Latest news with #DeSilva


Economic Times
a day ago
- Business
- Economic Times
Sri Lankan MP backs India amid tariff row
Synopsis Amid India-US trade issues, a Sri Lankan MP, Harsha de Silva, backs India. He highlighted India's support to Sri Lanka during its economic crisis. De Silva urged against mocking India's situation. He reminded everyone of India's generosity when Colombo faced difficulties. India provided significant financial assistance to Sri Lanka in 2022. The MP's statement occurred during a parliamentary debate. New Delhi: Amid the India-US tariff standoff, a Sri Lankan parliamentarian has come out in support of New Delhi and drawn attention to how the Indian government came to Colombo's aid when the island nation was facing a crisis. During a recent parliamentary debate on the growing India-US trade tension, Colombo district MP and former minister Harsha de Silva reminded critics of India's generosity during Sri Lanka's difficult days, according to people in the know. "Don't laugh at India. Don't mock them when they are down, because when we were down, they were the only ones to lend us a hand," a source quoted de Silva as saying. "It ain't over until the fat lady sings. We witnessed you laughing. Don't laugh. India expected the tariffs to come down to 15%, and so did we."India had provided close to $4 billion in assistance to Sri Lanka during the economic crisis in 2022.

Time of India
2 days ago
- Business
- Time of India
Don't Mock India, Back Them Against US: Sri Lankan MP Harsha de Silva Warns Govt
In a fiery address to Sri Lanka's Parliament, MP Harsha de Silva slammed his government for mocking India's stand against US tariff hikes, urging Colombo to support New Delhi instead. De Silva reminded lawmakers that India had stood by Sri Lanka during its darkest hours, and that loyalty must be repaid in times of need. His remarks come amid soaring India-US trade tensions after President Donald Trump slapped 50% tariffs on Indian goods, citing New Delhi's Russian oil purchases. Calling the US move 'bullying' and 'unjustified,' India has vowed to protect its farmers, workers, and strategic interests. De Silva warned that Sri Lanka's dismissive stance risks damaging vital neighbourly ties, while India's courage inspires Asia. As Washington threatens more sanctions, New Delhi is pushing for tech self-reliance, export growth, and regional solidarity to counter economic coercion. Sri Lanka's decision on which side to take could redefine South Asian geopolitics.#harshadesilva #srilanka #pmmodi #srilankaussttariffs #ussrilankatradewar #trumptariffsonsrilanka #srilankaapparelindustry #srilankarubberexports #srilankateaexports #indiaus tradewar #modionustariffs #srilankaparliamentdebate #srilankaeconomiccrisis #freetradezonessrilanka #joblossesinsrilanka #srilankaindiasolidarity #ustradepressure #southasiatradepolitics #trumptariffhikes #ussrilankarelations #indiasrilankarelations #southasiaeconomicunity #breakingnews #trending #trendingnow #toi #bharat #toibharat #indianews Read More


Business Insider
5 days ago
- Business
- Business Insider
Roth MKM Keeps Their Buy Rating on Netlist (NLST)
In a report released yesterday, Sujeeva De Silva from Roth MKM maintained a Buy rating on Netlist, with a price target of $2.00. The company's shares closed yesterday at $0.70. Elevate Your Investing Strategy: Take advantage of TipRanks Premium at 50% off! Unlock powerful investing tools, advanced data, and expert analyst insights to help you invest with confidence. According to TipRanks, De Silva is a 5-star analyst with an average return of 27.6% and a 50.71% success rate. De Silva covers the Technology sector, focusing on stocks such as Aeva Technologies, D-Wave Quantum, and Advanced Micro Devices. The word on The Street in general, suggests a Moderate Buy analyst consensus rating for Netlist with a $2.00 average price target. Based on Netlist's latest earnings release for the quarter ending March 29, the company reported a quarterly revenue of $28.98 million and a GAAP net loss of $9.49 million. In comparison, last year the company earned a revenue of $35.81 million and had a GAAP net loss of $16.97 million


The Star
7 days ago
- The Star
No food, please: Expert calls for bans on tourists feeding Asian elephants
Tourists should not feed elephants, as this can trigger 'begging behaviour'. — Pexels The habitat of Asian elephants is shrinking. As a result, encounters between humans and the large mammals are becoming increasingly common in many parts of Asia. Tourists, in particular, are attempting to approach and feed the animals – a major mistake, according to a study by the University of California in San Diego. The problem is that this human behaviour triggers a form of 'begging behaviour' in elephants. They also become bolder and more audacious toward humans, sometimes with fatal consequences. The study, which is based on data from Sri Lanka and India, was published in the journal Ecological Solutions And Evidence . 'Many people, especially foreign tourists, think Asian elephants are tame and docile, like domestic pets,' explained lead author Shermin de Silva. 'They don't realise these are formidable wild animals and try to get too close in order to take photographs or selfies, which can end badly for both parties,' she said. De Silva has spent 18 years studying interactions between elephants and tourists in Udawalawe National Park in Sri Lanka. She observed not only the development of begging behaviour but also that the animals were increasingly becoming accustomed to sugary foods. In some cases, they even broke through fences to continue being fed. Not only were humans killed in these incidents, but at least three elephants also lost their lives. A young bull elephant was hit by a bus after breaking through a fence and crossing the road, the study reports. The study also found life-threatening plastic in elephant dung and reports that people give them fruits like mangoes still wrapped in plastic bags. Other dangers include the potential transmission of diseases from humans to animals and the loss of the elephants' ability to forage independently, the experts warn. An estimated 800 to 1,200 wild elephants live in the national park. At least 66 male elephants were observed begging for food. Some, like the bull named Rambo, even became minor celebrities because they regularly begged tourists for treats. In the Sigur Highlands of southern India, feeding also caused problems, according to the study. There, 11 elephants were regularly fed fruits and sugarcane by tour operators and nearby resorts to attract tourists. Four of these animals have since died as a direct result of interactions with humans. The authors called on authorities to strictly enforce feeding bans and promote responsible tourism. According to WWF, there were an estimated 41,000 to 52,000 wild Asian elephants in 13 countries in 2018, most of them in Sri Lanka and India. However, their numbers are declining. The International Union for Conservation of Nature (IUCN) lists the Asian elephant (Elephas maximus) as 'endangered.' – dpa


The Advertiser
04-07-2025
- Business
- The Advertiser
Qantas's two-day hack delay fuels customer scam fears
Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022. Millions of customers could already have been targeted by scammers in the two days it took Qantas to share details of a major cyber attack, an expert has warned. And there might be further attempts by malicious actors to hit Australia's biggest airline now that a vulnerability has been exposed. The airline announced on Wednesday that a third-party system used by an offshore call centre had been attacked two days earlier. The hack potentially compromised the names, dates of birth, email addresses and frequent flyer numbers of six million customers, although their financial information remained secure, Qantas said. But a cybersecurity expert said the 48-hour delay in telling customers there had been an attack might have left millions vulnerable to scam attempts. "That second round can be a lot more powerful than the first breach and then there is the risk of customers not knowing to be alert to any emails or phone calls from Qantas as suspicious," La Trobe University's Daswin De Silva told AAP. "These emails can be sent very quickly ... phishing or other impersonation attacks could have happened in those 48 hours." Qantas representatives should come forward and explain why there was a 48-hour delay in notifying customers of the scam risk, Professor De Silva added. He speculated the delay was likely due to Qantas figuring out whether other systems had been compromised and deploying security measures to dispel the cyber criminals. Qantas confirmed that scammers were already impersonating the airline in the wake of the attack and told customers to be vigilant. The airline has been contacted for comment about the notification delay. The company on Friday provided an update confirming that credit card details, personal financial information, passport details and Qantas Frequent Flyer accounts were not exposed. However, customers will have to wait several days longer for an individual update on which personal details were compromised due to the hack. "I want to apologise again for the uncertainty this has caused," chief executive Vanessa Hudson said. "We're committed to keeping our affected customers informed with regular updates as our investigation progresses." Qantas, which has been working with government authorities to investigate the incident, said there has been no further threat to its systems and additional security measures have been put in place. Australian Federal Police confirmed they were investigating and the airline had been "highly engaged" with authorities. Qantas has remained tight-lipped about who it believes is behind the attack and no cyber criminal groups have taken responsibility. But Prof De Silva said this could be an ominous sign of more cyber strikes to come for the airline now that criminals have found a vulnerability. "Once you figure out a weak spot, they try to exploit it to the maximum," he said. Multiple cyber experts believe the group responsible is called Scattered Spider, a cabal of young cyber criminals living in the US and the UK. The US Federal Bureau of Investigation recently warned that the group was targeting the airline sector by impersonating legitimate users to bypass multi-factor authentication and access systems. Prof De Silva said Scattered Spider was a financially motivated group that did not obtain credit card details or other "valuable" information in the attack. "They might be planning further attacks that gets them to their objective because obviously they want to see their effort fulfilled," he said. Qantas has added security measures for its frequent flyer accounts, including requiring extra identification for any changes. Since the attack was revealed, Qantas has received more than 5000 customer inquiries. Legal experts suggest the incident could lead to a class action against Qantas after compensation claims were made against Optus and Medibank following major breaches in 2022.