Attack worm may be new biocontrol weapon against wasp
A strain of roundworm discovered for the first time in Australian pine plantations during University of the Sunshine Coast-led research could become the timber industry's latest biocontrol weapon......»»
Q&A: Experts discuss how best to educate people about climate change
"Education is the most powerful weapon which you can use to change the world," said South African leader Nelson Mandela. That was in 1990, before climate change came onto most people's radar. Can we apply Mandela's prescription to climate, and if so,.....»»
Trello data breach of 15M accounts; Loan Depot 16M customers
A reported Trello data breach has seen the personal details of more than 15 million users put up for sale on the dark web. A separate Loan Depot ransomware attack resulted in more than 16 million customer accounts compromised, taking a number of t.....»»
Tiny worm, giant leap: Discovery of highly specific fatty acid attachment to proteins
In a world where the intricacies of molecular biology often seem as vast and mysterious as the cosmos, a new study delves into the microscopic universe of proteins, unveiling a fascinating aspect of their existence. This revelation could hold profoun.....»»
Tietoevry ransomware attack halts Swedish organizations
Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack w.....»»
CloudFoxable: Open-source AWS penetration testing playground
CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts ai.....»»
Researchers discover rare phages that attack dormant bacteria
In nature, most bacteria live on the bare minimum. If they experience nutrient deficiency or stress, they shut down their metabolism in a controlled manner and go into a resting state. In this stand-by mode, certain metabolic processes still take pla.....»»
FCC chair defends broadband discounts for poor people against Republican attack
Lawmakers criticized FCC for something that was decided by Congress, chair says. Enlarge / FCC Chairwoman Jessica Rosenworcel at a Senate subcommittee hearing on September 19, 2023 in Washington, DC. (credit: Getty Images | The.....»»
Millions of iPhones and MacBooks have this security flaw, and there’s nothing you can do
Virtually every electronic device is capable of being hacked, including Apple’s. To that point, Trail of Bits recently discovered a new attack through a GPU … The post Millions of iPhones and MacBooks have this security flaw, and there.....»»
New attack steals AI secrets from GPUs made by Apple, AMD, and Qualcomm
Patching all affected devices, which include some Macs and iPhones, may be tough. Enlarge (credit: MEHAU KULYK/Getty Images) As more companies ramp up development of artificial intelligence systems, they are increasingly.....»»
Russia jails officer for buying wrong hardware to protect Crimean bridge from Ukrainian attack - TASS
Russia jails officer for buying wrong hardware to protect Crimean bridge from Ukrainian attack - TASS.....»»
Lush confirms it was hit by a cyberattack - but it isn"t saying much else
The company isn't sharing any details just yet, but some reports are speculating it suffered a ransomware attack......»»
Last letters from young kamikaze pilots provide rare insights into Japan’s feared special attack unit
Last letters from young kamikaze pilots provide rare insights into Japan’s feared special attack unit.....»»
Iran identifies alleged bomb-maker behind last week"s IS twin suicide attack that killed dozens
Iran identifies alleged bomb-maker behind last week"s IS twin suicide attack that killed dozens.....»»
Florida woman who kept baby after alleged Lyft driver sex attack says "blessing" came from "darkest hour"
Florida woman who kept baby after alleged Lyft driver sex attack says "blessing" came from "darkest hour".....»»
Apple AirDrop leaks user data like a sieve. Chinese authorities say they’re scooping it up.
Chinese authorities are exploiting a weakness Apple has allowed to go unfixed for 5 years. Enlarge (credit: Aurich Lawson | Getty Images) Chinese authorities recently said they're using an advanced encryption attack to d.....»»
How to get the Buster Sword in Apex Legends and how it works
Final Fantasy VII has crossed over with Apex Legends, one of gaming's biggest battle royales, and it's added an iconic weapon to use during matches......»»
New infosec products of the week: January 12, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Critical Start, Dasera, ID R&D, and SpecterOps. SpecterOps adds new Attack Paths to BloodHound Enterprise SpecterOps announced updates to BloodHound Enterpri.....»»
Behavox Intelligent Archive simplifies operations for the unified tech stack
Behavox launched the Behavox Intelligent Archive. This new offering is WORM (Write Once, Read Many) compliant and seamlessly integrates with the Behavox surveillance product. Developed in partnership with Google Cloud, the Behavox Intelligent Archive.....»»
Linux devices are under attack by a never-before-seen worm
Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices. Enlarge (credit: Getty Images) For the past year, previously unknown self-replicating malware has been compromising Linux dev.....»»
SpecterOps adds new Attack Paths to BloodHound Enterprise
SpecterOps announced updates to BloodHound Enterprise (BHE) that add new Attack Paths focused on Active Directory Certificate Services (ADCS). These updates make BHE the most advanced tool on the market today for securing ADCS. ADCS is the Public Key.....»»