How the Brain Aids Recovery After a Heart Attack: Understanding Its Vital Role

ECG trace and brain MRI scan artwork

Brain Response Post Heart Attack

Science Photo Library / Alamy

Following a heart attack, the brain processes signals directly from sensory neurons in the heart, indicating a crucial feedback loop that involves not only the brain but also the immune system—both vital for effective recovery.

According to Vineet Augustine from the University of California, San Diego, “The body and brain are interconnected; there is significant communication among organ systems, the nervous system, and the immune system.”

Building on previous research demonstrating that the heart and brain communicate through blood pressure and cardiac sensory neurons, Augustine and his team sought to explore the role of nerves in the heart attack response. They utilized a groundbreaking technique to make mouse hearts transparent, enabling them to observe nerve activity during induced heart attacks by cutting off blood flow.

The study revealed novel clusters of sensory neurons that extend from the vagus nerve and tightly encompass the ventricles, particularly in areas damaged by lack of blood flow. Interestingly, while few nerve fibers existed prior to the heart attack, their numbers surged significantly post-incident, suggesting that the heart stimulates the growth of these neurons during recovery.

In a key experiment, Augustine’s team selectively turned off these nerves, which halted signaling to the brain, resulting in significantly smaller damaged areas in the heart. “The recovery is truly remarkable,” Augustine noted.

Patients recovering from a heart attack often require surgical interventions to restore vital blood flow and minimize further tissue damage. However, the discovery of these new neurons could pave the way for future medications, particularly in scenarios where immediate surgery is impractical.

Furthermore, the signals from these neurons activated brain regions associated with the stress response, triggering the immune system to direct its cells to the heart. While these immune cells help form scar tissue necessary for repairing damaged muscle, excessive scarring can compromise heart function and lead to heart failure. Augustine and colleagues identified alternative methods to facilitate healing in mice post-heart attack by effectively blocking this immune response early on.

Recent decades have indicated that communication occurs between the heart, brain, and immune system during a heart attack. The difference now is that researchers possess advanced tools to analyze changes at the neuron level. Matthew Kay from George Washington University noted, “This presents an intriguing opportunity for developing new treatments for heart attack patients, potentially including gene therapy.”

Current medical practices frequently include beta-blockers to assist in the healing process following heart attack-induced tissue damage. These findings clarify the mechanism by which beta-blockers influence the feedback loops within nervous and immune systems activated during heart attacks.

As Robin Choudhury from the University of Oxford remarked, “We might have already intervened with the newly discovered routes.” Nevertheless, he cautioned that this pathway likely interacts with various other immune signals and cells that remain not fully understood.

Moreover, factors like genetics, gender differences, and conditions such as diabetes or hypertension could affect the evolution of this newly identified response. Hence, determining when and if a pathway is active in a wider population remains essential before crafting targeted drugs, Choudhury added.

Topics:

Source: www.newscientist.com

Ukraine’s Drone Attack System Dubbed a ‘Virus’ for Its Game-Like Precision

A drone attack system resembling a computer game is “rapidly spreading” within Ukrainian military units and is being expanded to cover reconnaissance, artillery, and logistics operations, as reported by Mykhailo Fedorov, the country’s first deputy prime minister, to the Guardian.

In September, drone teams competing under the Drone Corps Bonus System were credited with killing or injuring 18,000 Russian soldiers, with participation growing from 95 to 400 drone squads within one month, according to Ukrainian officials.

This system, initiated over a year ago, rewards soldiers for successful strikes by awarding points that can be exchanged for additional weapons from an online store dubbed Brave1, which features over 100 types of drones, self-driving vehicles, and various drone warfare equipment. Teams with creative names such as Achilles and Phoenix currently lead the scoreboard.




Brave1 online store. Photo: https://market-brave1.delta.mil.gov.ua/katalog/filter/icons=11;page=3;presence=1/

Fedorov noted that the system has gained “tremendous popularity among troops” and exemplifies the growing automation in combat. “The Defense Forces are all aware, and there’s a competition for points to acquire drones, electronic warfare systems, and other equipment that enhances combat effectiveness. The more infantry you take down, the more drones can eliminate additional infantry. It’s becoming a self-sustaining cycle.”

Russian casualties in September were reported to be double those of the previous October, partly due to the Ukrainian government increasing the points awarded for killing Russian infantry from six to twelve, highlighting shifting battlefield priorities.

Ukrainian intelligence suggests that Russia might be developing its own version of this gamification approach. Additionally, Ukraine is expanding the Destroy Points concept to artillery units, providing them with success points that can be used to acquire new armaments. Reconnaissance teams are also earning points for identifying enemy targets, while logistics units are beginning to gain points for utilizing self-driving vehicles in front-line resupply efforts.

Fedorov disclosed that the Ukrainian military is promoting the use of drones partially directed by artificial intelligence, enhancing target selection and controlling the final moments of the drones’ trajectory to boost attack precision.

Scouts accumulate points through a system dubbed “Uber targeting,” reminiscent of the global ride-hailing app.

“Essentially, you drop a pin on a map similar to requesting a ride on an Uber app, but in this case, a drone from a different unit engages the target,” he explained.

Despite the point-based system’s expansion, there are warnings that over-reliance on drone warfare may not be a model for NATO countries to emulate, as Russian defenses against such aerial attacks have become significantly robust. Experts from the Royal United Services Institute have recently highlighted the need for renewed focus on conventional artillery and air support.

In addition to raising the points for infantry kills to align with Russia’s increased deployment of infantry, killing an enemy drone operator grants 25 points, while capturing a Russian soldier with a drone nets 120 points, reflecting Ukraine’s need for prisoners of war for potential exchanges. Although these point values have received official approval, Fedorov mentioned they have become “almost devoid of emotion” in assigning value to human life.

“We’ve been engaged in a war for four consecutive years and it’s been challenging,” he stated. “We aim to enhance effectiveness. We perceive this as part of our regular operations. It’s largely devoid of emotional contemplation. It resembles technical work because if we don’t halt the enemy, they will kill military personnel, and once that happens, they will come for civilians—conquering, destroying, and killing.”

Ukrainian drone operators may be positioned as close as 250 meters to the front lines or as far as three kilometers away, often concealed behind computer screens while directing assaults, sometimes utilizing video game controllers. Achilles is recognized as one of the top 10 successful drone regiments, operating in the eastern Kharkiv and Donetsk regions. Commander Yuri Fedorenko noted that the most effective pilots are not necessarily those skilled in video games.

“The best pilots are those with discipline,” he remarked. “Younger individuals may be able to stay awake longer and require less recovery time, but discipline is the hallmark of a good drone operator.”

He also downplayed the notion that this initiative amounts to the “gamification” of warfare, stating that directives are sometimes issued to target low-point objectives to meet immediate combat needs.

