How EU lawmakers can make mandatory vulnerability disclosure responsible
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix the problem and, once a fix is available, discloses that vulnerability for the bene.....»»
How male mosquitoes compensate for having only one X chromosome
The research group of Dr. Claudia Keller Valsecchi (Institute of Molecular Biology, Mainz, Germany) and their collaborators have discovered the master regulator responsible for balancing the expression of X chromosome genes between males and females.....»»
Senators introduce bipartisan bill directing FTC to redo auto dealership regs
A new bill from Sens. Jerry Moran, R-Kan., and Joe Manchin, D-W.Va., would direct the FTC to "redo" the proposal by requiring the agency to issue an advanced notice of proposed rule-making for public input — a regulatory step the lawmakers say was.....»»
Azul Code Inventory identifies dead and unused source code for removal
Azul announced Code Inventory, a new feature of Azul Vulnerability Detection that provides developers and DevOps teams a precise catalog of the source code actually used in production by Java applications, making it easy to accurately identify dead a.....»»
They’ve begun: Attacks exploiting vulnerability with maximum 10 severity rating
Will attacks be as big as those targeting MOVEit? Maybe not, but they still can be plenty bad. Enlarge (credit: Getty Images) Ransomware hackers have started exploiting one or more recently fixed vulnerabilities that pos.....»»
"Climate vulnerability index" shows where action, resources are needed to address climate change threats
Dr. Weihsueh Chiu, a professor at the Texas A&M School of Veterinary Medicine and Biomedical Sciences, helped create a new tool that provides communities and policymakers with actionable data about long-term vulnerabilities tied to climate change......»»
Zero-day in Arm GPU drivers exploited in targeted attacks (CVE-2023-4211)
A vulnerability (CVE-2023-4211) in the kernel drivers for several Mali GPUs “may be under limited, targeted exploitation,” British semiconductor manufacturer Arm has confirmed on Monday, when it released drivers updated with patches. Arm&.....»»
Evolving conversations: Cybersecurity as a business risk
Board members often lack technical expertise and may not fully grasp cyber risks. On the other hand, CISOs are more accustomed to interfacing with IT staff. This is understandable; the board is responsible for guiding high-level decision-making. They.....»»
Vulnerable Arm GPU drivers under active exploitation. Patches may not be available
Vulnerability allows attackers to tamper with data stored in device memory. Enlarge (credit: Getty Images) Arm warned on Monday of active ongoing attacks targeting a vulnerability in device drivers for its Mali line of G.....»»
Critical vulnerability in WS_FTP Server exploited by attackers (CVE-2023-40044)
Progress Software, the company behind the recently hacked MOVEit file-sharing tool, has recently fixed two critical vulnerabilities (CVE-2023-40044, CVE-2023-42657) in WS_FTP Server, another popular secure file transfer solution. Proof-of-concept cod.....»»
A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day
If your software package involves VP8 video encoding, it's likely vulnerable to attack. Enlarge (credit: Getty Images) A critical zero-day vulnerability Google reported on Wednesday in its Chrome browser is opening the I.....»»
Auto industry faced with more uncertainty if government shuts down
Congress needs to pass a spending bill before Sunday to avoid a shutdown. However, lawmakers remain at odds over the funding, with some House Republicans pushing for deep spending cuts that are unlikely to survive in the Democratic-controlled Senate......»»
Superbolts: Scientists figure out what causes Earth"s strongest lightning
Superbolts are more likely to strike the closer a storm cloud's electrical charging zone is to the land or ocean's surface, a new study finds. These conditions are responsible for superbolt "hotspots" above some oceans and tall mountains......»»
GM, Stellantis deny UAW claims they are enabling strike violence
Stellantis said it was ‘appalled' by UAW President Shawn Fain's accusations, and GM said it had banned a third-party contractor believed to be responsible for a hit-and-run that injured five striking workers......»»
Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)
Google has fixed another critical zero-day vulnerability (CVE-2023-5217) in Chrome that is being exploited in the wild. About CVE-2023-5217 The vulnerability is caused by a heap buffer overflow in vp8 encoding in libvpx – a video codec library.....»»
U.S. lawmakers demand documents on Ford battery partnership with CATL
The chairs of three U.S. House of Representatives committees demanded Ford Motor F.N turn over documents tied to its partnership with Chinese battery company CATL 300750.SZ and threatened to call CEO Jim Farley to testify before Congress......»»
Google quietly corrects previously submitted disclosure for critical webp 0-day
Previous CVE submission failed to mention that thousands of apps were affected. Enlarge / Malware Detected Warning Screen with abstract binary code 3d digital concept (credit: Getty Images) Google has quietly resubmitted.....»»
Researchers prepare for exascale supercomputer simulations of nuclear reactors
Nuclear energy is responsible for approximately one-fifth of total electricity used in the U.S., and nearly half of the country's renewable electricity. Most of the reactors generating this electricity were built decades ago. The construction of new.....»»
Chemists used machine learning and molecular modeling to identify potential anticancer drugs
RUDN University chemists and colleagues from China built several machine learning models and discovered a group of potential drugs that inhibit the enzyme responsible for uncontrolled cell division. The results were published in Biomedicines......»»
Quantifying national emissions of methane worldwide
Methane (CH4) stands as the second most important greenhouse gas caused by human activities after CO2 and is responsible for 0.6°C global warming since preindustrial times......»»
Stratascale acquires Vector0 to strengthen its cybersecurity services
Stratascale, an SHI company, announced the acquisition of Vector0, an Attack Surface Management (ASM) provider. Through the acquisition, Stratascale professionals and their customers gain visibility of attack vectors and points of vulnerability, enha.....»»