text

Fix Text Neck with Chiropractic, Study Suggests Chiropractor-Approved Maintenance Care

According to Dr Eric Chun-Pu Chu, DC PhD, of Chiropractic Doctors Association of Hong Kong (CDAHK), people spend about 6 hours a day gazing at their mobile phones, which can cause major text-neck aches and numbness.




text

Marquis Who's Who Honors Qing S. Duncan for Expertise in the Textile Manufacturing Industry

Qing S. Duncan is a leading authority in textiles as the president of Sun Dragon Import Inc.




text

PNI•HCM Launches TextHive.io to Improve Real-Time Workforce Scheduling

With TextHive's innovative SMS solution, employees will gain a deeper sense of clarity and understanding, creating a more harmonious and productive work environment between employees and their managers.




text

Slovenian Textile Manufacturer Equips Over Eighty American SWAT Teams

We're equipping around 80 SWAT teams in the United States, we're equipping special units in Spain and we're also equipping French special forces, and a lot of other countries.




text

SeniorMatch Introduces New Feature: Customizable Text Size for Enhanced User Experience

Personalized Vision Care to Meet the Needs of Senior Users




text

E. Sedef Dundar Celebrated for Achievements in Textile Marketing and Manufacturing

E. Sedef Dundar is the owner of Perlavera Trading, Inc.




text

Marquis Who's Who Honors Candice H. Chi for Expertise in the Field of Textiles and Bedding Products

Candice H. Chi is being honored by Marquis Who's Who




text

NinaData Unveils Revolutionary Contextual Gen AI Political Advertising Platform

NinaData is reshaping the use of contextual advertising technology in the digital political advertising landscape to reach audiences based on voter issues and sentiments in a privacy-first way.




text

US' textiles & apparel imports ease 0.8% in Jan-Sept 2024

US textile and apparel imports fell by 0.80 per cent to $80.449 billion from January to September 2024, compared to $81.094 billion in 2023. Apparel imports dropped by 2.57 per cent, while non-apparel imports rose by 4.55 per cent. China remained the top supplier, despite a 2.28 per cent decrease. Growth was seen in imports from Cambodia, Pakistan, India, and Vietnam.




text

US textiles exports dip 2.7% to $17.3 billion in Jan-Sept 2024

In the first nine months of 2024, US textile and apparel exports fell by 2.76 per cent to $17.363 billion, down from $17.856 billion in 2023. While exports to Mexico rose by 2.86 per cent, shipments to major markets like Canada, China, and the Dominican Republic declined. Apparel, fabric, and yarn exports all saw decreases. In 2023, exports fell by 5.02 per cent, following growth in 2022.




text

US textile & apparel import volume up 8.7%, export volume down 3%

US saw an 8.79 per cent increase in textile and apparel imports from January to September 2024, totalling 76,860.803 million SME compared to 70,652.999 million SME in 2023, according to OTEXA. Apparel imports rose by 2.57 per cent, while non-apparel imports increased by 11.05 per cent. Cotton product imports grew by 6.03 per cent and MMF products by 9.17 per cent.




text

India approves 12 research projects under technical textiles mission

India's Textile Minister approved 12 new research projects worth ₹13.3 crore ($0.16 million) under the National Technical Textiles Mission. The projects focus on areas like geotextiles, smart textiles, and composites, led by institutions like IITs and CRRI. Total funding under the Mission now stands at ₹509 crore ($6.11 million). IPR guidelines aim to boost innovation.




text

Semantic Web Company and Ontotext merge to rebrand as knowledge graph and AI powerhouse Graphwise

New entity unlocks ROI for enterprise AI by delivering the most comprehensive and trusted industry solution in the field of knowledge graphs and semantic AI technologies




text

Fabric Text Effect

This Photoshop tutorial explains how to use Layer Styles and two patterns to create a nice looking fabric text effect. Open the Seamless Plaid 0024 image, then go to Image -> Image Size, and type 150 in the Width (and Height) fields then click OK. Incoming search terms:How to open Seamless Plaid 0024 in photoshop?

View and Vote




text

24 Free Grunge Texture Downloads: High-Quality Images For Photoshop Editing

Hey there, fellow design enthusiasts! I've got something super cool to share with you today. You know those grungy, vintage-looking textures that make your ...




text

Handling Spelling Mistakes with Postgres Full Text Search

Background #

Postgres Full Text Search (FTS) is a great way to implement site search on a website running Postgres already, without requiring additional infrastructure.