“This is war, so our primary focus must be on completing the mission,” he said. “That’s our priority, not chasing points.”

“There’s competition across the unit. Drone operators are in competition with one another. Groups of drone operators compete against other groups. Even the highest-ranking commanders engage in competition,” explained Andrii Poltolatskyi, another commander in the drone unit.

He characterized it more as a constructive competition than a playful one, noting that when Russia initiates an attack, “the competition ceases and everyone… collaborates towards the goal of protecting Ukrainian lives, irrespective of the points involved.”

Fedorov stated that the scoring system has provided valuable data, enhancing Ukraine’s “understanding of the mathematics of war.”

“Thanks to the points, we are beginning to comprehend the realities of the battlefield,” he mentioned. “To earn points, [drone units] must submit a verification video. This way, we gain insights into the targets being engaged, their locations relative to the contact line, and the drones and other assets being utilized.

“This enables us to evaluate what strategies are proving effective and which are not. The leaderboard encourages units to learn from each other. Leaders are beginning to mentor and cultivate emerging talent… Innovation emerges from the ground up.”

Source: www.theguardian.com

Stem Cell Therapy Lowers Heart Failure Risk Following Heart Attack

Mesenchymal stem cells tagged with fluorescent markers

Vusivkova/Shutterstock

The largest trial conducted so far indicated that individuals who received a stem cell infusion right after a heart attack had a lower risk of developing heart failure compared to those who underwent standard treatment. This finding offers compelling evidence that stem cells may aid in the heart’s self-repair mechanisms.

Following a heart attack, the heart muscle sustains permanent damage and weakness, rendering the organ unable to adequately pump blood to meet the body’s needs, frequently resulting in heart failure. Presently, the only available treatments are heart transplants or pumps that can restore heart function.

To explore solutions, researchers turned to stem cells, which possess the remarkable capability to transform into various cell types. Nonetheless, prior studies evaluating their application post-heart attack have yielded inconsistent results. A 2020 study with 375 participants showed that bone marrow-derived cells, which include stem cells that evolve into blood cells, did not notably decrease mortality compared to standard therapies such as cardiac rehabilitation and medications aimed at lowering blood pressure, preventing blood clots, and managing cholesterol levels.

Armin Attar and colleagues from Shiraz University in Iran explored a different strategy. They employed mesenchymal stem cells capable of differentiating into structural cells such as cartilage and adipose tissue. These stem cells are also known to release substances that mitigate inflammation and promote tissue regeneration.

The researchers collected mesenchymal stem cells from umbilical cord blood and administered them into the hearts of 136 patients within three to seven days following their first heart attack. While these stem cells can also be extracted from the individual’s own adipose or bone tissue, the cultivation process can take up to a month. By utilizing umbilical cord blood samples, the team can provide treatments more swiftly and potentially enhance their efficacy, Attar explained. Another group of 260 participants received standard post-heart attack treatments.

After three years, individuals who received the stem cell therapy were, on average, 57% less likely to develop heart failure and 78% less likely to be hospitalized for heart failure compared to those receiving standard treatment. Furthermore, they exhibited significant improvements in cardiac function, suggesting that the therapy aids in the regeneration of heart tissue post-injury.

“This represents a significant advancement,” Attar remarked. Although the therapy did not lower mortality risk during the study period, the reduction in hospitalizations is still significant, according to Hina Chowdhury from the Icahn School of Medicine at Mount Sinai in New York. “Heart failure is the predominant cause of hospital admissions in the U.S.,” she pointed out.

However, it should be noted that 80% of participants were male, leading Chaudhry to caution that it is uncertain how the therapy would affect women, who are more prone to heart failure post-heart attack. Attar’s team did not observe any gender differences in a separate analysis. This study was also restricted to young adults, with all participants aged between 18 and 65. “It’s beneficial to see distinctions among age groups, as younger individuals typically have enhanced regenerative abilities and recover better from cardiac injuries,” Chaudhry noted.

This research provides the most robust evidence to date that stem cells can aid in restoring heart function post-heart attack. Nevertheless, this treatment does not fully heal the heart. “There is no medication or treatment that can replace lost heart muscle cells,” Chaudhry emphasized. Still, she added, “This ongoing work is expanding our understanding of the heart’s regeneration process and how to achieve it.”

Topics:

Source: www.newscientist.com

Massive Attack Withdraws Music from Spotify to Protest CEO Daniel Ek’s AI Army Investment

The significant move was the latest part of founder Daniel Ek’s strategy to withdraw catalogs from Spotify in protest against his €600 million (£520 million) investment in military AI company Helsing.

In June, Ek’s venture capital firm, Prima Materia, spearheaded a funding round for the defense tech firm. Helsing’s software leverages AI to analyze battlefield sensor and weapon system data, facilitating real-time military decision-making. Additionally, they plan to develop their own military drone, the HX-2. Ek also serves as chairman of Helsing.

The band has announced their participation in Music for Genocide, a new initiative where over 400 artists and record labels are removing their music from Israeli streaming platforms.

In a statement, the band expressed:

In light of the substantial investments made by CEOs in companies unrelated to the initiative and engaged in producing military drones and AI technologies for fighter jets, the band has made separate requests to labels to remove their music from Spotify across all regions.

We believe that the historical effectiveness of artists’ actions during apartheid in South Africa serves as a precedent for addressing the war crimes and genocide currently perpetrated by the state of Israel, which underscores the moral duties of artists.

Moreover, the financial strain on artists has now combined with moral and ethical burdens, ultimately affecting the hard-earned income of fans and the creative endeavors of musicians.

Enough is enough.

Alternative methods must be explored.

になったんです。 English: The first thing you can do is to find the best one to do. A spokesperson for Spotify stated, “Spotify and Helsing are entirely separate entities.”

They further clarified that Helsing “has no involvement in Gaza” and that their operations “are focused on protecting Europe against threats from Ukraine.”

In a statement, Helsing asserted, “Currently, Helsing’s technology is not deployed in war zones outside of Ukraine, which is misleading.”

“Our technology is utilized in European countries for deterrence and to defend against Russian assaults on Ukraine.”

Australian psych-rock group King Gizzard and Canadian post-rock band Godspeed You! Black Emperor, alongside US alternative acts Deerhoof and Manchester’s Wu Lyf, have also joined in this effort.

In contrast to these bands, large-scale attacks cannot showcase their music on popular platforms like Bandcamp. After transitioning to Bandcamp, King Gizzard’s extensive catalog filled the top 27 spots on the site.

The No No Music for Genocide initiative features artists such as MJ Lenderman, Amyl and the Sniffers, Rina Sawayama, Jockstrap, Keiyaa, John Glacier, Erika de Casier, Smerz, and Wednesday. These artists have either modified their release territories or requested geo-blocking for their music.

Massive Attack has amplified their message through Instagram posts.

