New UEFI firmware vulnerabilities affect several PC vendors
Researchers at enterprise security firm Binarly have discovered no less than 23 high-impact vulnerabilities in the BIOS/UEFI firmware used by several computer vendors like Intel, AMD, Lenovo, Dell, HP, Asus, Microsoft, Fujitsu, Juniper Networks, Acer.....»»
Enhanced model enables more realistic biofilms for studying ventilator pneumonia
Scientists at The University of Warwick have made a breakthrough which could help find new treatments for a deadly infection that can affect up to 40% of hospital patients using mechanical ventilators. The study is published in Microbiology......»»
Researchers hack electronic shifters with a few hundred dollars of hardware
If you've got a Shimano Di2 groupset, be sure to update its firmware. Enlarge (credit: Dmytro Aksonov via Getty) Professional cycling has, in its recent history, been prone to a shocking variety of cheating methods and d.....»»
Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
In a potentially groundbreaking dispute, Delta Air Lines is threatening to sue CrowdStrike, a leading cybersecurity firm, for alleged negligence and breach of contract. This case brings to the forefront critical questions about the duties vendors owe.....»»
Common equine painkiller disrupts assisted reproduction technique efficiency in mares
Researchers at the Texas A&M School of Veterinary Medicine & Biomedical Sciences (VMBS) have discovered that phenylbutazone, a non-steroidal anti-inflammatory drug (NSAID) commonly prescribed in horses, can affect the ability of a mare's egg cells—.....»»
The atmosphere in the room can affect strategic decision-making, study finds
The atmosphere within a group can influence the outcome of strategic decision-making, according to a new study co-authored by Bayes Business School (formerly Cass). The research is published in the Academy of Management Journal......»»
Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine Memor.....»»
New AirPods Pro 2 firmware now available for developers
Today has been a big one for Apple beta releases. But the company has one more thing in store for developers. New developer firmware for AirPods Pro 2 just dropped, and is available now. more….....»»
New AirPods Pro firmware beta brings head shaking and improved noise isolation
The third developer beta for the latest AirPods Pro 2 software is now available for those testing out new features.AirPods Pro 2 get new features with iOS 18Apple provides developer betas for nearly all of its platforms, even AirPods. These AirPods f.....»»
Scout Suite: Open-source cloud security auditing tool
Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments. By leveraging the APIs provided by cloud vendors, Scout Suite collects and organizes configuration data, making it easier.....»»
Almost unfixable “Sinkclose” bug affects hundreds of millions of AMD chips
Worse-case scenario: "You basically have to throw your computer away." Security flaws in your computer's firmware, the deep-seated code that loads first when you turn the machine on and controls even how its operating system boots up.....»»
Xiaomi Watch 2: How to Reset, Unpair, and Update your Firmware!
Need to reset your watch or update its software? Check this out. The post Xiaomi Watch 2: How to Reset, Unpair, and Update your Firmware! appeared first on Phandroid. As far as Wear OS smartwatches are concerned, the Xiaomi Watch 2 is one.....»»
Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
Two vulnerabilities (CVE-2024-42219, CVE-2024-42218) affecting the macOS version of the popular 1Password password manager could allow malware to steal secrets stored in the software’s vaults and obtain the account unlock key, AgileBits has con.....»»
Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals
The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) to exploit vulnerabilities and evade detection, according to Darktrace. Subscription-based tools su.....»»
This Windows Update exploit is downright terrifying
A new tool called Windows Downdate can trick your PC into thinking that it's fully patched, all the while exposing you to dangerous vulnerabilities......»»
5G network flaws could be abused to let hackers spy on your phone
Researchers have developed a tool to sniff out 5G vulnerabilities, and even gain access to a victim's device......»»
“Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
A researcher has developed a downgrade attack that can make Windows machines covertly, persistently and irreversibly vulnerable, even if they were fully patched before that. A downgrade attack exploiting the Windows Update process The direction of Sa.....»»
Photos: Black Hat USA 2024 Startup City
Here’s a look inside Startup City at Black Hat USA 2024. The featured vendors are: BackBox, Cybral, DryRun Security, HackNotice, Heeler Security, Hushmesh, MobileHop, Nagomi Security, Ox Security, Plainsea, Raven, Scribe Security, Spyderbat, an.....»»
AI security 2024: Key insights for staying ahead of threats
In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. Oshiba highlights vulnerabilities in technology systems and the p.....»»
Statistical models show individuals vary in how air pollution impacts their mood
Affective sensitivity to air pollution (ASAP) describes the extent to which affect, or mood, fluctuates in accordance with daily changes in air pollution, which can vary between individuals, according to a study published August 7, 2024 in the open-a.....»»
Disaster plant pathology: Solutions to combat agricultural threats from disasters
An often-overlooked component of natural and human-driven disasters is their potential to affect plant health and thus food security at domestic and international scales. Most disasters have indirect effects on plant health through factors such as di.....»»