Attack worm may be new biocontrol weapon against wasp
A strain of roundworm discovered for the first time in Australian pine plantations during University of the Sunshine Coast-led research could become the timber industry's latest biocontrol weapon......»»
EU launches probe into disinformation campaigns as X says "hundreds" of Hamas-affiliated accounts removed
X says it has removed "hundreds of Hamas-affiliated accounts" and taken down thousands of posts since the attack on Israel by the Palestinian militant group, even as the European Commission formally opened an investigation into X after a previous war.....»»
Apple AirTags stalking led to ruin and murders, lawsuit says
Dozens join lawsuit alleging Apple AirTags are stalkers’ “weapon of choice.” Enlarge (credit: BackyardProduction | iStock Editorial / Getty Images Plus) This month, more than three dozen victims allegedly terrorize.....»»
Semperis enhances Forest Druid to guard against Microsoft Entra ID attacks
Semperis has expanded Forest Druid, its community-driven attack path management tool, to include support for Microsoft Entra ID (formerly Azure AD), saving time for cybersecurity teams in identifying and closing risky attack paths across hybrid ident.....»»
Elon Musk"s X says it has removed "hundreds" of Hamas-affiliated accounts
X says it has removed "hundreds of Hamas-affiliated accounts" and taken down thousands of posts since the attack on Israel by the Palestinian militant group......»»
Researcher: Trauma, histories of victimhood will influence Israeli response
Palestinian militants launched an unprecedented attack on Israel, killing nearly 900 Israelis and taking 150 more hostage. The hostages include civilians, children, elderly and soldiers. The attack, which many have compared to the 9/11 terrorist atta.....»»
EU warns Elon Musk "disinformation" is spreading on X after Hamas attack
The EU has written to Elon Musk warning him that the platform is being used to spread illegal content......»»
GNOME users at risk of RCE attack (CVE-2023-43641)
If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption vulnerability (CVE-2023-43641) in the libcue library. About CVE-2023-43641 Discovered.....»»
Elon Musk"s X adds to fog of war at outset of Israel-Hamas conflict
Misinformation has run rampant on Elon Musk's social media platform X in the 48 hours since Hamas militants' surprise attack on Israel, with users sharing false and misleading claims about the conflict and Musk himself pointing users to an account kn.....»»
New species of tiny wasp comes with mysterious, cloud-like structures at ends of antennae
Fossil researchers have discovered a novel genus and species of tiny wasp with a mysterious, bulbous structure at the end of each antenna......»»
Shining a light on tiny, solar-powered animals
Animals and plants need energy. Some animals get energy by eating other animals, and many plants harvest the energy in sunlight through photosynthesis. However, in the ocean, there exists a remarkable group of small, worm-like animals called acoels t.....»»
Researchers identify tiny, unique sea creature photographed in 2018
An international team of zoologists and parasitic worm specialists has identified an odd sea creature captured by an underwater photographer in 2018 off the coast of Okinawa. In their project, reported in the open-access journal Current Biology, the.....»»
Global events fuel DDoS attack campaigns
Cybercriminals launched approximately 7.9 million DDoS attacks in 1H 2023, representing a 31% year-over-year increase, according to NETSCOUT. Global events like the Russia-Ukraine war and NATO bids have driven recent DDoS attack growth. Finland was t.....»»
Infecting non-immune cells: Finding defies textbook understanding of leishmaniasis infection
The organisms that cause visceral leishmaniasis, a potentially deadly version of the parasitic disease that most often affects the skin to cause disfiguring disease, appear to have a secret weapon, new research suggests: They can infect non-immune ce.....»»
A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day
If your software package involves VP8 video encoding, it's likely vulnerable to attack. Enlarge (credit: Getty Images) A critical zero-day vulnerability Google reported on Wednesday in its Chrome browser is opening the I.....»»
New method can better identify sneaky sugars on viruses" spiky weapons
To effectively repel an enemy invasion, it helps to have accurate intelligence about that enemy's weaponry and attack plan. Medical scientists laboring to repel infectious viruses, such as those that cause COVID-19 and HIV, now have a better method f.....»»
Lethal weapon: New antimicrobial coating could revolutionize cleaning methods
We've gained a new weapon in the fight against harmful and often antibiotic-resistant pathogens with the development of a unique material engineered to limit disease spread and replace current cumbersome cleaning protocols on high-touch surfaces like.....»»
Tree-hugging AI to the rescue of Brazilian Amazon
Small, artificially intelligent boxes tied to tree trunks in the Brazilian Amazon are the latest weapon in the arsenal of scientists and environmentalists battling destructive jungle invaders......»»
GPUs from all major suppliers are vulnerable to new pixel-stealing attack
A previously unknown compression side channel in GPUs can expose images thought to be private. Enlarge GPUs from all six of the major suppliers are vulnerable to a newly discovered attack that allows malicious websites.....»»
Stratascale acquires Vector0 to strengthen its cybersecurity services
Stratascale, an SHI company, announced the acquisition of Vector0, an Attack Surface Management (ASM) provider. Through the acquisition, Stratascale professionals and their customers gain visibility of attack vectors and points of vulnerability, enha.....»»
3 iOS 0-days, a cellular network compromise, and HTTP used to infect an iPhone
Apple patches 3 zero-days after they were used in a sophisticated attack. Enlarge (credit: Getty Images) Apple has patched a potent chain of iOS zero-days that were used to infect the iPhone of an Egyptian presidential c.....»»