In 1991, the tragedy of apartheid violence in South Africa was alleviated from a distance through public boycotts, protests, and artists withdrawing their work. Complicity with such a regime was deemed unacceptable. The same principle applies to the state of Israeli atrocities in 2025. Many musicians are responding to the recently launched @Filmworkers4Palestine campaign, endorsed by 4,500 filmmakers, actors, industry workers, and institutions, supporting issues from @bds.movement, @NomusicForGenocide, and more. We urge all musicians to convert their grief, anger, and artistic contributions into consistent, rational, and impactful actions, aiming to end the suffering imposed on Palestinians for far too long.

Massive Attack, alongside Brian Eno, kNeecap, and Fontaine DC, have established a coalition of artists advocating for Palestinian rights, defending musicians against the threat of silence or the risk of career setbacks enforced by organizations such as the Israeli UK Lawfare Institute (UKLFI), which reportedly led Bob Billan in a controversial performance.

This coalition informed The Guardian: “This unified action aims to provide solidarity to artists who endure daily in the face of genocide, yet are apprehensive about using their platforms to voice their concerns due to the pervasive censorship in the industry and highly organized external legal pressures.”

Source: www.theguardian.com

Jaguar Land Rover Prolongs Production Halt Following Cyber Attack

Jaguar Land Rover has announced a further extension of its car production shutdown as the UK’s largest car manufacturer deals with the repercussions of a cyberattack.

On Tuesday, JLR confirmed it would halt production at least until Wednesday, September 24th, as it continues to investigate the initial breach detected earlier this month.

The company mentioned: “As the forensic investigation into the cyber incident progresses, this decision has been taken. The investigation is proving to be time-intensive, considering the various stages involved in a controlled restart of global operations.”


“We deeply regret the ongoing disruption this incident is causing. We will provide updates as the investigation unfolds.”

Owned by India’s TATA Group, JLR has halted production after learning that hackers had breached their system several weeks ago.

The company revealed that the attack has impacted “some data,” but is unable to disclose specifics about which data was compromised or whether customer or supplier information has been stolen, though they will reach out to impacted individuals.

With production paused at factories in Midland and Merseyside, JLR faces significant financial implications due to the cyberattack. Other production sites globally are also feeling the effects, raising concerns that restoring operations may take weeks.

The shutdown is affecting JLR’s suppliers and retailers, who are operating without access to the databases usually utilized for sourcing spare parts for garages and registered vehicles.

Recently, the Unite Union warned that thousands of workers within the JLR supply chain may face job losses and urged the government to implement a furlough plan to support them.

The impact of the cyberattacks may persist into October, with thousands of JLR production employees instructed to stay home, suggesting that many suppliers might also need to keep their staff off-site.

Skip past newsletter promotions

Due to the shutdown, JLR estimates it has lost the production of 1,000 cars daily, resulting in an estimated loss of £72 million each day.

A group of hackers, believed to be responsible for other serious incidents involving major retailers such as Marks & Spencer, has claimed responsibility for the attacks on JLR. A screenshot purportedly from JLR’s internal IT system was shared on a Telegram channel associated with the hacker groups known as Scattered Spiders, Lapsus$, and Shiny Hunters.

This disruption comes at a time when JLR is already experiencing a downturn in profits, exacerbated by US tariffs and declining sales. The automaker reported a 49% drop in pre-tax profits to £351 million for the three months ending in June, which included a time when they temporarily halted exports to the US.

Last year, the company faced backlash regarding the Jaguar brand, and the launch of its new electric vehicle has been pushed back to next year.

Source: www.theguardian.com

Will You Face a Cyber Attack? 7 Essential Protection Tips | Consumer Concerns

Keep an eye on your inbox

Cyberattack notifications flood our inboxes weekly, sparking concern over the personal data that may have been compromised.

Recently, Adidas disclosed that some personal information of customers was breached, including passwords and credit card details, although their payment data was secure.

Another incident involved unauthorized access to personal data of thousands of legal aid applicants from England and Wales, dating back to 2010, which followed significant disruptions caused by a cyberattack on Marks & Spencer.

If you see news about a cybersecurity incident affecting a company you’ve interacted with, stay vigilant regarding your email. Companies typically reach out to affected customers with details on what occurred and suggested actions.

Sometimes, only specific customer segments or users from particular regions may be impacted.

In Adidas’ case, it appears that those who contacted customer service recently are primarily affected, which may exclude many others. Occasionally, communication will confirm that you are unaffected.

If your information could be compromised, you’ll usually receive guidance on corrective measures or a link to a FAQs page. In some instances, firms may offer free access to support services from cybersecurity experts or credit monitoring.

In Adidas’ case, it seems to affect customers who contacted the service desk previously. Photo: Odd Andersen/AFP/Getty Images

Change Your Password

If you’ve conducted transactions with an organization that faced a cyber incident, change your password for that account immediately.

Ensure your password is robust and not used across multiple accounts.

Experts recommend creating passwords that are at least 12 characters long, including a mix of numbers, capital and lowercase letters, and symbols. Avoid easily guessed information like pet names, birthdays, or favorite teams.

“A great strategy to enhance password security is to combine three random words into one.” says the National Cybersecurity Centre in the UK. For example, consider something like Hippo! PizzaRocket1.

“Consider using a password manager to generate and securely store unique, strong passwords,” advises online security firm Nordvpn.

Utilize Two-Step Authentication

Two-step verification adds an extra security layer to your email and other key online accounts.

This generally involves receiving a code via the Authenticator app or sent to your registered mobile number to grant access.

Enable two-step verification on all services that provide this feature.

The second factor may include codes sent via SMS. Photo: Prostock-Studio/Alamy

Beware of Unsolicited Emails

Phishing emails often cite recent cyber events to lure unsuspecting targets who may be customers of the affected company.

Scammers might leverage personal information they’ve acquired to appear credible.

Avoid clicking on any link or attachment in emails, text messages, or social media posts unless you’re entirely certain of their legitimacy. These links can lead to phishing sites or include malware designed to steal your identity.

M&S advises potentially impacted customers that they “may receive emails, calls, or texts that appear to be from us.” “We will never reach out for your personal account details, such as your username or password.”

If an email claims to be from a business you interact with and you’re uncertain of its authenticity, ignore it or verify it through official contact channels.

Be cautious about links or attachments in emails unless you are completely sure they are legitimate. Photo: Tero Vesalainen/Alamy

Monitor Your Credit Record

If your personal data has been compromised, keep an eye on your credit report, which details your financial history and is used by lenders to judge your creditworthiness, in case someone attempts to open accounts in your name.

For instance, if a financial entity endures a cyber breach, the accessed data could include sensitive information such as your name, address, national insurance number, date of birth, bank account details, salary, and potentially your passport.

This information can be misused for identity fraud.