On a recent engagement with a client, we were deciding between Postgres FTS and ElasticSearch. Ultimately we chose FTS because we could spin it up without having to add extra infrastructure, as we would with ElasticSearch.

Since the project was written in Ruby on Rails, we were able to use the excellent PgSearch gem to implement FTS in ActiveRecord.

Multisearch #

As we wanted a general site search, we needed to utilize multisearch. Multisearch combines multiple ActiveRecord models into one search 'document' table that you can search against. For example, if a user searches for some search term, and the search is configured for multisearch, then every single model that we mark as multisearchable will be searched for that term at the same time. See here for more detail.

Search Features #

PgSearch allows for different search features, tsearch, trigram, and dmetaphone. The default is tsearch, which uses the built-in Postgres Full Text Search.

This was great for our use case, since it also comes with highlighting, a feature that was required. The highlighting is from a field returned by Postgres FTS, where it returns the text around the search term for context and bolds the search terms.

Spelling Mistakes #

Unfortunately, tsearch does not handle misspelled words. However, as I mentioned before, PgSearch allows for other search features!

And trigram is a feature that can be installed via a Postgres extension (pg_trgm) that does just that.

Trigram #

  • The idea behind trigram search is to split pieces of text into sets of three-letter segments, and compare the sets to one another
  • If two trigram sets are similar enough, we assume there was a spelling mistake, and return the document with the correctly-spelled term.
  • As a quick example (ignoring whitespace): Consider the word Viget. Viget would make trigrams:
[vig, ige, get]
  • Now, consider our evil twin agency, Qiget. They would make trigrams
[qig, ige, get]
  • The two trigram sets match very closely, with only one of the trigrams not being the same. Thus, if we were to compare these with pg_trgm, we could reasonably tell that anyone typing 'Qiget' must have been actually looking for 'Viget', and just misspelled it.

Working Trigram into our existing solution #

PgSearch allows us to use multiple search features at once, so we can use tsearch and trigram side by side. Note that we cannot just replace tsearch with trigram due to needing some features in tsearch that are exclusive to it. Here is what an example configuration might look like.

PgSearch.multisearch_options = {
  using: {
    tsearch: {
      prefix: true,
      highlight: {
        MaxFragments: 1
      }
    },
    trigram: { 
      only: [:content]
    }
  }
}

Trigram (and timelines) causing issues #

While it was easy to slot Trigram into our multisearch, it caused a pretty serious performance hit. We were seeing 50x-75x slower searches with both features combined than with just tsearch. We needed to find a way to balance performance with handling misspellings

At the point that handling misspellings became prioritized, the entire search feature was almost fully QA'd and about ready to go out. There wasn't much time left in the budget to find a good solution for the issue.

This thread from the PgSearch repo sums it up pretty well – there were multiple other users that were/are having similar issues as we were. The top-rated comment in this thread is someone mentioning that the solution was to just use ElasticSearch ('top-rated' is doing a lot of heavy lifting. It did have the most likes...at two). We needed to find some sort of middle ground solution that we could act on quickly.

Postgres Documentation saves the day #

In the docs for the Trigram Postgres extension, the writers give an idea for using Trigram in conjunction with Full Text Search. The general idea is to create a separate words table that has a Trigram index on it.

Something like this worked for us. Note that we added an additional step with a temporary table. This was to allow us to filter out words that included non-alphabet characters.

execute <<-SQL
  -- Need to make a temp table so we can remove non-alphabet characters like websites
  CREATE TEMP TABLE temp_words AS
    SELECT word FROM ts_stat('SELECT to_tsvector(''simple'', content) FROM pg_search_documents');

  CREATE TABLE pg_search_words (
    id SERIAL PRIMARY KEY,
    word text
  );

  INSERT INTO pg_search_words (word)
    SELECT word
    FROM temp_words
    WHERE word ~ '^[a-zA-Z]+$';
  
  CREATE INDEX pg_words_idx ON pg_search_words USING GIN (word gin_trgm_ops);
  
  DROP TABLE temp_words;
SQL

This words table is therefore populated with every unique word that exists in your search content table. For us, this table was pretty large.

result = ActiveRecord::Base.connection.execute("SELECT COUNT(*) FROM pg_search_words").first['count']
puts result.first['count']
# => 1118644

Keeping the words table up-to-date #

As mentioned in the docs, this table is separate from your search table. Therefore, it needs to be either periodically regenerated or at least have any new words added to search content also added to this table.

