12 vulnerabilities newly associated with ransomware
In March 2023, the total number of breaches reported was higher than those reported in the previous three years combined, according to Ivanti. Ransomware groups are continuously weaponizing vulnerabilities and adding them to their arsenal to mount cr.....»»
PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files to the underlying Windows system. Tenable researchers have published a PoC.....»»
Businesses leaving their Kubernetes containers exposed to ransomware
Businesses leaving their Kubernetes containers exposed to ransomware.....»»
IT leaders think immutable data storage is an insurance policy against ransomware
IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom never get their.....»»
Only 13% of medical devices support endpoint protection agents
63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, acc.....»»
New Relic empowers IT and engineering teams to focus on real application security problems
New Relic launched new capabilities for New Relic IAST (Interactive Application Security Testing), including proof-of-exploit reporting for application security testing. New Relic customers can now identify exploitable vulnerabilities with an ability.....»»
The effects of law enforcement takedowns on the ransomware landscape
While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the August 2023 disruption of the Qakbot botnet has had one notable effect: ransomware affiliates have swit.....»»
Good prospects for altermagnets in spin-based electronics
Altermagnets represent a newly recognized class of materials in magnetism that could enable novel applications in spin-based electronics. Their magnetically ordered state consists of an antiparallel arrangement of microscopic magnetic moments, so-cal.....»»
Stanford University says data of thousands was stolen in ransomware attack
Some 27,000 people have had their data stolen, including Social Security numbers and government ID data......»»
Newly discovered fossil of giant turtle is named after Stephen King novel character
An international research team led by Dr. Gabriel S. Ferreira from the Senckenberg Center for Human Evolution and Paleoenvironment at the University of Tübingen has described a new species of giant turtle from the late Pleistocene......»»
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many.....»»
March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V
On this March 2024 Patch Tuesday, Microsoft has released fixes for 59 CVE-numbered vulnerabilities, but – welcome news! – none of them are currently publicly known or actively exploited. Last month, though, several days after Patch Tuesda.....»»
New method finds higher carnivorous dinosaur biodiversity in Kem Kem beds of Morocco
An international team of paleontologists from The Netherlands, the UK, Argentina, Germany and Belgium applied recently developed methods to measure theropod (carnivorous) dinosaur species diversity. The newly applied method uses both traditional phyl.....»»
"GPS nanoparticle" platform precisely delivers therapeutic payload to cancer cells
A newly developed "GPS nanoparticle" injected intravenously can home in on cancer cells to deliver a genetic punch to the protein implicated in tumor growth and spread, according to researchers from Penn State. They tested their approach in human cel.....»»
Hackers leverage 1-day vulnerabilities to deliver custom Linux malware
A financially motivated threat actor is using known vulnerabilities to target public-facing services and deliver custom malware to unpatched Windows and Linux systems. Among the exploited vulnerabilities are also two recently discovered Ivanti Connec.....»»
Thrive Incident Response & Remediation helps organizations contain and remove threats
Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks.....»»
Security Bite: Hackers breach CISA, forcing the agency to take some systems offline
The Cybersecurity and Infrastructure Security Agency (CISA) says two systems were hacked in February through vulnerabilities in Ivanti products. In response, the agency had to shut down both systems, which reportedly had critical ties to U.S. infrast.....»»
macOS 14.4 brings 50+ security fixes, iOS 17.4 patch list expands to over 40
We learned with the public launch of iOS 17.4 that Apple included fixes for two exploited vulnerabilities and two other security issues. Now with the arrival of macOS 14.4, there are over 50 security patches and the list of security fixes for iOS 17......»»
Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which (CVE-2024-20337) could be exploited by unauthenticated, remote attackers to grab users’ valid SAML a.....»»
Newly developed nano-thermometers enable real-time temperature detection in transmission electron microscopy
A method for measuring the temperature of nanometer-sized samples within a transmission electron microscope (TEM) has been developed by Professor Oh-Hoon Kwon and his research team in the Department of Chemistry at UNIST......»»
Skybox 13.2 empowers organizations to identify and remediate vulnerabilities
Skybox Security announced Skybox 13.2, introducing enhancements to its Vulnerability and Threat Management solution. These updates mark a significant milestone in vulnerability prioritization and attack surface management, empowering organizations wi.....»»