In the UK, the main credit reference agencies are Equifax, Experian, and Transunion, all providing various options to check your credit report for free or via subscription.

Credit Karma and Clear Score offer free lifetime access to your credit reports.

Experian provides an ID monitoring service, which checks your personal, financial, and credit information for suspicious activity. It’s a paid service, but if your data becomes compromised, they may cover the costs.

Be cautious if you suddenly find your applications for credit cards or loans being denied, or if you cease receiving bank statements for no clear reason despite a healthy credit score, as it may indicate identity theft.

More significantly, you may start receiving letters regarding debts that are not yours, or seeing transactions on your bank statements for items you didn’t purchase.

Many instances of financial fraud begin on social media and tech platforms, so remain vigilant, as scammers may possess details about you that can lend credibility to their deception.


The so-called “High Mama” scams have risen in recent years, where scammers impersonate relatives on platforms like WhatsApp, often pleading for urgent money transfers upon claiming to be locked out of their online banking.

Even with a sense of urgency, take the necessary time to verify the identity of anyone requesting funds.

Opt Out of Registration

When shopping online, retailers frequently prompt you to save payment card details for quicker checkout, but this may store your information with third-party services rather than just the retailer.

If you can avoid storing payment details across multiple sites, you reduce the risk of unauthorized access to your card information.

Source: www.theguardian.com

Protecting Your Data Post-Cyber Attack: Essential Strategies Against Cybercrime

A new cyberattack has made headlines, compromising personal information from hundreds of thousands of legal assistance applicants in the UK and Wales.

Following the recent cyber incidents that severely impacted Marks & Spencer and co-ops, reminders are circulating about the increased risk of suspicious activities.

If you’re concerned that your data may have been exposed, here are some tips to help safeguard yourself.

Update Your Password – Ensure It’s Strong

Always ensure you use a strong password and avoid reusing passwords across multiple accounts.

If you’ve interacted with a company or organization that has suffered a cyberattack, promptly change the password for that particular website or app.

“Consider using a password manager to create and securely store strong, unique passwords,” suggests the online security firm Nordvpn.

Two-factor authentication (2FA) adds an extra layer of security to your critical accounts by requiring a code sent via text or email for access. Be sure to enable 2FA on all services that offer it.

Exercise Caution with Unsolicited Emails, Calls, and Messages

Avoid clicking on links or attachments in unsolicited emails, texts, or social media messages, as they may lead to phishing sites or contain malware designed to steal your identity.

Phishing scams often leverage current events, like cyberattacks, to lure unsuspecting customers into providing sensitive information.

Scammers might possess personal details they obtained through breaches, making their communications seem more credible.

If someone claims to represent a company you use, verify their identity by ignoring their contact and checking official contact details instead.

Monitor Your Credit Report

In case your personal data gets compromised, regularly monitoring your credit report is crucial to detect any fraudulent attempts to create loans or acquire other products in your name. Several Credit Reference Institutions offer access, both free and paid.

We recommend checking your credit report periodically. You can access your credit data through the Credit Committee.

Credit Karma and Clear Score both provide free access to your credit report.

Be vigilant for signs of identity theft, such as being denied financial products unexpectedly or not receiving bank statements despite having a good credit rating. Additionally, receiving collection letters for debts you didn’t incur or items on your bank statement that you didn’t buy are clear red flags.

Most financial fraud is said to begin on social media and technology platforms. Remain cautious, as scammers may have enough information to impersonate someone you know.

The rise of “Hi Mom” scams, where criminals pretend to be relatives asking for urgent financial assistance via messaging apps like WhatsApp, has surged in recent years.

Even under pressure, take your time to verify the identity of anyone requesting money, ensuring you’re truly communicating with your loved ones.

Safeguard Your Devices

Keep your laptops and devices updated by ensuring they receive the latest software and security patches.

Only use official app stores and software update services for your downloads.

Source: www.theguardian.com

Drug developed by Eli Lilly decreases presence of mysterious LP(A) particles related to heart attack risk

One in five people (an estimated 64 million people in the US) has increased levels of small particles in their blood. It can significantly increase the risk of heart attacks and strokes.

But few people knew about it and there was not much to do, so little doctors would have checked it. Dieting is useless. I don’t even exercise. There were no medicines.

But that may change in the near future.

On Sunday, the cardiologist announced that the experimental drug created by Eli Lily of Repodisilan can lower particle levels by 94% with a single injection. The effect lasted for 6 months and there were no serious side effects.

However, it has not yet been confirmed that lowering LP(a) levels reduces the risk of heart attacks and strokes. It awaits a massive clinical trial currently underway.

Lily’s research was presented on Sunday at the American Society of Cardiology’s Annual Meeting and was presented simultaneously Published New England Journal of Medicine. At least four companies are also testing innovative drugs that block the production of the body of LP(A) and the mixing of lipids and proteins.

Dr. David Maron, a preventive cardiologist at Stanford University who is not involved in Lily’s research, said evidence of a severe and long-term reduction in lipoprotein levels by repodisilans is “thrilling.”

Dr. Martha Gulati, a preventive psychologist at Cedars-Sinai Medical Center, was also not involved in the exam, saying the study was “really elegant.”

Eli Lilly is currently conducting large clinical trials asking whether the drug can prevent heart attacks, strokes or cardiovascular death. It will end in 2029. Clinical trials of other drugs targeting LP(a) end more quickly. The first is a study of Novartis drugs that are injected monthly, with results expected in 2026.

However, cardiologists warn that there is no guarantee that medicine will protect people. They remember too well the lessons they learned, assuming that changing risk factors could change risk. Cardiologists were once keen on drugs that raise HDL levels known as “good cholesterol.” People with naturally higher HDL levels had a lower incidence of heart disease. These HDL raming drugs did not help.

Dr. Daniel Rader, a preventive psychologist at the University of Pennsylvania Perelman School of Medicine, says LP(A)-lowering “is a huge new frontier in cardiovascular medicine.” Dr. Radar is a member of Novartis’ Scientific Advisory Committee and has written editorials to accompany new papers.

Treatments targeting LP(a) took a long time.

Lipoprotein was identified as a in 1974 Risk factors for heart disease This is controlled by genes rather than lifestyle or environment.

People with slightly higher than normal LP(a) levels have an approximately 25% increase in their risk of heart attacks and stroke. And very high levels can double the risk, as seen in 10% of the population.

Cardiologists say patients with no obvious reason for heart attacks or stroke (with normal cholesterol levels and blood pressure and not smoking) often know that their LP levels are high. Usually, it is found that they have a family history of heart disease of unknown cause.

The same applies to people who are experiencing heart attacks at a young age, says Dr. Stephen Nissen, a preventive psychologist at Cleveland Clinic, is an academic leader in the Lilly drug trials, and for clinical trials of three other new drugs.

