Charley Sets Sights on Tampa; 2 Million Encouraged to FleeHurricane Charley is zeroing in on Florida’s west coast a day after it ripped through Cuba. According to a report by the Associated Press Friday, government officials have urged some 2 million Florida residents to seek refuge out of the region. Storm surges are expected to seamp the streets of Tampa and neighboring coast towns. Charley’s winds have been clocked at 110 mph and the storm is expected to dump heavy rain on the region. Tropical storm Bonnie hit the Florida Panhandle Thursday and moved its way up the Atlantic Coast. Three people, including a child, were killed and 29 injured when a tornado spawned by the storm hit a North Carolina trailer park.For more details, read this Associated Press story in The New York Times.Las Vegas Sites Appear on Seized Tapes Videotapes seized by FBI agents from the New York apartment of a Pakistani man show at leats 34 sites in Las Vegas. According to a story in the Washington Post the commentary on the tapes is yet unknown because it has not been translated from Urdu to English. Law enforcement seized the tapes from the home of Kamran Akhtar, also known as Kamran Shaikh, after his arrest in Charlotte by police who were suspicious bout his filming of skyscrapers in the city. Ellen Knowlton, FBI special agent, declined to mention which Las Vegas sites were on the tapes. For more details, see the full article in the Washington Post. Hacker Cracks Apple Streaming TechnologyThe same hacker who cracked the code for encrypting DVDs has now compromised Apple’s wireless streaming audio technology. According to an Associated Press story, 20-year-old Norwegian Jon Lech Johansen is the culprit. Johansen has released a software key on hiw website that helps unlock the encryption that Apple uses for its AirPort Express device, which lets users broadcast digital music from Apple’s offline music store, iTunes, on a stereo that’s not connected to a computer. For the full Associated Press story, read the Washington Post. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe