Feds say hackers are likely exploiting critical Fortinet VPN vulnerabilities
Exploits allow hackers to log into VPNs and then access other network resources. Enlarge (credit: Getty Images) The FBI and the Cybersecurity and Infrastructure Security Agency said that advanced hackers are likely exploiting critical vulnerab.....»»
Android 15 has reached a turning point
We're still waiting on Android 15's public release, but the update has now reached a critical milestone. Here's what's new......»»
Critical flaw in Zyxel’s secure routers allows OS command execution via cookie (CVE-2024-7261)
Zyxel has patched a myriad of vulnerabilities in its various networking devices, including a critical one (CVE-2024-7261) that may allow unauthenticated attackers to execute OS commands on many Zyxel access points (APs) and security routers by sendin.....»»
Examining experiences of the pandemic requires a more critical eye, says researcher
The coronavirus pandemic was, in many ways, a unique period whose impacts are still being seen and felt today. The effects of the pandemic live on in people's memories, fears, hopes, and bodies......»»
Breaking boundaries: PAM-less genome editing in soybean
CRISPR-Cas9 has transformed crop genetic improvement, yet its reliance on specific protospacer adjacent motif (PAM), sequences limits editing scope and efficiency. In soybean, a critical source of protein and oil, these limitations hinder the develop.....»»
Copper-based catalyst paves the way for sustainable ammonia production
Ammonia plays a critical role in food production and industrial development, with a global market size of approximately 175 million metric tons and a market value of $67 billion. Likewise, it is a high-energy-density carrier, making it a key player i.....»»
Study reveals key strategies to combat urban heat vulnerability
A QUT study analyzing five decades of research and thousands of studies has identified five critical areas needed to tackle urban heat vulnerability (UHV), a growing issue impacting millions in increasingly heat-prone cities......»»
Accenture expands partnership with Google Cloud to boost AI adoption and cybersecurity
Accenture and Google Cloud announced that their strategic alliance is advancing solutions for enterprise clients and seeing strong momentum across industries in two critical and related areas: GenAI and cybersecurity. As part of the announcement toda.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
New infosec products of the week: August 30, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Dragos, Fortinet, HYCU, and Rezonate. Fortinet introduces sovereign SASE and GenAI capabilities Fortinet announced the addition of sovereign SASE.....»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
Feds to get early access to OpenAI, Anthropic AI to test for doomsday scenarios
AI companies agreed that ensuring AI safety was key to innovation. Enlarge (credit: Kilito Chan | Moment) OpenAI and Anthropic have each signed unprecedented deals granting the US government early access to conduct safet.....»»
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says
Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused. Enlarge (credit: Getty Images) Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surve.....»»
US: Alaska man busted with 10,000+ child sex abuse images despite his many encrypted apps
Encryption alone won't save you from the feds. Enlarge (credit: Getty Images | Yuichiro Chino) The rise in child sexual abuse material (CSAM) has been one of the darkest Internet trends, but after years of covering CSAM.....»»
Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»
Rain Technology Laptop Switchable Privacy protects against visual hackers and snoopers
Rain Technology has introduced Laptop Switchable Privacy. Designed for tier one manufacturers and supply chain providers, the embedded screen technology protects against visual hackers and snoopers for enterprises and consumers — at the office or r.....»»
Teens recognize risk behavior in movies and series, but are not always critical
When teens see risk behavior such as drinking, smoking or drug use in movies or series, they sometimes find it difficult to define whether it's realistic or not. They recognize stereotypes but cannot always interpret it critically. This is according.....»»
Third-party risk management is under the spotlight
In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, part.....»»
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
Vulnerability is easy to exploit and allows attackers to remotely execute commands. Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mira.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»
Dragos Platform updates streamline OT threat and vulnerability workflows
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»