“If you go to the coronary care unit and see a 40-year-old with an acute myocardial infarction, you need to know your LP(a) level,” he said, referring to a heart attack. Often they said their levels were 250 nanomoles or even higher per liter. The normal limit is 75.

Dr. Maron said his clinic is full of people who don’t know why they developed heart disease until they learn that they have high levels of LP.

One is Montewood, a 71-year-old retired firefighter who lives in Reading, California. His LDL cholesterol levels rose to moderately. His blood pressure was normal. He didn’t smoke. However, he had his first heart attack in 2006 while taking cholesterol-lowering statins.

It appeared that almost all of Mr. Kisae’s family had died of heart disease.

His paternal grandmother had her first heart attack when she was in her 40s. She died of a heart attack at the age of 63. His father and his father’s brother died of heart disease. Mr. Kisae’s brother died of a heart attack.

When Dr. Maron tested Wood’s LP level, it was above 400.

Dr. Maron and other preventive psychologists say they regularly test LP(a) levels in all patients, like Dr. Grati, Dr. Nissen and Dr. Radar. Because LP(a) levels are gene-controlled, patients should only test once.

Dr. Nissen is dull with LP(a) patients.

“We say: You have a disability that has serious meaning. I want to take all the risk factors you’ve been off the table,” he said.

But Dr. Grati said that a study found it. 0.3% The US population is receiving insurance-paid LP(a) tests, with only 3% of heart disease patients being tested.

She and other preventive cardiologists say that all adults should take the LP(a) test. If the level is high, your doctor should actively treat all other risk factors.

For Kisei, it meant taking Repatha, a powerful cholesterol-lowering drug that lowered his LDL cholesterol levels to 30.

However, Mr. Kisae’s case did not end there. Dr. Maron led one of the new drugs that lower LP(a) levels to clinical trial testing.

During the exam, Kisae had no symptoms of heart disease. I had no chest pain or shortness of breath. When the exam was finished, his symptoms returned, leading to a square bypass operation.

“It’s anecdotal,” Dr. Maron said. “But these drugs can prevent heart attacks.”

Source: www.nytimes.com

Bronze Age Briton Experiences Brutal Attack and Cannibalism

New research has revealed that during the early Bronze Age in England, at least 37 people may have been “systematically dismembered” and eaten in the aftermath of “extremely violent” attacks.

The study, published in the journal ancient, revealed that more than 3,000 bones were excavated from a 50-foot hole at Charterhouse Warren in southwest England.

The bones, which were first discovered in the 1970s by cave explorers, showed an “abundance of cut marks,” prompting researchers to conduct further analysis.

Lead author Rick Schulting, a professor of scientific and prehistoric archeology at the University of Oxford, described the violence inflicted on the bodies as exceptional, with victims being killed with blows to the head, systematically dismembered, skinned, and crushed.

The study suggests that this extreme violence likely occurred in a single event between 2210 BC and 2010 BC, making it a unique example of violence in early Bronze Age Britain.

An example of cranial trauma in a Bronze Age skull recovered from Charterhouse Warren.
Antiquity Publications Ltd / Cambridge University Press

This act of violence was likely not isolated and may have sparked a cycle of revenge within and between communities in the Early Bronze Age, according to Mr. Schulting.

The motives behind such attacks are difficult to determine, but the study suggests that tensions may have escalated from accusations of theft and witchcraft, leading to an uncontrollable spiral of violence.

Victims may have been eaten to dehumanize and treat them like animals, involving a large number of aggressors based on the number of victims and the dismemberment process, the study noted.

The bones were found alongside animal fossils, indicating early evidence of slaughter, which the researchers believe was driven by hunger as the attackers had access to plenty of food.

Source: www.nbcnews.com

Chinese tech company promises to combat online hate speech following knife attack

Chinese internet companies have made a commitment to combat “extreme nationalism” online, specifically targeting anti-Japanese sentiment. This decision comes after a tragic incident in Suzhou, where a Chinese woman lost her life while trying to protect a Japanese mother and child.

The leading companies Tencent and NetEase have stated that they will actively investigate and ban users who promote hatred and incite conflict.

A spokesperson for Tencent, the operator of messaging app WeChat, mentioned that the incident in Jiangsu province has garnered significant public attention, with some internet users fueling tensions between China and Japan, leading to a surge in extreme nationalism.

Following the arrest of an unemployed man for the stabbing incident, which resulted in the death of the Chinese woman who intervened, there has been a mix of reactions online ranging from celebrating heroism to expressing nationalistic sentiments.

Social media platforms like Weibo and Douyin have highlighted the presence of extreme nationalistic and xenophobic content and are actively working to address these issues. This move marks a significant shift as such sentiments have been prevalent on China’s internet with minimal intervention.

In the wake of the Suzhou tragedy, online users have drawn parallels between xenophobic content online and real-world violence, emphasizing the need for regulation to prevent further incidents. Internet companies have reported removing a substantial amount of illegal content and taking action against violating posts.

Despite the efforts by internet companies, some individuals have criticized the crackdown on anti-Japan content, revealing differing perspectives within the online community. Chinese authorities have labeled the knife attack as an isolated event, in contrast to previous incidents involving foreigners.

Further research by Lin Zhihui

Source: www.theguardian.com

Increased risk of heart attack and stroke associated with Xylitol sweeteners

Xylitol is often marketed as a “natural” way to sweeten drinks and foods.

Pixelshot/Alamy

Xylitol, a sweetener commonly found in sugar-free drinks, chewing gum and toothpaste, has been shown to increase the risk of heart attack and stroke.

Often marketed as “low carb,” “natural,” or “keto-friendly,” xylitol is a sugar alcohol found in fruits and vegetables, but at levels roughly 1,000 times lower than what’s added to commercial products. It can also be prepared artificially. Chemical reactions from plant materials.

last year, Stanley Hazen Hazen and his colleagues at the Cleveland Clinic in Ohio found that the sweetener erythritol was associated with an increased risk of cardiovascular disease. Suspecting that xylitol might also affect heart health, Hazen surveyed 3,306 adults in the United States and Europe.

The researchers took a single blood sample from participants to measure their xylitol levels after an overnight fast, and found that over a three-year follow-up, those with the highest blood xylitol levels were one-third more likely to develop cardiovascular disease, such as a heart attack or stroke.

To better understand this trend, the researchers looked at the effects of xylitol in the lab on human blood cells called platelets, and on platelet activity in mice. Platelets crowd together at the site of an injury to prevent bleeding, but they can also clot within blood vessels. This can affect blood supply to the heart and brain, increasing the risk of cardiovascular disease.

The researchers found that human platelets cultured in xylitol showed signs of being more likely to clot than those cultured in saline, and blood clots formed significantly more quickly in the veins of mice injected with xylitol.