One way to achieve this is with a trigger, which adds all new words (still filtering out non-alphabet characters) that are inserted into the documents table to the words table

create_trigger("pg_search_documents_after_insert_update_row_tr", generated: true, compatibility: 1)
  .on("pg_search_documents")
  .after(:insert, :update) do
  <<-SQL_ACTIONS
    CREATE TEMP TABLE temp_words AS
      SELECT word FROM ts_stat('SELECT to_tsvector(''simple'', ' || quote_literal(NEW.content) || ')');

    INSERT INTO pg_search_words (word)
      SELECT word
      FROM temp_words
      WHERE word ~ '^[a-zA-Z]+$';

    DROP TABLE temp_words;
  SQL_ACTIONS

end

Note that this does not handle records being deleted from the table – that would need to be something separate.

How we used the words table #

Assuming for simplicity the user's search term is a single word, if the search returns no results, we compare the search term's trigram set to the trigram index on the words table, and return the closest match.

Then, we'd show the closest match in a "Did you mean {correctly-spelled word}?" that hyperlinks to a search of the correctly-spelled word

Given more time, I would have liked to explore options to speed up the combined FTS and Trigram search. I'm certain we could have improved on the performance issues, but I can't say for sure that we could have gotten the search time down to a reasonable amount.

A future enhancement that would be pretty simple is to automatically search for that correctly-spelled word, removing the prompt to click the link. We could also change the text to something like "Showing results for {correctly-spelled word}".

Ultimately, I think with the situation at hand, we made the right call implementing Trigram this way. The search is just as fast as before, and now in the case of misspellings, a user just has to follow the link to the correctly-spelled word and they will see the results they wanted very quickly.





text

Integrating Image-To-Text And Text-To-Speech Models (Part 1)

Joas Pambou built an app that integrates vision language models (VLMs) and text-to-speech (TTS) AI technologies to describe images audibly with speech. This audio description tool can be a big help for people with sight challenges to understand what’s in an image. But how this does it even work? Joas explains how these AI systems work and their potential uses, including how he built the app and ways to further improve it.




text

Integrating Image-To-Text And Text-To-Speech Models (Part 2)

In the second part of this series, Joas Pambou aims to build a more advanced version of the previous application that performs conversational analyses on images or videos, much like a chatbot assistant. This means you can ask and learn more about your input content.




text

✚ Make the Chart: Scatterplot Using Text Instead of Dots

I made a chart about Halloween candy. Even dumb charts need attention and require that choices are made.

Tags: ,




text

B4: Contextual Accessibility in Institutional Web Accessibility Policies

David Sloan, Digital Media Access Group, University of Dundee and Simon Ball, Techdis will think about how we promote contextual accessibility as an institutional standard? How can we encourage web authors to use diverse solutions to optimise accessibility, while making sure that basic principles of accessible design are met?




text

Ontario, Canada Court Addresses Statutory Tort of Human Trafficking in Labour Context

  • Temporary foreign worker made a claim for damages against employer for the statutory tort of human trafficking under the Prevention of and Remedies for Human Trafficking Act.




text

France: Role of the Social and Economic Committee in the Context of a Restructuring or Downsizing

In addition to the information and consultation obligations linked to their general responsibilities,1 Social and Economic Committees (“Comité Social et Economique” or "CSE") in French workplaces, which replace and merge all the employee representative bodies, staff representatives, works council, and health, safety and working conditions committee, must be informed and consulted in the event of a “restructuring and downsizing.”2 What is their scope of intervention?

Cases Requiring Consultation




text

Supreme Court of Puerto Rico Validates Implicit Consent for Arbitration Agreements in the Employment Context

In Aponte Valentín v. Pfizer Pharmaceuticals, CC-2018-748,1 the Puerto Rico Supreme Court reinforced the strong public policy favoring arbitration agreements in Puerto Rico, validating continued employment as implicit consent for such agreements.




text

OSHA Unveils Text of Unprecedented Federal Heat Standard

  • OSHA has issued its proposed workplace heat exposure standard, which would apply to nearly all employers.
  • The proposed standard would require employers to develop a Heat Injury and Illness Prevention Plan with site-specific information to identify, monitor, and control heat hazards in their workplace, and to develop a heat emergency response plan. 




text

Brazil Data Protection Law – Litigation in the Context of Employment

  • Employers operating in Brazil will likely see an uptick in litigation involving claims filed under the country’s Data Protection Law (LGPD).
  • The Brazilian National Data Protection Agency, the entity charged with enforcing the LGPD, recently issued new guidance on this law.

