Advertisements


How EU lawmakers can make mandatory vulnerability disclosure responsible

There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»

Category: securitySource:  netsecurityAug 21st, 2023

How male mosquitoes compensate for having only one X chromosome

The research group of Dr. Claudia Keller Valsecchi (Institute of Molecular Biology, Mainz, Germany) and their collaborators have discovered the master regulator responsible for balancing the expression of X chromosome genes between males and females.....»»

Category: topSource:  physorgRelated NewsOct 6th, 2023

Senators introduce bipartisan bill directing FTC to redo auto dealership regs

A new bill from Sens. Jerry Moran, R-Kan., and Joe Manchin, D-W.Va., would direct the FTC to "redo" the proposal by requiring the agency to issue an advanced notice of proposed rule-making for public input — a regulatory step the lawmakers say was.....»»

Category: topSource:  autonewsRelated NewsOct 4th, 2023

Azul Code Inventory identifies dead and unused source code for removal

Azul announced Code Inventory, a new feature of Azul Vulnerability Detection that provides developers and DevOps teams a precise catalog of the source code actually used in production by Java applications, making it easy to accurately identify dead a.....»»

Category: securitySource:  netsecurityRelated NewsOct 4th, 2023

They’ve begun: Attacks exploiting vulnerability with maximum 10 severity rating

Will attacks be as big as those targeting MOVEit? Maybe not, but they still can be plenty bad. Enlarge (credit: Getty Images) Ransomware hackers have started exploiting one or more recently fixed vulnerabilities that pos.....»»

Category: topSource:  arstechnicaRelated NewsOct 4th, 2023

"Climate vulnerability index" shows where action, resources are needed to address climate change threats

Dr. Weihsueh Chiu, a professor at the Texas A&M School of Veterinary Medicine and Biomedical Sciences, helped create a new tool that provides communities and policymakers with actionable data about long-term vulnerabilities tied to climate change......»»

Category: topSource:  physorgRelated NewsOct 3rd, 2023

Zero-day in Arm GPU drivers exploited in targeted attacks (CVE-2023-4211)

A vulnerability (CVE-2023-4211) in the kernel drivers for several Mali GPUs “may be under limited, targeted exploitation,” British semiconductor manufacturer Arm has confirmed on Monday, when it released drivers updated with patches. Arm&.....»»

Category: securitySource:  netsecurityRelated NewsOct 3rd, 2023

Evolving conversations: Cybersecurity as a business risk

Board members often lack technical expertise and may not fully grasp cyber risks. On the other hand, CISOs are more accustomed to interfacing with IT staff. This is understandable; the board is responsible for guiding high-level decision-making. They.....»»

Category: securitySource:  netsecurityRelated NewsOct 3rd, 2023

Vulnerable Arm GPU drivers under active exploitation. Patches may not be available

Vulnerability allows attackers to tamper with data stored in device memory. Enlarge (credit: Getty Images) Arm warned on Monday of active ongoing attacks targeting a vulnerability in device drivers for its Mali line of G.....»»

Category: topSource:  arstechnicaRelated NewsOct 2nd, 2023

Critical vulnerability in WS_FTP Server exploited by attackers (CVE-2023-40044)

Progress Software, the company behind the recently hacked MOVEit file-sharing tool, has recently fixed two critical vulnerabilities (CVE-2023-40044, CVE-2023-42657) in WS_FTP Server, another popular secure file transfer solution. Proof-of-concept cod.....»»

Category: securitySource:  netsecurityRelated NewsOct 2nd, 2023

A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day

If your software package involves VP8 video encoding, it's likely vulnerable to attack. Enlarge (credit: Getty Images) A critical zero-day vulnerability Google reported on Wednesday in its Chrome browser is opening the I.....»»

Category: topSource:  arstechnicaRelated NewsSep 28th, 2023

Auto industry faced with more uncertainty if government shuts down

Congress needs to pass a spending bill before Sunday to avoid a shutdown. However, lawmakers remain at odds over the funding, with some House Republicans pushing for deep spending cuts that are unlikely to survive in the Democratic-controlled Senate......»»

Category: topSource:  autonewsRelated NewsSep 28th, 2023

Superbolts: Scientists figure out what causes Earth"s strongest lightning

Superbolts are more likely to strike the closer a storm cloud's electrical charging zone is to the land or ocean's surface, a new study finds. These conditions are responsible for superbolt "hotspots" above some oceans and tall mountains......»»

Category: topSource:  physorgRelated NewsSep 28th, 2023

GM, Stellantis deny UAW claims they are enabling strike violence

Stellantis said it was ‘appalled' by UAW President Shawn Fain's accusations, and GM said it had banned a third-party contractor believed to be responsible for a hit-and-run that injured five striking workers......»»

Category: topSource:  autonewsRelated NewsSep 28th, 2023

Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)

Google has fixed another critical zero-day vulnerability (CVE-2023-5217) in Chrome that is being exploited in the wild. About CVE-2023-5217 The vulnerability is caused by a heap buffer overflow in vp8 encoding in libvpx – a video codec library.....»»

Category: securitySource:  netsecurityRelated NewsSep 28th, 2023

U.S. lawmakers demand documents on Ford battery partnership with CATL

The chairs of three U.S. House of Representatives committees demanded Ford Motor F.N turn over documents tied to its partnership with Chinese battery company CATL 300750.SZ and threatened to call CEO Jim Farley to testify before Congress......»»

Category: topSource:  autonewsRelated NewsSep 28th, 2023

Google quietly corrects previously submitted disclosure for critical webp 0-day

Previous CVE submission failed to mention that thousands of apps were affected. Enlarge / Malware Detected Warning Screen with abstract binary code 3d digital concept (credit: Getty Images) Google has quietly resubmitted.....»»

Category: topSource:  arstechnicaRelated NewsSep 27th, 2023

Researchers prepare for exascale supercomputer simulations of nuclear reactors

Nuclear energy is responsible for approximately one-fifth of total electricity used in the U.S., and nearly half of the country's renewable electricity. Most of the reactors generating this electricity were built decades ago. The construction of new.....»»

Category: topSource:  physorgRelated NewsSep 26th, 2023

Chemists used machine learning and molecular modeling to identify potential anticancer drugs

RUDN University chemists and colleagues from China built several machine learning models and discovered a group of potential drugs that inhibit the enzyme responsible for uncontrolled cell division. The results were published in Biomedicines......»»

Category: topSource:  physorgRelated NewsSep 26th, 2023

Quantifying national emissions of methane worldwide

Methane (CH4) stands as the second most important greenhouse gas caused by human activities after CO2 and is responsible for 0.6°C global warming since preindustrial times......»»

Category: topSource:  physorgRelated NewsSep 26th, 2023

Stratascale acquires Vector0 to strengthen its cybersecurity services

Stratascale, an SHI company, announced the acquisition of Vector0, an Attack Surface Management (ASM) provider. Through the acquisition, Stratascale professionals and their customers gain visibility of attack vectors and points of vulnerability, enha.....»»

Category: securitySource:  netsecurityRelated NewsSep 26th, 2023