Finally, the team tracked platelet activity in 10 subjects after they drank the same amount of water sweetened with xylitol. Within 30 minutes, plasma xylitol levels increased 1000-fold, and all indicators of platelet clotting readiness improved, especially in subjects with the highest levels of xylitol in their blood.

“This study highlights the urgent need to investigate sugar alcohols and artificial sweeteners,” Hazen said. “While there’s no need to throw away your toothpaste just because it contains xylitol, people should be aware that consuming products high in xylitol may increase their risk of developing blood clot-related conditions.”

Combined with previous research on erythritol, the findings “emphasize the need for systematic research into the effects of artificial sweeteners on cardiovascular disease risk,” the researchers say. Silvia Radenkovic At the University Medical Center Utrecht, Netherlands.

topic:

Source: www.newscientist.com

Russian Criminal Group Believed to Be Responsible for Cyber Attack on London Hospital, According to Experts

According to the former chief executive of the National Cyber Security Centre, a Russian cybercriminal group is responsible for a ransomware attack that disrupted operations and testing at a major NHS hospital in London.

The attack on pathology services firm Synovis resulted in a significant capacity impairment and was deemed a very serious incident.

Following the attack, the affected hospital declared a critical situation, halted operations and tests, and was unable to conduct blood transfusions.

A memo sent to NHS staff at multiple London hospitals and primary care services described the incident as a “major IT incident”.

During a BBC Radio 4 interview, Ciarán Martin confirmed that a group of Russian cybercriminals known as Kirin was behind the Synovis attack. These groups operate within Russia, targeting organizations globally for financial gain.

The cybercriminals, who have a history of attacks on various entities, inadvertently caused severe disruption to primary care with their ransomware attack.

While the government’s policy is to refrain from paying ransoms, companies affected by such attacks have the option to do so.

The National Cyber Security Centre is collaborating with NHS authorities to investigate the repercussions of the cyber attack.

Synovis has reported the incident to the police and the Information Commissioner.

Health Secretary Victoria Atkins assured that patient safety is the top priority and efforts are underway to resume services safely.

Synovis CEO Mark Darragh mentioned that a taskforce of Synovis and NHS IT experts is evaluating the impact and necessary measures.

It may take “weeks rather than days” to receive pathology results due to the severity of the attack, as per a senior source cited by the Health Service Journal.

Source: www.theguardian.com

Niacin, Vitamin B3 Supplements Linked to Higher Risk of Heart Attack and Stroke

Niacin, or vitamin B3, is a popular supplement

Celsol/Alamy

People with high levels of niacin (also known as vitamin B3) in their blood may be more likely to have a heart attack or stroke than people with low levels of niacin. Consuming too much of this vitamin, which is routinely added to fortified foods and can also be taken as a supplement, can cause inflammation in blood vessels.

Heart attacks and strokes are the leading causes of death worldwide. Although researchers have made great strides over the past few decades in discovering risk factors for these conditions, they have not identified them all.

“If treated [high] cholesterol and [high] You can still have a heart attack even if you have high blood pressure, diabetes, or any other pre-existing risk factors. ”Stanley Hazen at the Cleveland Clinic in Ohio. “There's something we're missing.”

To fill these gaps, Hazen and his colleagues collected blood samples from 2,331 U.S. adults and 832 European adults who chose to undergo cardiovascular testing. The researchers analyzed the samples for substances called metabolites, which are byproducts of metabolic processes such as digestion. The researchers then tracked participants' occurrence of cardiac events, such as heart attacks and strokes, over a three-year period.

The researchers found that people with high levels of a metabolite called 4PY were, on average, about 60 percent more likely to experience such an event than those with lower levels. This compound only occurs when the body breaks down excess niacin.

Further experiments revealed that 4PY inflamed blood vessels in rodents. We know that inflammation is a major contributor to the development of heart disease, Hazen said.

It's not uncommon for people to have high niacin levels, he says. This is partly because certain foods, such as cereals and flour, are routinely fortified with vitamins in countries including the UK and US.

Niacin supplements are also becoming more popular Evidence suggests it has anti-aging effects says Hazen. Additionally, doctors stopped prescribing high doses of niacin to people at risk for cardiovascular disease because it was initially thought that the vitamin protected people from the risk of cardiovascular disease by lowering cholesterol. It happened recently.

“I think this study really shows that when it comes to vitamins, sometimes you can have too much of a good thing,” he says. Jenny Jia at Northwestern University in Chicago, Illinois.

However, this study was primarily conducted on people of European descent. So it's unclear whether similar results would occur in people of different racial or ethnic backgrounds, Zia said.

topic:

  • heart attack/
  • Heart disease

Source: www.newscientist.com

Global Shark Attack Deaths Expected to Double by 2023

Bull sharks live in shallow waters and occasionally attack humans.

Leonardo Gonzalez/Shutterstock

Shark bites and deaths will increase globally in 2023, with Australia recording the highest number of deaths, with surfers being the biggest victims.

The University of Florida's International Shark Attack File (ISAF) investigated 120 “alleged shark-human interactions” around the world in 2023. These included nine “boat bites” and injuries at public aquariums.

Of the 120 incidents that occurred around the world, 69 were confirmed to be unprovoked bites of humans when the shark was in shark habitat and unprovoked. This number was up from his 57 cases in 2002.

A further 22 attacks were triggered, defined as “a human initiating an interaction with a shark in any way.” These include scenes of people feeding sharks, touching sharks, and attempting to free sharks from fishing nets. The rest were either scavenged bodies or their circumstances were not confirmed.

Globally, 10 people will die from unprovoked shark attacks in 2023, double the number in 2022. 42% of shark bite victims worldwide were surfers and 39% were swimmers.

Four of the deaths occurred in Australia, three of which were attributed to great white sharks (carcharodon carcharius) attack the surfer.

gavin naylor Researchers at the University of Florida said the number of unprovoked bites around the world is in line with the average for the past five years. “But the rise in the number of unwarranted deaths is a bit worrying, especially in Australia,” he says. “We will continue to monitor incidents related to nearby surfing spots.” [great] A collection of great white sharks. ”

The report comes a week after a woman was seriously injured when a bull shark bit her on the leg while swimming in one of Sydney Harbour's busiest areas at dusk.Porgy whale).

phoebe meagher Sydney's Taronga Zoo helps manage Australia's shark incident database and works closely with researchers in Florida.

He said on average over the life of the database, which goes back to 1791, Australia recorded just one death a year, a significant increase of four deaths in 2023. .

The last time Australia had no deaths was in 2019, but Meagher doesn't think the trend has changed significantly. “An increase in deaths does not mean an increase in bites,” she says.

