Ivanti Avalanche vulnerable to attack by unauthenticated, remote attackers (CVE-2023-32560)
Two stack-based buffer overflow bugs (collectively designated as CVE-2023-32560) have been discovered in Ivanti Avalanche, an enterprise mobility management solution. A buffer overflow arises when the data in a buffer surpasses its storage capacity......»»
Zero-days dominate top frequently exploited vulnerabilities
A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious cyb.....»»
Researchers use high-resolution images to create model that predicts landslide risk in coastal areas
São Sebastião, a municipality on the coast of São Paulo state in Brazil that was partially cut off from the rest of the country in February 2023 after a period of torrential rain, had more than 1,000 landslide points, according to an inventory pro.....»»
Agrivoltaics for sustainable food, energy and water management in East Africa
Combining solar power production with agriculture can significantly boost crop yields, conserve water and generate low-carbon electricity for areas particularly vulnerable to climate change, a new study has shown......»»
GoIssue phishing tool targets GitHub developer credentials
Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while kee.....»»
Aerospace employees targeted with malicious “dream job” offers
It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular e.....»»
Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)
November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities.....»»
More evidence that Europe"s ancient landscapes were open woodlands: Study finds oak, hazel and yew were abundant
In 2023 a research group from Aarhus University in Denmark found that light woodland and open vegetation dominated Europe's temperate forests before Homo sapiens. In a new study, recently published in the Journal of Ecology, they take a closer look a.....»»
New type of weather radiosonde can find its way back to where it was launched
Some 80% of weather radiosondes—remote measurement instruments containing plastic, batteries and electronic parts—end up lost in nature after one flight. But a startup created by an EPFL master's student is set to change that with a new, ultra-li.....»»
What can we expect at the COP29 Climate Conference?
With a climate-denialist re-elected as US president and another petrostate host (following Dubai in 2023)—hopes for ambitious outcomes at the 29th UN Climate Change "Conference of the Parties" (COP29) in Baku, Azerbaijan are not high......»»
Ars Live: Our first encounter with manipulative AI
On Nov. 19, join Benj Edwards and Simon Willison's live YouTube chat about the "Great Bing Chat Fiasco of 2023." In the short-term, the most dangerous thing about AI language mode.....»»
Waymo, Nexar present AI-based study to protect ‘vulnerable’ road users
Waymo and road safety AI firm Nexar now offer the largest dataset in the U.S. to inform automated vehicles.....»»
Massive troves of Amazon, HSBC employee data leaked
A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p r.....»»
Immersive Labs AI Scenario Generator improves cyber skills against various attack types
Immersive Labs introduced AI Scenario Generator. This new capability enables organizations to generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. By inputting a few short prompts, customers ca.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»
Strategies for CISOs navigating hybrid and multi-cloud security
In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the importance.....»»
Private jet carbon emissions soar 46%: Study
The carbon footprint from private jet travel grew 46 percent between 2019 and 2023 and will keep rising unless the ultra-luxury industry is regulated, according to new research published Thursday......»»
Heat hardiness: Scientists identify key phase for tomato heat tolerance
By studying tomato varieties that produce fruit in exceptionally hot growing seasons, biologists at Brown University identified the growth cycle phase when tomatoes are most vulnerable to extreme heat, as well as the molecular mechanisms that make th.....»»
Report: Countries must dramatically increase climate adaptation efforts and bridge the finance gap
As climate impacts intensify and hit the world's most vulnerable hardest, the "Adaptation Gap Report 2024: Come hell and high water," from the United Nations Environment Program (UNEP), finds that nations must dramatically increase climate adaptation.....»»
Critical Palo Alto Networks Expedition bug exploited (CVE-2024-5910)
A vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition, a firewall configuration migration tool, is being exploited by attackers in the wild, the Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Thursday. About CVE-2024-.....»»
A closer look at the 2023-2030 Australian Cyber Security Strategy
In this Help Net Security video, David Cottingham, CEO of Airlock Digital, discusses the 2023-2030 Australian Cyber Security Strategy and reviews joint and individual cybersecurity efforts, progress, and strategies over the past year. The Australian.....»»