Connect with us

Tech

EPA, Energy, Interior announce plans to support coal mining

Published

on

EPA, Energy, Interior announce plans to support coal mining


Credit: Pixabay/CC0 Public Domain

On Sept. 29, the Trump administration announced a series of actions intended to boost coal mining and electricity generation, its latest move in a government-wide effort to reverse the fuel’s decline.

The announcements from the EPA, Energy and Interior departments are intended to bolster the domestic coal industry at a time of increasing electricity demand due in large part to artificial intelligence data centers. Administration officials and congressional Republicans said these changes are necessary to ensure U.S. competitiveness.

“Around the world, coal is still growing. People talk about peak coal, most consumption, but last year was the year that the most coal was used in the world, and of course we’re in a competition,” Interior Secretary Doug Burgum said, referring to the AI industry in China. “If we don’t lead in electrical production, we’re going to lose the AI arms race.”

The Energy Department will provide $625 million to subsidize and support coal-fired plants, including $350 million for retrofitting and recommissioning at or near their retirement dates and $175 million for coal power projects in rural communities.

The Interior Department said it will open more than 13 million acres of federal land for coal mining and streamline permitting the approval process for other mines. It will also implement a provision of the Republican reconciliation law that reduces the royalty rate for coal from 12.5 percent to 7%.

And the EPA announced regulatory changes that would favor . They include providing plants with more time to comply with existing effluent limitations guidelines, which govern coal ash wastewater pollution, and an advance notice of proposed rulemaking on changes to the Clean Air Act’s regional haze rule.

U.S. production of coal has declined for more than two decades across Republican and Democratic administrations, with this most carbon emissions-intensive fuel displaced by natural gas, wind and solar power.

However, the Trump administration has been critical of wind and , blocking projects on federal lands and waters. Officials argue these forms of energy, even when paired with batteries, remain too unreliable and cannot support AI and other industries. In addition, Energy Secretary Chris Wright and others have criticized wind and solar power subsidies, arguing they are evidence these renewables are not cost-effective.

Instead, they have called for increased efforts to preserve and expand forms of baseload power, including coal. Earlier in 2025, President Donald Trump signed an executive order to support the coal industry.

When addressing the United Nations, Trump reiterated his belief that climate change was a “hoax” and said European nations were on the “brink of destruction because of the green energy agenda.”

EPA Administrator Lee Zeldin said in a Sept. 25 Fox News interview that he agreed with Trump’s statements. Also last week, Wright characterized a network of scientists who agree about the severity of climate change and its impact as “activists.”

2025 CQ-Roll Call, Inc., All Rights Reserved. Distributed by Tribune Content Agency, LLC.

Citation:
EPA, Energy, Interior announce plans to support coal mining (2025, September 30)
retrieved 30 September 2025
from https://techxplore.com/news/2025-09-epa-energy-interior-coal.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Tech

Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything

Published

on

Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything


Following leaked revelations at the end of March that Anthropic had developed a powerful new Claude model, the company formally announced Mythos Preview on Tuesday along with news of an industry consortium it has convened, known as Project Glasswing, to grapple with the cybersecurity implications of the new model and advancing capabilities more generally across the AI field.

The group includes Microsoft, Apple, and Google as well as Amazon Web Services, the Linux Foundation, Cisco, Nvidia, Broadcom, and more than 40 other tech, cybersecurity, critical infrastructure, and financial organizations that will have private access to the model, which is not yet being generally released. The idea, in part, is simply to give the developers of the world’s foundational tech platforms time to turn Mythos Preview on their own systems so they can mitigate vulnerabilities and exploit chains that the model develops in simulated attacks. More broadly, Anthropic emphasizes that the purpose of convening the effort is to kickstart urgent exploration of how AI capabilities across the industry are on the precipice, the company says, of upending current software security and digital defense practices around the world.

“The real message is that this is not about the model or Anthropic,” Logan Graham, the company’s frontier red team lead, tells WIRED. “We need to prepare now for a world where these capabilities are broadly available in 6, 12, 24 months. Many things would be different about security. Many of the assumptions that we’ve built the modern security paradigms on might break.”

Models developed and trained by multiple companies have increasingly been able to find vulnerabilities in code and propose mitigations—or strategies for exploitation. This creates a next generation of security’s classic cat-and-mouse game in which a tool can aid defenders but can also fuel bad actors and make it easier to carry out attacks that were once too expensive or complex to be practical.

“Claude Mythos preview is a particularly big jump,” Anthropic CEO Dario Amodei said on Tuesday in a Project Glasswing launch video. “We haven’t trained it specifically to be good at cyber. We trained it to be good at code, but as a side effect of being good at code, it’s also good at cyber.” He adds in the video that “more powerful models are going to come from us and from others. And so we do need a plan to respond to this.”

Anthropic’s Graham notes that in addition to vulnerability discovery—including producing potential attack chains and proofs of concept—Mythos Preview is capable of more advanced exploit development, penetration testing, endpoint security assessment, hunting for system misconfigurations, and evaluating software binaries without access to its source code.

In carrying out a staggered release of Mythos Preview, beginning with an industry collaboration phase, Graham says that Anthropic sought to draw on tenets of coordinated vulnerability disclosure, the process of giving developers time to patch a bug before it is publicly discussed.

“We’ve seen Mythos Preview accomplish things that a senior security researcher would be able to accomplish,” Graham says. “This has very big implications then for how capabilities like this should be released. Done not carefully, this could be a meaningfully accelerant for attackers.”

Project Glasswing partners, including some of Anthropic’s competitors, struck a collaborative tone in statements as part of the launch.