She attributes the rise in deaths in 2023 to bad luck, with deaths more likely if attacks occur far from the coast or far from hospitals, for example. .

topic:

Source: www.newscientist.com

British Library starts process of reinstating digital services following cyber attack

After enduring a severe cyber attack, the British Library is now in the process of restoring its main catalog online. This is a significant milestone as the catalog contains 36 million records of printed and rare books, maps, magazines, and sheet music.

Despite this progress, access is currently limited to a “read-only” format, and it may take until the end of the year for the National Library’s services to be fully restored.

Sir Rory Keating, the library’s chief executive, confirmed that the full restoration of all services will be a gradual process. This has been particularly challenging for researchers who rely on the library’s collections for their work and livelihood.

The devastating cyber attack, which occurred on October 31st and was claimed by the ransomware group Rhysida, caused the main catalog to be inaccessible online and led to the theft of some employee data.

Upon restoring the online catalog, users will have the ability to search for materials. However, the process for checking inventory and ordering materials for use in the library reading room will differ from before. Users will also need to visit the library in person to view offline versions of the specialized catalog.

The library has also acknowledged the financial impact of the attack, stating that significant spending will be required to rebuild its digital services and complete the technological recovery. Additionally, concerns have been raised about the impact of the attack on payments to authors through the UK’s public lending rights system.

Despite the challenges ahead, the library is committed to restoring its services to their full capacity and continues to work with cybersecurity experts to address the aftermath of the attack.

Source: www.theguardian.com

National Amusements, owner of CBS and Paramount, alleges they were the victims of a cyber attack

National Amusements, the movie theater chain and parent company of media giants Paramount and CBS, acknowledged that it had experienced a data breach in which hackers stole the personal information of tens of thousands of people.

The private media conglomerate said: Legally required filings with the Maine Attorney General Hackers allegedly stole the personal information of 82,128 people in a data breach in December 2022.

Details of the December 2022 breach were finally revealed a year after the company began notifying those affected last week.

The company discovered the breach several months later, in August 2023, according to Mayne’s notice, but did not specify what personal information was stolen. The hackers also stole financial information, such as bank account numbers and credit card numbers, in combination with associated security codes, passwords and confidential information, according to a data breach notification filed in the state of Maine.

The data breach notification was submitted by the company’s human resources director, so the stolen data may relate to the company’s employees.

But the media giant has said little else about the breach or whether the personal information of its customers and users is also affected. It is not clear what type of cyberattack the company suffered, or if it received a ransom demand or subsequently paid the hackers.

National Amusement spokeswoman Rachel Luray did not respond to a request for comment Tuesday. Spokespeople for CBS and Paramount also had no comment.

National Amusements owns more than 1,500 movie theaters across the United States, but the company is best known for its control of Paramount and CBS following the Viacom-CBS merger in 2019.

Paramount disclosed another security incident in August, according to Filings with Massachusetts Attorney General, an incident in which a hacker stole the personal information of an unspecified number of customers. The hackers also stole Paramount customers’ names and dates of birth, as well as Social Security numbers and other government-issued identification numbers, according to the notice.

Disclosure: Zack Whitaker worked at CBS before August 2018.

Source: techcrunch.com

VF Corp., owner of Vans and Supreme, reports stolen personal information and affected orders in alleged ransomware attack

US-based VF Corporation, which owns apparel brands such as Vans, Supreme and The North Face, said a cyberattack affected its ability to fulfill orders ahead of Christmas, one of the year’s biggest retail events. admitted that he had caused it.

A company based in Denver, Colorado said in a filing with federal regulators. The cyberattack, which the company first detected on December 13, was a ransom attack in which hackers “disrupted the company’s operations by encrypting some IT systems and stole data, including personal data, from the company.” It was said that it was hinting at a software attack.

As a result, the company says its operations continue to be disrupted, including its “ability to fulfill orders.”

When TechCrunch tried to place an order on Vans’ website, he was greeted with the following message: You will be notified by email when your item is shipped and can track it with the sender. ”

VF Corporation said in a filing that the retail stores it operates around the world are open and consumers can purchase available products online. It is unclear when orders will be shipped, and a company spokesperson did not provide a timeline.

VF Corp. spokesperson Colin Wheeler provided TechCrunch via email with a statement reflecting the company’s regulatory filings. The company did not respond to TechCrunch’s questions about the incident. Reveal whether the company received a ransom demand from hackers.

The company has not yet disclosed how it was breached, what type of data was accessed, or how many individuals were affected by the breach, including employees, customers, or both. . It’s also unclear who is behind the attack, with the ransomware group being tracked yet to claim responsibility.

VF Corp. warned in a regulatory filing that the cyberattack would have a “significant impact” on its business until its systems are restored. “As the investigation into the incident is ongoing, the full scope, nature and impact of the incident is not yet known,” the filing states.

VF Corp disclosed the incident on the same day that the U.S. Securities and Exchange Commission’s new data breach disclosure rules went into effect. This regulation means that organizations must report cybersecurity incidents, including data breaches, to federal securities regulators. within 4 business days.

Source: techcrunch.com

Why do killer whales target and attack porpoises instead of preying on them?

Killer whales have been observed harassing porpoises in the Salish Sea, a behavior that has puzzled scientists for years. A study by Wild Orca and the SeaDoc Society at the University of California, Davis is investigating what may be behind it.Credit: Wild Orca

Scientists are investigating mysterious behavior.

Scientists have long been perplexed by the behavior of fish-eating killer whales in the Pacific Northwest. Killer whales have been seen harassing porpoises and sometimes killing them instead of eating them.

In a recently published study, marine mammal scienceCo-led by Deborah Giles of Wild Killer Whales and Sarah Teman of the Sea Dog Society, a program at the University of California, Davis School of Veterinary Medicine, the 60-year record between southern killer whales and porpoises in the Salish Sea We investigated the above interactions. You can better understand why they exhibit this behavior.

Southern killer whales are endangered, with only 75 individuals left. Their survival is closely tied to the fate of Chinook salmon, which is also an endangered species. seed. Without enough Chinook salmon, these whales are at risk of extinction.

“I’m often asked: Why don’t southerners eat seals and porpoises instead?” Giles said. “That’s because fish-eating killer whales have a completely different ecology and culture than marine mammal-eating killer whales, even though they live in the same ocean area. Therefore, interactions with porpoises We must conclude that there is another purpose, but this purpose has hitherto been speculative.”

Three plausible explanations

Scientists recorded instances of southern resident killer whales harassing porpoises as early as 1962, but the reason for this behavior remained a mystery for a long time. Giles, Teman, and a team of collaborators analyzed his 78 porpoise harassment incidents recorded from 1962 to 2020. This study suggests three plausible explanations.