The Brazilian Data Protection Law (LGPD) in effect since 2020 is starting to show its effects in the litigation landscape.




text

Context Is King: From Vulnerability Management to Exposure Management

Vulnerability management remains a cornerstone of preventive cybersecurity, but organizations still struggle with vulnerability overload and sophisticated threats. Tenable’s new Exposure Signals gives security teams comprehensive context, so they can shift from vulnerability management to exposure management and effectively prioritize high-risk exposures across their complex attack surface.

A critical vulnerability has been disclosed and attackers worldwide are actively exploiting it in the wild. Your vulnerability management team jumps into action and determines that the vulnerability is present in hundreds of your organization’s assets. Which ones do you patch first? How do you prioritize your remediation efforts? What criteria do you use? The clock is ticking. Hackers are on the prowl.

Historically, your vulnerability management team would rely on severity scores like Vulnerability Priority Rating (VPR). This is a great start, but only gives you one indicator of risk. To prioritize remediation precisely and effectively, you need to consider a variety of other criteria, such as a vulnerable asset’s type, owner, and function; the access-level and privileges on the asset; and critical attack paths into your environment.

This type of comprehensive, holistic context will let you prioritize correctly, but it can only be achieved with a different approach that goes beyond traditional vulnerability management. That approach is exposure management. 

With exposure management, your vulnerability management team would be able to pinpoint the subset of assets affected by our hypothetical vulnerability that, for example, are externally accessible, possess domain-level privileges and are part of a critical attack path. That way they would know where the greatest risk is and what they need to remediate first. Having this deep insight, context and visibility transforms the risk assessment equation, and allows your vulnerability management team to move decisively, quickly and strategically.

In this blog, we’ll outline why it’s imperative for your vulnerability management teams to shift to an exposure management mindset, and we’ll explain how Tenable can help them do it.

To pinpoint riskiest vulns, vulnerability management needs broader exposure context 

In today's evolving cybersecurity landscape, vulnerability management remains one of the foundational pieces of an organization's proactive defense strategy. However, these teams still have difficulty in addressing the increased level of risks posed by the continuous surge of Common Vulnerabilities and Exposures (CVEs) and other flaws.

Many security teams are frequently overwhelmed by the sheer volume of vulnerabilities with limited resources to manage them effectively. The sophistication and speed of threat actors has escalated, with attackers having more entry points and using new tactics, techniques and procedures to access other critical areas of the business - demonstrating that attacks are no longer linear but multifaceted.

It’s common for security teams to struggle with:

  • Vulnerability overload - This long-standing problem keeps getting worse. Security teams are finding it more difficult than ever to sift through the avalanche of CVEs and identify the areas of the business that have the most risk.
     
  •  Lack of exposure context for prioritization - Your teams are making decisions while missing layers of context. Threat intelligence and vulnerability severity are a great start, but limiting yourself to them doesn’t give you the full context you need to prioritize properly. 
     
  • Slow remediation response - Both proactive and reactive security teams devote massive amounts of time to responding to critical vulnerabilities. Resources are spread thin, making it more important than ever for teams to confidently identify the most high risk exposures when recommending remediation efforts.

Need to shift from a vulnerability to an exposure mindset

Knowing the struggles that you are dealing with today can help illuminate the benefits of exposure management. The missing links between a vulnerability and an exposure are the additional layers of context. Having multidimensional context enables you to understand not just the vulnerabilities themselves but their potential impact within the broader attack surface. This approach provides a more comprehensive view of an organization's security posture by considering factors such as threat intelligence, asset criticality, identities and access, as well as other pieces of context. With this additional information, you spend significantly less time sorting through stacks of similar vulnerabilities and you can be more focused on identifying key issues that pose risk - exposures.

