THE DAILY PRAETORIAN: Cybersecurity Trends – 10/23/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/23/24

Image Credit: U.S. Department of Defense (DoD) / Navy Petty Officer 1st Class Charles J. Scudella III | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Lofty words cannot construct an alliance or maintain it; only concrete deeds can do that.”

 

-John F. Kennedy

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • Japan Expands Carrier Capabilities With F-35B, Drones Could Be Next

  • For the first time, a U.S. Marine Corps F-35B stealth fighter has operated aboard Japan’s largest warship, the Izumo-class destroyer Kaga, following significant modifications to the vessel for short takeoff and vertical landing (STOVL) operations. This event marks a milestone in Japan’s return to fixed-wing carrier aviation since World War II and is part of ongoing sea trials to certify the Kaga for F-35B operations. Japan has 42 F-35Bs on order, and while primarily operated by the Japan Air Self-Defense Force, this development enhances interoperability with U.S. forces. The recent trials also hint at Japan’s potential interest in expanding the warship’s fixed-wing capabilities, possibly incorporating drones like the Gambit 5, which could significantly bolster the country’s defense posture in the Pacific.

    For more on Japan’s evolving carrier capabilities and strategic implications, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • Netflix abruptly closes AAA gaming studio: what’s going on?

  • Netflix has shut down its high-profile game studio, Team Blue, just before the studio could release its first game. Led by former Blizzard Entertainment executive producer Chacko Sonny, the Southern California-based studio was tasked with creating AAA PC games, which are known for their large budgets and high production values. Despite Netflix’s foray into the gaming industry with over 100 mobile games, the company decided to halt its ambitious push into console and PC gaming, likely realizing the immense cost and challenges involved in producing such titles. Netflix still views gaming as a way to add value for subscribers, with projects like a companion game for Squid Game in the works.

    For more on Netflix’s gaming strategy and the future of its interactive content, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Brandon Lake and Phil Wickham Say They Tour for Spiritual Impact, Not Mere Entertainment

  • Brandon Lake and Phil Wickham, the headliners of the Summer Worship Nights Tour in 2023 and 2024, aim to transform lives with their music and testimonies about Christ’s love. Their tour, which focused on reaching those in need of a breakthrough or closer connection with God, is being showcased in a documentary titled For the One, in theaters from Oct. 27-29. Lake emphasized that while the tour was entertaining, its true purpose was for people to have life-changing encounters with God. Wickham shared stories of lives being impacted, such as security guards accepting Christ during a concert, and expressed hope that the documentary will inspire others and lead to salvation or renewed faith.

    For more on For the One and the impact of the Summer Worship Nights Tour, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions

  • As the November 5 U.S. presidential election approaches, Microsoft’s Threat Analysis Center (MTAC) has warned that Russia, China, and Iran are ramping up foreign influence operations aimed at disrupting the election. These operations are evolving, with Iran targeting the Trump campaign and promoting anti-Israel sentiments, Russia focusing on character attacks and AI-generated deepfakes against the Harris campaign, and China shifting attention to down-ballot Republican candidates. MTAC expects these actors to sow division, spread false election integrity claims, and deploy AI-generated content to influence voters, particularly during the critical 48 hours around Election Day. While many influence campaigns fail to gain traction, the successful ones could have a significant impact on public perception and electoral outcomes.

    For more on the evolving foreign influence efforts targeting the U.S. election, click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Israel must not end war yet despite Sinwar success – opinion

  • As Israel continues its military operations against Hamas and Hezbollah, Iran’s involvement in destabilizing the region poses an increasing threat of opening another front in the east. Iran’s expansionist agenda aims to dominate the Middle East and beyond by overthrowing regimes from within, as seen in Iraq, Lebanon, and Syria. Jordan and Israel serve as key barriers to this strategy. Iran has also used Jordan as a route for smuggling weapons to Hezbollah and Hamas, further threatening regional stability. Despite this, Jordan has not effectively countered Iran’s growing influence, focusing more on domestic appeasement. The eastern front remains vulnerable, as attention is largely fixed on conflicts in Gaza and Lebanon.