  • Social play: Harassing porpoises may be a form of social play for killer whales. Like many intelligent species, these whales may engage in playful activities to bond, communicate, or simply have fun. This behavior can benefit group coordination and teamwork.
  • Hunting practice: Another hypothesis suggests that harassing porpoises may hone their salmon-hunting skills. Southern resident killer whales may view porpoises as moving targets to practice their hunting skills, even if they don’t intend to eat them.
  • Abusive behavior: This theory suggests that the whales may be trying to care for porpoises that they perceive to be weak or sick. This is an expression of the whale’s natural tendency to help other dolphins in the group. Females have been seen carrying dead calves, as well as porpoises.

“Abusive behavior, also known to scientists as ‘left-behind behavior,’ may be due to children having limited opportunities to care for them,” Giles explained. “Our research found that malnutrition causes nearly 70 percent of southern killer whale pregnancies to miscarry or for the calves to die shortly after birth.”

salmon specialist

Despite these interesting insights, Giles, Teman, and their collaborators acknowledge that the exact reasons behind porpoise harassment may never be fully understood. .But what is clear is that porpoises do not have Part of the diet of southern resident killer whales. Southern killer whales have a diet so specialized in salmon that the idea of ​​them eating porpoises is highly unlikely.

“Orcas are incredibly complex and intelligent animals. We found that harassing behavior toward porpoises has been passed down through generations and across social groups. It’s a great example,” says Teman. “Still, we don’t expect southern-dwelling killer whales to start eating porpoises. The salmon-eating culture is deeply rooted in southern-dwelling societies. For these whales to survive, healthy salmon populations are essential. We need numbers.”

This study highlights the importance of protecting salmon populations in the Salish Sea and throughout whale range. Maintaining an adequate supply of salmon is critical to the survival and well-being of Southern killer whales and the overall health of the Salish Sea ecosystem.

affinity for play

The study was conducted at a time when distinct killer whale populations on the Iberian Peninsula drew international headlines for interacting, sinking ships three times off the coasts of Portugal and Spain. After all, southern killer whales and killer whales of the Iberian Peninsula are two distinct populations with different cultures. What the two have in common is an affinity for play behavior.

Reference: “Harassment and Killing of Porpoises by Fish-Eating Southern Resident Killer Whales (Orcinus orca) (‘Phocoenacide’)” Deborah A. Giles, Sarah J. Teman, Samuel Ellis, John K.B. Ford, Monica W. Shields, M. Bradley Hanson, Candice K. Emmons, Paul E. Cottrell, Robin W. Baird, Richard W. Osborn, Michael Weiss, David K. Ellifritt. , Jennifer K. Olson, Jared R. Towers, Graham Ellis, Dena Matkin, Courtney E. Smith, Stephen A. Laverty, Stephanie A. Norman, Joseph K. Gaydos, September 28, 2023 , marine mammal science.

DOI: 10.1111/mms.13073

This research was funded by Wild Orca and the SeaDoc Society. Additional partners include the University of Exeter, Fisheries and Oceans Canada, Orca Behavior Institute, National Oceanic and Atmospheric Administration, Cascadia Research Institute, Whale Museum, Center for Whale Research, Ocean Research College Academy (ORCA) at Everett Community College, and Gulf Zoology. , North Gulf Coast Marine Society, George Mason University, Institute of Marine Medicine.

Source: scitechdaily.com

McLaren Healthcare discloses ransomware attack resulting in 2.2 million patient data theft

Michigan-based McLaren Healthcare has confirmed that the sensitive personal and health information of 2.2 million patients was compromised in a cyberattack earlier this year. Later, a ransomware gang took credit for the cyberattack.

in New Data Breach Notification McLaren said in a filing with the Maine attorney general that hackers breached its systems over a three-week period from July 28 to Aug. 23, before the health care company noticed it a week later on Aug. 31. He said that he had done so.

According to McLaren, the hackers accessed a wealth of medical information, including patients’ names, dates of birth, and social security numbers, as well as invoices, billing and diagnostic information, prescription and drug details, and information about diagnostic results and treatments. It is said that he did. Medicare and Medicaid patient information was also collected.

McLaren is a healthcare provider with 13 hospitals in Michigan and approximately 28,000 employees. McLaren, which touts cost-efficiency efforts on its website, made more than $6 billion in revenue in 2022.

News of the incident broke in October when the Alphv ransomware group (also known as BlackCat) claimed responsibility for the cyberattack, claiming that millions of patients’ personal information was stolen. day to day after a cyber attack Michigan Attorney General Dana Nessel warned residents that the breach “could potentially impact a large number of patients.”

TechCrunch has reviewed several screenshots posted by ransomware gangs on dark web leak sites, which show the company’s password manager, internal financial statements, some employee information, and patient-related information such as names, addresses, and phone numbers. Confirmed that it showed access to spreadsheets of personal and health information. , social security number, and diagnostic information.

Alphv/BlackCat claimed in the post that the gang had been in contact with McLaren representatives, but provided no evidence of this.

Contacted via email, McLaren spokesperson David Jones declined to comment beyond the company’s official statement or answer our questions about the incident. A spokesperson declined to say whether the company had received any payment requests or paid the hackers. McLaren’s chief information security officer, George Goble, declined to make him available for an interview.

What McLaren is currently facing is At least 3 class action lawsuits In connection with cyber attacks.

Source: techcrunch.com

After the recent Hamas attack, Israeli tech workers contemplate relocating to the US

As Israel reels from Hamas terrorist attacks, some technology entrepreneurs and investors from so-called “emerging countries” are considering moving to the United States, sources tell On the Money.

“There’s a lot of patriotism going on right now, but it’s going to wane,” said one venture capitalist, who was told by several tech founders that they were considering exiting. “We saw a huge exodus of people to Miami or another city like it.”

“A lot of talented entrepreneurs don’t admit it to many people, but they are considering leaving their jobs,” he added.

Similarly, top investors who had previously traveled to Israel’s high-tech region known as “Silicon Wadi” are also canceling visits they had planned in the coming months, the people said. Ta.

Officials say employees at companies such as popular stock trading app eToro are now focused on protecting the country rather than pursuing initial public offerings.

Funding and new products are likely to be delayed given that so many high-tech workers are currently being called into combat, the source added.


Still, many venture capitalists remain convinced that Israel is the best place to hire talent and start a company.
Paola Morongello

Still, many venture capitalists remain convinced that Israel is the best place in the world to recruit talent and build companies, and that the conflict shows the strength of its people.

“I don’t think the founders will get a gratuity. I think we can get through this crisis on the same footing,” added Gigi Levy Weiss, founding partner of NFX. “We are going through difficult times and are already seeing the waves. We are not happy about this, but it does not matter to the business community.”

Israel’s vibrant technology sector accounts for nearly 20% of the country’s GDP. According to PitchBook, Israel has more venture capital firms per capita than anywhere else in the world, and most investments in Israeli startups include US-based investors.

Still, this summer was brutal even before the attack. A Startup Nation Central poll found that nearly 70% of 500 startups are considering moving some of their capital

Source: nypost.com