Messenger billed as better than Signal is riddled with vulnerabilities
Threema comes with unusually strong claims. They crumble under new research findings. Enlarge (credit: Getty Images) Academic researchers have discovered serious vulnerabilities in the core of Threema, an instant messeng.....»»
CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting SonicWall’s firewalls – to its Known Exploited Vulnerabilities catalog, thus.....»»
WaveCore runs right through a concrete wall with gigabit-speed network signal
Core drilling is tricky. Getting a 6 GHz signal through concrete is now easier. Enlarge / "Hmm, no signal here. I'm trying to figure it out, but nothing comes to mind …" (credit: Getty Images) One issue in getting offi.....»»
September 2024 Patch Tuesday forecast: Downgrade is the new exploit
I asked for a calm August 2024 Patch Tuesday in last month’s forecast article and that came to pass. The updates released were limited to the regular operating systems and all forms of Office applications. Six zero-day vulnerabilities were announce.....»»
Binarly Transparency Platform 2.5 identifies critical vulnerabilities before they can be exploited
Binarly announced Binarly Transparency Platform 2.5 with several features designed to enhance software vulnerability management and improve security posture across enterprise environments. The key highlight of this release is the innovative Reachabil.....»»
Zyxel warns of vulnerabilities in a wide range of its products
Most serious vulnerabilities carry severity ratings of 9.8 and 8.1 out of a possible 10. Enlarge (credit: Getty Images) Networking hardware-maker Zyxel is warning of nearly a dozen vulnerabilities in a wide array of its.....»»
Critical flaw in Zyxel’s secure routers allows OS command execution via cookie (CVE-2024-7261)
Zyxel has patched a myriad of vulnerabilities in its various networking devices, including a critical one (CVE-2024-7261) that may allow unauthenticated attackers to execute OS commands on many Zyxel access points (APs) and security routers by sendin.....»»
Q&A: Scientist discusses the MESSENGER mission to Mercury
Twenty years ago, the MESSENGER mission revolutionized our understanding of Mercury. We sat down with project head and former Carnegie Science director Sean Solomon to talk about how the mission came together and the groundbreaking work it enabled......»»
Cells use alternative splicing to regulate gene expression, research suggests
Alternative splicing is a genetic process where different segments of genes are removed, and the remaining pieces are joined together during transcription to messenger RNA (mRNA). This mechanism increases the diversity of proteins that can be generat.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Expel partners with Wiz to enhance security for cloud environments
Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»
There’s a scary new way to undo Windows security patches
A security researcher has released a new tool that can unpatch your Windows computer and expose it to old vulnerabilities......»»
Proof-of-concept study demonstrates mid-infrared computational temporal ghost imaging
Ghost imaging in the time domain allows for reconstructing fast temporal objects using a slow photodetector. The technique involves correlating random or pre-programmed probing temporal intensity patterns with the integrated signal measured after mod.....»»
How engineered walnuts combat drought through grafting
Drought is a major threat to walnut production globally, often resulting in lower yields and weaker trees. While grafting has traditionally been used to improve the resilience of fruit and nut trees, the exact mechanisms of signal transfer between ro.....»»
Adversaries love bots, short-lived IP addresses, out-of-band domains
Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. In.....»»
Test of a prototype quantum internet runs under New York City for half a month
To introduce quantum networks into the marketplace, engineers must overcome the fragility of entangled states in a fiber cable and ensure the efficiency of signal delivery. Now, scientists at Qunnect Inc. in Brooklyn, New York, have taken a large ste.....»»
Research unravels dual role of membrane protein in rice ethylene signal transduction
A research team, led by Professor Zhang Jinsong from the Institute of Genetics and Developmental Biology (IGDB) of the Chinese Academy of Sciences, revealed insights into the mechanism by which the membrane protein MHZ3 collaborates with the ethylene.....»»
Astronomers think they’ve found a plausible explanation of the Wow! signal
Magnetars could zap clouds of atomic hydrogen, producing focused microwave beams. Enlarge / The Wow! signal, represented as "6EQUJ5," was discovered in 1977 by astronomer Jerry Ehman. (credit: Public domain) An unusually.....»»
The Wow! Signal deciphered—it was hydrogen all along, study says
In 1977, astronomers received a powerful, peculiar radio signal from the direction of the constellation Sagittarius. Its frequency was the same as neutral hydrogen, and astronomers had speculated that any ETIs attempting to communicate would naturall.....»»
Vulnerabilities in Microsoft macOS apps may give attackers access to microphone, camera
Vulnerabilities in popular Microsoft apps for macOS can be abused by attackers to record video and audio clips, take pictures, access and exfiltrate data and send emails, Cisco Talos researchers have discovered. Library injection vulnerabilities in M.....»»
Security flaws in Microsoft Mac apps could let attackers spy on users
Cisco Talos recently uncovered security vulnerabilities in several Microsoft apps for macOS that can potentially let attackers spy on your camera and other system components.Security flaws found in Microsoft apps for MacTalos claims to have found eig.....»»