    For more on Iran’s regional destabilization efforts and the role of Israel and Jordan, click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 10/22/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/22/24

Image Credit: iStock / wildpixel | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“A government is the only vessel that leaks from the top.”

 

-James Reston, Jr.

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • The Existence Of Israel’s Secret Stealth Drone Should Come As No Surprise

  • Leaked U.S. intelligence documents have revealed the existence of Israel’s covert RA-01 drone, used for long-range intelligence gathering and potentially for strikes. The RA-01 drone was reportedly operating from a restricted area at Ramon Airbase, known for housing specialized units. While the details of the drone’s design remain classified, it is believed to play a significant role in Israel’s strategy against Iran, offering surveillance in denied areas and possibly aiding in stand-off operations. These revelations come as Israel prepares for potential retaliatory actions against Iran following recent missile attacks.

    For more on Israel’s covert drone capabilities and their strategic importance, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • Anthropic Wants Its AI Agent to Control Your Computer

  • Anthropic has introduced a new capability for its AI model, Claude, allowing it to perform tasks on computers such as browsing the web, opening applications, and inputting text. Demonstrations showed Claude planning a sunrise outing and building a simple website, suggesting its potential to automate routine office tasks. While promising, the AI still struggles with complex tasks and has a success rate of just 14.9% on benchmarks testing its operating system skills, far below human performance. Despite these limitations, companies like Canva and Replit are already testing Claude’s agentic abilities.

    For more on Anthropic’s AI advances and their implications, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Ex-Victoria’s Secret Model Thanks Jesus as Cancer Treatments Near an End

  • Former Victoria’s Secret model Nicole Weider, who left her modeling career to follow her Christian faith, has shared an encouraging update on her journey with Stage 4 breast cancer. After being diagnosed last year, Weider announced on Instagram that she is now cancer-free, with only six radiation treatments left. She reflected on how the experience has strengthened her faith and expressed gratitude for her recovery. Weider also encouraged others going through difficult times to trust in God’s plan and persevere, as challenges are temporary.

    For more on Nicole Weider’s inspiring journey and faith, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • SEC hits security companies with massive fines for misdirection over SolarWinds Orion hack

  • The US Securities and Exchange Commission (SEC) has charged Unisys, Avaya, Check Point, and Mimecast for misleading disclosures related to the SolarWinds Orion hack, alleging that these companies downplayed the impact of the breaches on their systems. The SEC found that these cybersecurity firms failed to adequately inform investors about the extent of the cyber intrusions, with some framing the risks in hypothetical terms despite knowing the full scope of the breaches. The settlement requires Unisys to pay $4 million, Avaya $1 million, Check Point $995,000, and Mimecast $990,000 in penalties. The companies neither admitted nor denied the SEC’s findings and agreed to stop future violations.

    For more on the SEC’s actions and the cybersecurity firms involved in the SolarWinds hack, click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • A new front emerges with Iran’s growing threat to Israel and Jordan – opinion

  • As Israel continues its military campaign against Iranian-backed proxies like Hamas and Hezbollah, concerns are growing about a new front opening to the east, potentially involving Jordan. Iran has been gradually expanding its influence across the Middle East, using destabilization tactics to gain control of Iraq, Lebanon, Syria, and Yemen. Jordan, which shares a lengthy border with Israel, has faced infiltration efforts by Iran, including weapon smuggling and the spread of extremist ideology, particularly through Hamas. Iran’s attempts to erode Jordanian sovereignty, coupled with the relatively porous Israeli-Jordanian border, pose significant risks to regional stability as both countries work to prevent further Iranian encroachment.

    For more on Iran’s regional destabilization efforts and the implications for Israel and Jordan, click here to read more.

     
THE DAILY PRAETORIAN: Cybersecurity Trends – 10/21/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/21/24

Image Credit: iStock / Drazen Zigic | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“Let each citizen remember at the moment he is offering his vote that he is not making a present or a compliment to please an individual—or at least that he ought not so to do; but that he is executing one of the most solemn trusts in human society for which he is accountable to God and his country.”