For those who have never heard of exposure management or are just getting started, there are many benefits to this discipline. When it comes to Tenable’s approach, we adopt that same mentality with our exposure management platform. The goal is simple: exposure management empowers organizations to prioritize remediation efforts more effectively. It surfaces information that helps develop strategies to address not only the vulnerabilities themselves but the emergence of exposures that could lead to significant breaches.

The jump from vulnerability to exposure

Bridging the gap from vulnerability management to exposure management requires connecting context across the entire attack surface. Vulnerability management provides context that predicts the likelihood of an attack and displays key drivers, age of vulnerability and threat sources. These attributes are helpful, but we can go much further to improve our prioritization effectiveness. This requires having broader visibility and deeper insights across the attack surface to understand the bigger picture of exposures.

Specifically, security teams need additional context around:

  • Asset context - There are many levels to an asset that can help drive prioritization decisions. It’s key to understand the criticality of an asset related to its type, function, owner name and its relationships to other assets. Even knowing if the asset is accessible from the internet or not will shape how its remediation is prioritized.
     
  • Identities - Identities serve as the cornerstone for successful attacks, so it’s key to contextualize them for exposure management. Understanding user-privilege levels, entitlements and user information can help prevent attackers from gaining privilege escalation and moving laterally. Focusing prioritization efforts on vulnerable assets with domain and admin-level privileges is a critical best practice in order to reduce the likelihood of a breach.
     
  • Threat context - Having various levels of threat context is also important to prioritize exposures. We know that threats change over time, so leveraging dynamic scoring like VPR or Asset Exposure Score (AES) can show indicators of risk. We can also bring in context from attack path modeling to influence remediation decisions based on the attacker’s perspective by understanding the number of critical attack paths or choke points in your environment.

When security analysts have this additional information, they can now truly understand the breadth and depth of the exposure. This is how prioritization is done in this new world of exposure management.

Introducing Exposure Signals

To help make it easier for you to shift to this exposure management mindset, we have developed a new prioritization capability called Exposure Signals. Available in Tenable One, Tenable’s exposure management platform, Exposure Signals allows security teams to have more comprehensive context in a centralized place for a focused view of risk. 

There are two ways to use these new Exposure Signals. The first is to access a comprehensive library of high-risk, prebuilt signals. Easy to refer to, they signal potential risk in your environment and create a great starting point for you to get your exposure management juices flowing. For example, you can easily see and refer to: 

  • Domain admin group on internet-exposed hosts with critical vulnerabilities
  • Devices exposed to the internet via RDP with an associated identity account with a compromised password
  • Cloud assets with critical severity findings and asset exposure score above 700

Exposure Signals allow you to track the number of violations that signal high-risk scenarios in your environment. View this list on a regular basis to see how it changes over time with its unique trendline. Take exploration into your own hands by viewing the impacted asset and its contextual intelligence in our Inventory Module. 

The second way to use Exposure Signals is by creating your own signals using a query builder or natural language processing (NLP) search powered by ExposureAI. That way, you can go as broad or as precise as needed. For example, let’s say there is a new zero day vulnerability that sweeps the industry, similar to Log4Shell. You can easily create a signal to target which assets have the vulnerability, are internet facing and have domain admin-level privileges. We are stringing these components together so that you can understand your true risk and better direct your prioritization efforts.

To learn more about Tenable One and Exposure Signals, check out our interactive demo:




text

Donner dinner party : a pioneer tale / text and illustrations, Nathan Hale.

The Donner Party expedition is one of the most notorious stories in all of American history. It's also a fascinating snapshot of the westward expansion of the United States, and the families and individuals who sacrificed so much to build new lives in a largely unknown landscape. From the preparation for the journey to each disastrous leg of the trip, this book shows the specific bad decisions that led to the party's predicament in the Sierra Nevada Mountains. The graphic novel focuses on the struggles of the Reed family to tell the true story of the catastrophic journey.




text

Re-imagining Africa’s food security within the context of climate change and ecological sustainability

Re-imagining Africa’s food security within the context of climate change and ecological sustainability

This press-release was initially published by WWF on December 12, 2023.  WWF, the Alliance of Bioversity International and CIAT, IFPRI, CGIAR, and AfDB have released a new report to help African countries to achieve food security and implement climate and nature commitments. The report is based on a joint study, executed with the technical support […]

The post Re-imagining Africa’s food security within the context of climate change and ecological sustainability appeared first on IFPRI.





text

University of Toronto-led research suggests some major changes to geology textbooks

