Creating a formula for effective vulnerability prioritization
In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset inventor.....»»
Electrified membranes with carbon nanotubes offer faster nitrate removal in drinking water
Nitrate contamination in water has long presented threats to the environment and human health. Now, Yale researchers have developed an efficient and effective way to remove it......»»
Studies explore converting wastewater to fertilizer with fungal treatment
Creating fertilizers from organic waste can help reduce the consumption of fossil fuels and promote sustainable production. One way of doing this is through hydrothermal liquefaction (HTL), which converts biomass into biocrude oil through a high-temp.....»»
Dynamic view of opioid receptor could refine pain relief
Effective pain relief without the debilitating side effects of traditional opioids is closer to becoming a reality thanks to a study by an all-RIKEN team into the structure and dynamics of a drug-bound opioid receptor......»»
Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s threat researchers. Several PoC exploits have been published, including one.....»»
Nanoscale trilayer exhibits ultrafast charge transfer in semiconductor materials
Successfully innovating optoelectronic semiconductor devices depends a lot on moving charges and excitons—electron-hole pairs—in specified directions for the purpose of creating fuels or electricity......»»
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) tool. Find vulnerabilities for major operating system packages Alpine Amazo.....»»
Vulnerability in Cisco Smart Software Manager lets attackers change any user password
Yep, passwords for administrators can be changed, too. Enlarge Cisco on Wednesday disclosed a maximum-security vulnerability that allows remote threat actors with no authentication to change the password of any user, in.....»»
Restoring eroded peatlands could reduce flood risk for communities downstream, say UK researchers
Scientists from The University of Manchester, The University of Aberdeen and Newcastle University have found that the restoration of upland peatlands is a highly effective strategy for reducing downstream flooding......»»
Research unveils rhizobia strains effective against soybean root rot fungal pathogens
A research team has identified three rhizobia strains, Rhizobium sp. TZSR12C, Rhizobium sp. TZSR25B, and Bradyrhizobium sp. TZSR41A, which effectively suppressed root rot fungal pathogens in soybeans under both in vitro and greenhouse conditions. The.....»»
Here’s the new Passwords app in iOS 18
iOS 18 is a huge release for iPhone users. It brings major updates to system apps like Photos, Messages, Notes, and more. The release also introduces two brand new apps from Apple: Image Playground for creating AI images (not yet available in the.....»»
Chemists develop modular approach for creating important class of pharmaceutical compounds
Chemists at the National University of Singapore (NUS) have developed a modular approach to create 1,2-arylheteroaryl ethanes, a class of compounds important for drug discovery and pharmaceutical development, using fundamental feedstock chemicals suc.....»»
Invicti API Security uncovers hidden and undocumented APIs
Invicti announced Invicti API Security, merging comprehensive API discovery with proactive security testing into a single solution. The growth of service-based architectures has driven an explosion in APIs, creating yet another expanding attack surfa.....»»
Nature-based solutions to disaster risk from climate change are cost-effective, study confirms
A new global assessment of scientific literature led by researchers at the University of Massachusetts Amherst finds that nature-based solutions (NbS) are an economically effective method to mitigate risks from a range of disasters—from floods and.....»»
Additional taxes vs. water quotas: Study compares systems to manage water consumption in agriculture
Based on a mathematical programming model, a study finds that the proportional allocation of water, and not additional taxes on the resource, is more effective from the point of view of those engaged in agriculture......»»
Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with Tre.....»»
Craig Boundy joins McAfee as President and CEO
McAfee announced the appointment of Craig Boundy as President and CEO, effective August 21, 2024. Boundy, a seasoned executive with over 25 years of leadership experience, joins McAfee from Experian where he served as the global Chief Operating Offic.....»»
Managing exam pressure: Tips for certification preparation
In this Help Net Security interview, Seth Hodgson, SVP of Engineering at Udemy, discusses effective study techniques for cybersecurity certification exams. Hodgson discusses the role of study groups, online forums, and professional networks in certif.....»»
Firmware update hides Bluetooth fingerprints
A smartphone’s unique Bluetooth fingerprint could be used to track the device’s user–until now. A team of researchers has developed a simple firmware update that can completely hide the Bluetooth fingerprint, eliminating the vulnerability. Blue.....»»
Q&A: What past environmental success can teach us about solving the climate crisis
Susan Solomon, MIT professor of Earth, atmospheric, and planetary sciences (EAPS) and of chemistry, played a critical role in understanding how a class of chemicals known as chlorofluorocarbons were creating a hole in the ozone layer......»»
Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
The maintainers of the Exim mail transfer agent (MTA) have fixed a critical vulnerability (CVE-2024-39929) that currently affects around 1.5 million public-facing servers and can help attackers deliver malware to users. About CVE-2024-39929 The vulne.....»»