 

– Samuel Adams

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • Gov. Youngkin defends Virginia’s ‘common sense’ law removing non-citizens from voter rolls

  • Virginia’s Governor Glenn Youngkin is defending his state’s removal of non-citizens from voter rolls, which has drawn a lawsuit from the U.S. Department of Justice (DOJ). The DOJ argues that Virginia violated the National Voter Registration Act by conducting a voter roll purge within 90 days of the federal election, as the act prohibits systematic removals within this period. Youngkin, however, insists that the state’s actions comply with laws passed under Democratic leadership in 2006 and are meant to ensure that only citizens vote. He emphasized that the process allows non-citizens identified by the Department of Motor Vehicles 14 days to prove their citizenship before being removed, and they can still register on Election Day and cast provisional ballots. Youngkin attributes the lawsuit to political motivations, noting that similar enforcement of the law under previous Democratic governors did not face legal challenges.

    For more details on Virginia’s voter roll policies and the DOJ lawsuit, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • T-Mobile, AT&T oppose unlocking rule, claim locked phones are good for users

  • T-Mobile and AT&T are opposing a Federal Communications Commission (FCC) proposal that would require phones to be unlocked within 60 days of activation. The carriers argue that locking phones helps them offer cheaper devices, claiming that the rule would reduce consumer subsidies for prepaid phones by 40-70% and limit their range of discounted devices. The FCC aims to give consumers more freedom to switch carriers, especially for low-income customers, and advocates for automatic unlocking without requiring user requests. Verizon, which already unlocks phones after 60 days, supports a uniform policy but suggests longer lock periods for prepaid customers.

    For more on the debate over phone unlocking rules, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Netanyahu Renews Pledge to Win War after Drone Attack on His Home; Hundreds of Terrorists Surrender

  • Hezbollah launched a drone attack targeting Israeli Prime Minister Benjamin Netanyahu’s residence in Caesarea, but it was intercepted, and Netanyahu was unharmed. In response, Netanyahu reaffirmed Israel’s commitment to defeating threats from Hezbollah and Iran. The IDF has already shot down two drones and neutralized the third. Despite Iran’s denial of involvement, Israel holds Iran responsible and vows retaliation for recent missile attacks. Meanwhile, Hamas continues to resist surrender, and Israel has intensified its military operations, targeting Hezbollah’s operatives and financial institutions, with over 1,500 Hezbollah members eliminated.

    For more details on the ongoing conflict, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • High-risk vulnerability affecting UniFi Network Server

  • Ubiquiti’s UniFi Network Server, part of its popular UniFi platform, is affected by a critical local privilege escalation vulnerability rated 8.8/10. This vulnerability allows users with local access to elevate their privileges and potentially take control of the server, posing serious security risks for organizations using UniFi Network for managing devices like access points, switches, and IoT devices. Affected versions include 8.4.62 and earlier. Ubiquiti urges users to update to Version 8.5.6 or later to mitigate the risk. The vulnerability has been assigned the identifier CVE-2024-42028.

    For more on this security threat and the update process, click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Hezbollah’s gold mine catches fire: Nasrallah’s bunker under hospital held half billion dollars

  • The Israeli Defense Forces (IDF) have revealed that a Hezbollah bunker containing half a billion dollars and gold, located beneath the Al-Sahel Hospital in the Dahieh neighborhood of southern Beirut, caught fire. This bunker, once used by former Hezbollah leader Hassan Nasrallah, housed much of the organization’s stolen wealth, intended for arming Hezbollah. Although the hospital was evacuated, its director denied the presence of Hezbollah’s cash and called for an investigation. The IDF stated they will not strike the hospital but continue to monitor the site.

    For more on the impact of this revelation and Hezbollah’s financial operations, click here to read more.

