifting 43-pound bins all day, stacking them six toes excessive, and struggling to search out staff keen to tackle the grueling process. For one pizza dough producer, this bottleneck wasn’t simply slowing manufacturing—it was making staffing a relentless headache. The answer? Automation. See how Robotiq’s PE20 palletizer helped them overcome area constraints, scale back reliance on temp labor, and preserve manufacturing transferring.