RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

Radiactive Waste Facility Taken Over

Print View Posted on: 03 March 2025

Event Date: 02 March 2025 Event Type: Radiation Source Event Location: Mexico, Temascalapa, Mexico State, Mexico INES Rating: 2 (Provisional)

On March the 2nd,2025 at approximately 6:30 AM (UTC-6), personnel from the municipality of Temascalapa forcibly took over the
Low and Medium Level Radioactive Waste Storage Center (CADER), evicting the personnel from the National Institute of Nuclear
Research (ININ), who were working at the facility and subsequently placing seals of closure at the entrances.
The video surveillance and environmental radiation monitoring systems that CADER has were disabled and there is no way to
know the current status inside the Center.
Negotiations are being carried out between personnel from the government of the State of Mexico and the Municipality of
Temascalapa, without reaching agreements so far.
In addition to the radioactive material and depleted uranium that are being kept in the facility, work tools from a foreign company
were also retained inside it.
Currently, Federal Authorities are working to regain control of the facility.
The source term of the facility is estimated at approximately 1,041.55 TBq of Co-60 and its surface area is 16.2 HA

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

Amazon Web Services today announced Ocelot, its first-generation quantum computing chip. While the chip has only rudimentary computing capability, the company says it is a proof-of-principle demonstration—a step on the path to creating a larger machine that can deliver on the industry’s promised killer applications, such as fast and accurate simulations of new battery materials.

“This is a first prototype that demonstrates that this architecture is scalable and hardware-efficient,” says Oskar Painter, the head of quantum hardware at AWS, Amazon’s cloud computing unit. In particular, the company says its approach makes it simpler to perform error correction, a key technical challenge in the development of quantum computing.  

Ocelot consists of nine quantum bits, or qubits, on a chip about a centimeter square, which, like some forms of quantum hardware, must be cryogenically cooled to near absolute zero in order to operate. Five of the

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

“Air Power alone does not guarantee America’s security, but I believe it best exploits the nation’s greatest asset – our technical skill” -Gen. Hoyt Vandenberg Military aviation allows the United States to unambiguously project power globally, with

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over

Click this link to continue reading the article on the source website.