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/18/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/18/24

Image Credit: iStock / Els Manning | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“In any moment of decision, the best thing you can do is the right thing, the next best thing is the wrong thing, and the worst thing you can do is nothing.”

 

-Theodore Roosevelt

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • Special Forces soldiers brought in to reach remote Navy Growler crash site on Mount Rainier

  • Army Green Berets with specialized mountaineering skills are attempting to reach the crash site of a Navy EA-18G Growler on Mount Rainier, Washington. The two-person crew remains unaccounted for after the jet went down during a training mission on October 15. Search and rescue efforts, hampered by bad weather and steep, wooded terrain, have involved Navy, Army, and civilian aircraft. The wreckage was spotted at approximately 6,000 feet, and soldiers from the 1st Special Forces Group at Joint Base Lewis-McChord have been called in to navigate the challenging terrain to locate the crew.

    For more updates on the Mount Rainier Navy jet crash, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • Throuple drama as girlfriend invites ChatGPT to settle arguments: it’s more common than you think

  • A Reddit user shared their frustration about their girlfriend’s reliance on ChatGPT during arguments, feeling ambushed by the chatbot’s detailed, biased responses. The user, who has been dating their girlfriend for eight months, explained that after every disagreement, she consults ChatGPT and returns with well-constructed arguments based on AI input. The user feels that the chatbot is taking sides, especially since their girlfriend formulates the prompts to favor her point of view. They raised concerns about ChatGPT’s bias and how it’s exacerbating their relationship issues, with Reddit commenters suggesting either fighting back with AI or reconsidering the relationship.

    For more on how AI is impacting relationships, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • Western nations asked to protect religious freedom amid growing intolerance

  • Religious freedom advocates are calling on Western countries to protect the rights of believers who hold traditional views on marriage and sexuality. At a recent meeting in Berlin, experts voiced concerns about increasing intolerance towards people of faith, leading to self-censorship and even legal or employment consequences for expressing religious beliefs. Organized by several religious and political bodies, the event coincided with the 2024 International Ministerial Conference on Freedom of Religion or Belief. Attendees warned that Western democracies are marginalizing religious believers and imposing liberal ideologies abroad. A declaration was submitted urging the affirmation of religious freedom for all, including those with traditional values on marriage and family.

    For more on the challenges to religious freedom in the West, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Hackers charged with attacking hospitals and Israel’s missile alert app

  • Two Sudanese men, Ahmed Salah Yousif Omer and Alaa Salah Yusuuf Omer, have been charged by the Department of Justice for leading a hacking group called Anonymous Sudan, responsible for over 35,000 cyberattacks. These attacks targeted critical infrastructure, including hospitals like Cedars-Sinai Medical Center, and caused significant disruptions. The group also attacked Israel’s missile warning system during last year’s Oct. 7 terrorist attack and claimed responsibility for targeting U.S. government entities. The DOJ is pursuing charges of conspiracy and damaging protected computers against the two men for their role in these malicious activities.

    For more on the charges against Anonymous Sudan, click here to read more.

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • After Sinwar’s death, Israel aims to lock in strategic gains before US election – report

  • Israel is intensifying military actions against Hamas and Hezbollah to prevent their regrouping and future threats, especially with the U.S. presidential elections approaching. Following the killing of Hamas leader Yahya Sinwar, Israel is pushing to secure long-term strategic gains, aiming to create buffer zones in Gaza and Lebanon. By doing so, Israeli officials hope to solidify territorial security and make future attacks less likely. The timing aligns with Israel’s broader regional goals, including efforts to weaken Iran’s influence, as its military campaign continues across multiple fronts.

    For more details on Israel’s military strategy, click here to read more.

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/17/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/17/24

Image Credit: U.S. Department of Defense (DoD) / Air Force Airman 1st Class Matthew Domingo | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“It is the function of grand strategy to discover and exploit the Achilles’ heel of the enemy nation; to strike not against its strongest bulwark but against its most vulnerable spot.”

 

– B.H. Liddell Hart

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • B-2 Spirits Just Sent A Very Ominous Message To Iran

  • The Pentagon has confirmed that U.S. forces, including B-2 Spirit stealth bombers, conducted a strike on underground Houthi weapons storage sites in Yemen. This is the first operational strike by the B-2 in years and the first in Yemen, sending a clear message to Iran, the Houthis’ supporter. The precision strike targeted hardened underground facilities housing weapons used to threaten international vessels. While it is unclear if the B-2’s 30,000-pound Massive Ordnance Penetrator (MOP) was used, the operation highlights the U.S.’s ability to destroy heavily fortified targets. This strike comes at a tense moment, with Israel possibly preparing for a significant strike on Iran, serving as a deterrent message to Iran’s deeply buried military and nuclear assets.

    For more on this strategic strike and its implications, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • 2004 was the first year of the future

  • In early 2004, the foundations of today’s digital world were being laid. While the world was watching Tom Brady rise and heading to theaters for The Lord of the Rings sequels, a social network was forming in a Harvard dorm room, and a Google employee was reshaping email. Major tech milestones emerged: Google went public, and platforms like Facebook, Gmail, Firefox, and Digg launched, defining the start of Web 2.0. “Blogging” and “the long tail” became part of the digital lexicon. While Apple released a cool product, it was overshadowed by a better one a year later — some things never change. Tech from 2004 continues to shape our lives today.

    For more on how 2004 changed the web forever, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • If entire world denies marriage matters, Christians still cannot

  • The Austin Institute’s video The Economics of Sex highlights how the sexual revolution has impacted dating and marriage. The availability of birth control lowered the risk of pregnancy outside marriage, leading to fewer incentives for men to pursue committed relationships early on. As a result, marriage has shifted from being a “stepping stone” toward adulthood to a “capstone” after achieving financial and relational stability. This change has left many women desiring marital security but struggling to find it. Despite these shifts, Christians must continue to uphold marriage as a vital institution in God’s created order, modeling and teaching its value to the next generation. The Church might even consider playing a role in matchmaking to help young people form healthy, godly marriages.

    For more on how societal changes are affecting marriage, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • Sophos warns of growing ‘quishing’ threat

  • Phishing attacks using QR codes, known as “quishing,” are on the rise, cybersecurity experts warn. Sophos, a UK-based security company, recently reported a campaign where attackers used emails with QR code-laden PDFs to steal corporate credentials from mobile devices. The emails appeared authentic, coming from compromised accounts and mimicking office documents. When scanned, the QR codes led to phishing pages resembling Microsoft365 login screens, designed to steal credentials and MFA tokens. Sophos noted that these attacks are becoming more polished and increasingly bypass traditional defenses, posing a growing threat.

    For more on the rise of quishing attacks and how to protect yourself, click here to read more.

     

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Officials to ‘Post’: Hamas leader Yahya Sinwar killed in Rafah, Gaza Strip

  • Hamas leader Yahya Sinwar was killed during an IDF operation in Rafah, marking a significant development in the ongoing conflict. Sinwar, the orchestrator of the October 7 massacre, which claimed over 1,200 lives and led to the taking of 250 hostages, had been in hiding and frequently using human shields. IDF forces identified Sinwar during the operation through dental and fingerprint records. His death sends a clear message to Hamas and the people of Gaza, as Israeli officials emphasize the end of the man responsible for much of the recent violence.

    For more on Yahya Sinwar’s death and its implications, click here to read more.

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/16/24

THE DAILY PRAETORIAN: Cybersecurity Trends – 10/16/24

Image Credit: U.S. Department of Defense (DoD) / Navy | Imagery Disclaimer

Securing Tomorrow: Your Daily Dose of Cyber Safety, Tech Trends, National Defense News, and Inspiration.

“United we fought and united we prevail.”

