Apache Flink flaw is back, and being actively exploited
An improper access control flaw is being actively exploited, CISA is warning......»»
Researchers find flaw in Apple Silicon chips, but it"s not "that bad"
Researchers have discovered a microarchitectural flaw present in Apple Silicon chips that could lead to data leakage, though they said there is currently little cause for concern.Apple MacBook ProThe so-called Augury flaw was discovered by a team of.....»»
Week in review: Quantum Locker ransomware, most exploited vulnerabilities in 2021
Here’s an overview of some of last week’s most interesting news, articles and interviews: Meteoric attack deploys Quantum ransomware in mere hours A group wielding the Quantum Locker ransomware is hitting targets in a blitzkrieg-like manner, goin.....»»
The 15 most exploited vulnerabilities in 2021
In 2021, threat actors aggressively exploited newly disclosed critical software vulnerabilities to hit a broad set of targets worldwide, says the latest advisory published by the US Cybersecurity and Infrastructure Security Agency. Most exploited vul.....»»
Taiwan electronics makers keen to develop mmWave radars with NXP chips
Many Taiwan electronics makers are actively making inquiries with NXP Semiconductors to explore the possibility of jointly developing mmWave radar systems as part of their efforts to tap into the autonomous vehicle sector, according to industry sourc.....»»
Microsoft Finds Linux Desktop Flaw That Gives Root To Untrusted Users
An anonymous reader quotes a report from Ars Technica: Vulnerabilities recently discovered by Microsoft make it easy for people with a toehold on many Linux desktop systems to quickly gain root system rights -- the latest elevation of privileges flaw.....»»
It"s possible Apple"s Private Relay VPN isn"t so private after all
The VPN provider Mullvad has discovered a flaw in iCloud Private Relay that causes the service to leak some data back to Apple......»»
Microsoft finds Linux desktop flaw that gives root to untrusted users
Elevation of privilege vulnerabilities can be used to gain persistent root access. Enlarge (credit: Getty Images) Vulnerabilities recently discovered by Microsoft make it easy for people with a toehold on many Linux desktop sy.....»»
Apple"s Private Relay VPN feature appears to have a leak
Apple's Private Relay feature appears to have a flaw that can cause a system to ignore firewall rules and leak that a system is communicating with Apple servers, a new report claims.Credit: AppleAccording to VPN service Mullvad, Private Relay calls h.....»»
Apple actively planning to expand supply chain locations after lockdown strains reliance on China
With constant lockdowns in China due to the rise of COVID-19 cases, Apple is now in ”action plan” to diversify its supply chain management risks out of the country, according to a new report by analyst Ming-Chi Kuo. more… The post Apple activ.....»»
Critical bug could have let hackers commandeer millions of Android devices
Flaw could be exploited with malicious audio file. Enlarge (credit: Getty Images) Security researchers said they uncovered a vulnerability that could have allowed hackers to commandeer millions of Android devices equipped with.....»»
Makers actively bracing for upcoming Kunshan lockdown removal
Component makers and device assemblers operating in China's Kunshan, which has been under COVID lockdown since April 2, are all gearing up preparations for resuming production amid growing signs that the lockdown may be lifted soon, according to supp.....»»
BOE expanding smartphone-use OLED panel capacity
China-based BOE Technology has been actively expanding production capacity for smartphone-use OLED panels, aiming to ship more than 100 million units of them in 2022, according to company chairman Chen Yanshun......»»
Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)
Three days have passed since Microsoft’s latest Patch Tuesday, and CVE-2022-26809 has emerged as the vulnerability with the most exploitation potential. It’s easy to see why: it may be exploited by unauthenticated, remote attackers to bre.....»»
Week in review: Attackers exploiting VMware RCE, Microsoft fixes actively exploited zero-day
Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft fixes actively exploited zero-day reported by the NSA (CVE-2022-24521) On this April 2022 Patch Tuesday, Microsoft has released patches for 128 CV.....»»
Another top NFT marketplace may have a serious security flaw
Rarible, one of the world's biggest NFT marketplaces, was found to have a major security vulnerability.....»»
Google Issues Third Emergency Fix for Chrome This Year
Google is issuing fixes for two vulnerabilities in its Chrome web browser, including one flaw that is already being exploited in the wild. From a report: The emergency updates the company issued this week impact the almost 3 billion users of its Chro.....»»
CATL expediting overseas expansion and tech advancement to maintain worldwide dominance
Competition among electric vehicle (EV) battery manufacturers has grown intense, prompting prominent maker CATL to speed up expansion outside China. The battery giant is about to commission its first plant in Europe, actively looking for opportunitie.....»»
Novel solution to drastically reduce world"s largest waste stream
After water, sand is the most exploited natural resource on the planet. However, its extraction from seas, rivers, beaches and quarries has an impact on the environment and surrounding communities. A new study by researchers from the University of Ge.....»»
WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers
Silently fixed authentication bypass remained a secret even after it was under attack. Enlarge (credit: Getty Images) Security vendor WatchGuard quietly fixed a critical vulnerability in a line of its firewall devices and didn.....»»
Deception, Exploited Workers, and Cash Handouts: How Worldcoin Recruited Its First Half a Million Test Users
The startup promises a fairly-distributed, cryptocurrency-based universal basic income. So far all it's done is build a biometric database from the bodies of the poor. MIT Technology Review reports: On a sunny morning last December, Iyus Ruswandi, a.....»»