Toronto, ON – Super-computer modelling of Earth’s crust and upper-mantle suggests that ancient geologic events may have left deep ‘scars’ that can come to life to play a role in earthquakes, mountain formation, and other ongoing processes on our planet. This changes the widespread view that only interactions at the boundaries between continent-sized tectonic plates […]




text

Lets Go Fly a Kite Hand Textured Giclee on Canvas

Lets Go Fly a Kite Hand Textured Giclee on Canvas by Harrison Ellenshaw is a(n) Limited Edition. The Edition is Limited to Limited Edition of 95 pcs




text

Something's Watching Us Deluxe Limited Edition on Hand-Textured Canvas

Something's Watching Us Deluxe Limited Edition on Hand-Textured Canvas by Daniel Arriaga is a(n) Limited Edition. The Edition is Limited to Limited Edition of 95 pcs




text

Something's Watching Us Petite Limited Edition on Hand-Textured Canvas

Something's Watching Us Petite Limited Edition on Hand-Textured Canvas by Daniel Arriaga is a(n) Limited Edition. The Edition is Limited to Limited Edition of 95 pcs




text

Textron Nabs $394 Million Mod For Nine More SSC Landing Craft

The Navy on Nov. 8 awarded Textron Systems [TXT] a $394 million modification to build nine more Ship to Shore Connectors (SSC) hovercraft. The SSCs are 100-class Landing Craft Air […]




text

Nov 17 - New Applications of Textbooks and Syllabuses

East Tokyo ETJ (ETJ East Tokyo (English Teachers in Japan)). November 17 (Sun), 14:00-16:00 in Tokyo. Tomoko Kikuchi.




text

Episode 214: Grant Ingersoll on his book, Taming Text

Grant Ingersoll, founder and CTO of LucidWorks, talks with Tobias Kaatz about his book Taming Text: How to Find, Organize, and Manipulate It. They begin by discussing popular existing systems for the automated understanding of contextual information. One such system, IBM Watson, drew attention for its victory in the “Jeopardy” game show. They proceed to […]




text

Nassau Candy unveils new packaging; text and graphics emphasize chocolate

Each package features text and graphic elements in a rich brown to reflect the brand’s long tradition of premium chocolate paired with modern colors like lime, light yellow, teal, peach, and purple.





text

Security issue in the TX Text Control .NET Server for ASP.NET.

Posted by Filip Palian on Nov 12

Hej,

Let's keep it short ...

=====

Intro

=====

A "sudo make me a sandwich" security issue has been identified in the TX
Text

Control .NET Server for ASP.NET[1].

According to the vendor[2], "the most powerful, MS Word compatible document

editor that runs in all browsers".

Likely all versions are affected however, it was not confirmed.

=====

Issue

=====

It was possible to change the configured system path for...





text

GSTR-RQ- Roadmap for QoS and QoE in the ITU-T Study Group 12 context

GSTR-RQ- Roadmap for QoS and QoE in the ITU-T Study Group 12 context




text

[ G.Sup66 (10/18) ] - 5G wireless fronthaul requirements in a passive optical network context

5G wireless fronthaul requirements in a passive optical network context




text

[ G.Sup66 (07/19) ] - 5G wireless fronthaul requirements in a passive optical network context

5G wireless fronthaul requirements in a passive optical network context




text

[ V.150.1 (2003) Amendment 1 (01/05) ] - Modification to SSE reason identifier codes to support voice band data and text relay

Modification to SSE reason identifier codes to support voice band data and text relay




text

[ V.18 (09/94) ] - Operational and interworking requirements for modems operating in the text telephone mode

Operational and interworking requirements for modems operating in the text telephone mode




text

[ V.151 (05/06) ] - Procedures for the end-to-end connection of analogue PSTN text telephones over an IP network utilizing text relay

Procedures for the end-to-end connection of analogue PSTN text telephones over an IP network utilizing text relay




text

Eventually consistent plain text accounting

Comments





text

The Last-Mile Challenges?in Speech-to-Text

You need speech-to-text outputs that are reliable for business use, not just technically accurate.




text

Context identifies new AVIVORE threat group behind recent aerospace supply chain cyber attacks

The Threat Intelligence and Incident Response Team at Context Information Security has identified a new threat group behind a series of incidents targeted at the aerospace and defence industries in the UK and Europe.