 

-Chester W. Nimitz

I. National Defense: Key developments in national defense, particularly cyber and technological warfare.

  • China on ‘insidious’ path, says US Army Pacific commander after Taiwan exercise

  • China’s recent military exercise, Joint Sword 2024B, saw a record 153 warplanes crossing the Taiwan Strait median, as well as the participation of the aircraft carrier Liaoning and two dozen ships, marking Beijing’s continued military modernization. This exercise came shortly after Taiwan’s National Day and President Lai Ching-te’s speech, with China justifying the drills as a response to Taiwan’s foreign relations and stance on independence. U.S. Army Pacific Commander Gen. Charles Flynn expressed concern over China’s incremental military buildup, calling it a threat to Indo-Pacific stability, but noted that Chinese aggression has bolstered U.S. leadership and security partnerships in the region.

    For more on China’s military activities and their implications for Taiwan and the Indo-Pacific, click here to read more.

     

II. Tech Trends: Updates on emerging technology trends shaping the digital world.

  • What Gmail did to email

  • When Gmail launched in 2004, its generous storage space revolutionized email services, offering a full gigabyte of space for free compared to the limited storage of paid services. Over the years, Gmail has added various features like labels and snoozing emails, which many, including the writer, have found helpful. However, newer additions such as autocomplete and AI suggestions can be intrusive. Despite frustrations, Gmail’s cloud-based storage offers convenience, making it easy to access old emails, unlike the pre-cloud days when emails were stored locally on a hard drive. The piece reflects on the evolution from localized email storage, which offered more privacy, to today’s cloud-based systems, which prioritize accessibility but at the cost of some privacy.

    For more on the evolution of Gmail and email storage, click here to read more.

     
     

III. Inspiration: Articles centered on faith that offer guidance and reflection.

  • For Church to be relevant, it must avoid childish things

  • In Milan Kundera’s The Book of Laughter and Forgetting, the Czech author suggests that humanity is becoming more childlike, a notion echoed by Douglas Murray’s critique of modern Christianity in his recent Spectator article. Murray reflects on how the Church of England, through events like the “silent disco” in Canterbury Cathedral and an upcoming rave in Peterborough Cathedral, has drifted from its sacred mission. The transformation of these cathedrals, originally built for worship, into venues for entertainment highlights the Church’s loss of confidence in its Gospel foundations. This shift towards childishness, Murray argues, is a product of theological liberalism, which, despite being pioneered by intellectual figures, has led to a trivialization of faith. The Church, he warns, must resist the pull of cultural infantilization and reclaim a mature, transcendent faith.

    For more on the Church’s struggles with modernity, click here to read more.

     

IV. Cyber Safety: A focus on the latest cybersecurity threats, tips, or breaches impacting individuals and organizations.

  • MacOS bypassing VPNs and leaking traffic after update, report reveals

  • Security researchers at Mullvad have discovered that the macOS firewall may malfunction after system updates, potentially leaking traffic for VPN users. The issue, which started with macOS 14.6 and was addressed in the recent 15.1 beta, causes the firewall to disregard rules, allowing some apps to bypass the VPN. Mullvad recommends users test for leaks by creating firewall rules or checking VPN traffic. Many macOS users have reported recurring issues after updates, including default setting resets and apps launching unexpectedly, leading to increased security risks.

    For more on macOS firewall issues and VPN traffic leaks, click here to read more.

     

V. Shield of Israel: Coverage from The Jerusalem Post, providing an Israeli perspective on ongoing conflicts.

  • Biden humanitarian envoy says Israel is too close an ally to suspend arms – report

  • A Biden administration official, Lise Grande, reportedly told humanitarian aid groups that Israel is too close of an ally for the U.S. to suspend arms shipments over issues related to blocking food and medicine from entering Gaza, according to a POLITICO report. During an August 29 meeting, Grande emphasized that while the U.S. would apply international pressure through the UN, it would not halt weapon shipments to Israel. She described Israel as being part of a “tight circle of very few allies” with special considerations. Despite the humanitarian concerns in Gaza, the U.S. government remains committed to supporting Israel militarily, and recent efforts have reportedly led to improvements in the aid situation, including the reopening of the aid route to northern Gaza.

    For more on the U.S. stance, click here to read more.

Pin It on Pinterest