14 dead as Hezbollah walkie-talkies explode in second, deadlier attack
People aren't sure what devices will go boom next. Enlarge (credit: Aurich Lawson | Getty Images) Wireless communication devices have exploded again today across Lebanon in a second attack even deadlier than yesterday's.....»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
How researchers determined that Stonehenge"s giant Altar Stone came all the way from northeast Scotland
No one is certain why Stonehenge was built. This world-famous monument on Salisbury Plain in Wiltshire is thought to commemorate the dead, and is aligned with movements of the sun and moon......»»
This Mpox Outbreak Isn"t Like the Last One
The strain of mpox behind the current global health emergency is believed to be up to 10 times deadlier than the one that swept the globe in 2022......»»
Banshee Stealer malware haunts browser extensions on macOS
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»
A rarely seen deep sea fish is found in California, and scientists want to know why
A rarely seen deep sea fish resembling a serpent was found floating dead on the ocean surface off the San Diego coast and was brought ashore for study, marine experts said......»»
DDoS attack volume rises, peak power reaches 1.7 Tbps
The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1 2023, according to Gcore. Peak attack power rose from 1.6 terabits per second (Tbps) in H2 2023 to 1.7 Tbps. DDoS attacks hit Gaming, tech, fi.....»»
Fish in Greenland consume more jellyfish than previously assumed, researchers discover
For a long time, scientists assumed that jellyfish were a dead-end food source for predatory fish. However, a team from the Alfred Wegener Institute together with the Thünen Institute has now discovered that fish in Greenland waters do indeed feed o.....»»
Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine Memor.....»»
Australian gold mining company hit with ransomware
Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. .....»»
The 5,200+ day wait for Red Dead Redemption’s PC port may soon be over
PlayStation Store page bizarrely leaks "now on PC" promo message. Enlarge / He's gesturing towards a PC port that's just out of frame. Trust me. (credit: Rockstar Games) Rockstar Games fans who don't traffic in game cons.....»»
Retro-inspired Halloween, Evil Dead platformers coming this October — with a little twist
We'll be getting 16-bit Halloween and Ash vs Evil Dead platformers this October as part of a new crossover series......»»
Dead Rising Deluxe Remaster is more like Dead Space’s remake than Resident Evil 4’s
Dead Rising Deluxe Remaster doesn't give the classic as much of an overhaul as Resident Evil 4's remake did for that game, and that's a good thing......»»
Browser backdoors: Securing the new frontline of shadow IT
Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger attack su.....»»
A major Sonos exploit was explained at Black Hat — but you needn’t worry
Researchers from NCC Group showed how a Sonos One could fall victim to an attack that would let someone listen in on the microphones......»»
Two Halloween games are in development, and John Carpenter is involved
Compass International The studio behind Evil Dead: The Game is coming back to another famous horror IP for future games. In an , Boss Team Games revealed that it’s working on two games based on the original horror slasher film from 1978, wit.....»»
The iMac Pro may not be completely dead, and that thrills me
A new report says that Apple aims to bring back the iMac Pro. We shouldn’t get too enthusiastic, though, as it might still be years away from launching......»»
I tried Dead by Daylight’s scary new spinoff and I’m already dying to dive back in
After playing through the bloody prologue of The Casting of Frank Stone, we can't wait to uncover the secrets of Dead by Daylight's promising spinoff......»»
Infamous $30 Logitech F710 called out in $50M lawsuit over Titan sub implosion
Family of dead Titanic expert blasts "hip" electronics. Enlarge / OceanGate CEO Stockton Rush shows David Pogue the 2010-era game controller that pilots the Titan sub during a CBS Sunday Morning segment broadcast in November 2022.....»»
Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"
Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»
New infosec products of the week: August 9, 2024
Here’s a look at the most interesting products from the past week, featuring releases from: Rapid7, AppOmni, Contrast Security, Elastic, Cequence Security, Veza, ArmorCode, and EndorLabs. Rapid7 releases Command Platform, unified attack defense and.....»»