“Google is pleased to see this cross-industry cybersecurity initiative coming together,” Heather Adkins, Google’s vice president of security engineering, says in a statement. “We have long believed that AI poses new challenges and opens new opportunities in cyber defense.”



Source link

Continue Reading

Tech

Russian cyber spies targeting consumer, Soho routers | Computer Weekly

Published

on

Russian cyber spies targeting consumer, Soho routers | Computer Weekly


The UK’s National Cyber Security Centre (NCSC) and Microsoft have exposed an extensive Domain Name System (DNS) hijacking campaign against vulnerable consumer and small and home office (Soho) broadband routers conducted by the Russian cyber intelligence services.

Orchestrated by APT28 or Forest Blizzard – more widely-known as Fancy Bear – the operations saw the threat actor alter the settings of compromised devices to reroute internet traffic through malicious servers they held.

In this way, Fancy Bear was able to steal data such as login credentials, passwords and access tokens from personal web and email services belonging to their victims in a so-called adversary-in-the-middle (AiTM) attack.

The NCSC said the campaign was likely opportunistic, with Fancy Bear having cast a wide net to ensnare as many victims as possible. By targeting insecure home and small office equipment, Fancy Bear took advantage of less closely-monitored or managed assets to pivot into larger enterprise environments or targets of interest to Russian intelligence.

Indeed, Microsoft said it had identified over 200 organisations and 5,000 consumer devices impacted since the campaign began in August 2025.

“This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors,” said NCSC operations director Paul Chichester.

“We strongly encourage organisations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice.

“The NCSC will continue to expose Russian malicious cyber activity and provide practical guidance to help protect UK networks,” he added.

Routers on trial

The exposure of Fancy Bear’s latest campaign comes amid a fierce debate on the other side of the Atlantic following the Federal Communications Commission’s (FCC’s) implementation of tight restrictions on routers built outside the US – which in effect means virtually every commercially available router.

The US’ decision was framed on the basis that such hardware poses an unacceptable risk to the country’s national security and that of its citizens and residents.

However it has been criticised on the basis that while it eases fears over the potential for other governments – such as China – to interfere with networking hardware produced in their factories, it does not address the fact that security vulnerabilities such as those exploited by Fancy Bear will still exist regardless of where they were manufactured.

Writing in Computer Weekly, Forescout vice president of security intelligence, Rik Ferguson, said routers present a highly attractive footholds for attackers because they sit at the network edge, generally face the public internet, and are easily overlooked once deployed.

“Many of the weaknesses we see come from familiar, measurable issues like outdated software components, slow patching cycles, weak credentials, exposed management interfaces and long lifespans that extend well beyond vendor support,” he said.

“In firmware analysis, we regularly see common components that are years behind current versions, carrying known vulnerabilities that attackers can and do exploit.”

Ferguson advised security teams to treat routers and similar network infrastructure as part of the active attack surface, which in practice means keeping accurate inventories, prioritising their lifecycle management, and enforcing firmware updates and patching.

To prevent attackers like Fancy Bear from scoring easy wins, security teams should also look to disable any internet-exposed management interfaces, enforce unique credentials, and apply network segmentation measures so that one compromised router does not necessarily enable wider access.



Source link

Continue Reading

Tech

We Made More Than a Thousand Pizzas to Find the Best Pizza Ovens

Published

on

We Made More Than a Thousand Pizzas to Find the Best Pizza Ovens


The Dome is big. It’s not portable, practical, or inexpensive. It accepts the romance of wood, or the brute power of propane or natural gas. Its height makes it versatile enough for steaks, fish, or other skillet meals. This pizza oven is designed to be a fixture in your life and backyard, bolstered by an ever-expanding accessory set. And it also more than earns its place there, once you buy a snap-on Neapolitan arch accessory ($60) to bolster its insulation.

The Gozney makes truly excellent high-temperature pizza. Most backyard ovens, even our other favorites on this list, tend to struggle to reach and maintain the 900-degree temps needed for proper Neapolitan crust. The Dome Gen 2 gets there in 20 minutes, it heats admirably evenly, and it’s responsible for the best pizzas that my colleague Kat Merck says she’s made in her entire life. This is worth noting, given that she was editor and recipe tester for pizzaiolo Ken Forkish’s iconic pizza book The Elements of Pizza. (For what it’s worth, Forkish also uses a Dome Gen 2 at home, while enjoying his retirement. He likes using dough at 67 percent hydration, while cooking at 900 degrees in the Dome.)

A couple caveats, however: Gozney often markets the Dome as being able to cook two pizzas at the same time. This is a silly thing to do at the temperatures you’re cooking at. Cook one pizza. If you use the Neapolitan Arch, it’ll make the oven’s aperture narrow enough that you’ll need to limit yourself to a 12-inch peel anyway. The price of a Gozney Dome also rises considerably once you start delving into the accessories. With the stand, cover, Neapolitan arch, wood fire control kit, turning peel, and 15 pounds of Gozney-brand kiln-dried hardwood, the final price for the Dome Gen 2 can rack up as high as $3,270.

Best Big Pizza Oven for Families: Ooni Koda Max

Ooni’s large oven is for everyone who is sick of feeding their families with multiple teeny-tiny 12-inch pies and just wants to make a massive 20-inch cheese pizza for all the kids at once. You can either attach a propane tank or hook it to your natural gas line. If this is a possibility for you, then I recommend the latter. Ooni has a new gas management technology that keeps the temperature consistent across the huge surface. But big, powerful ovens use a lot of fuel: Its 35,000 BTUs put this Koda Max nearly on par with a 3-burner Traeger griddle. That heat will also come pouring out the open front of the oven, which means the Max is not ideal for small patios.



Source link

Continue Reading

Trending