New UEFI firmware vulnerabilities affect several PC vendors
Researchers at enterprise security firm Binarly have discovered no less than 23 high-impact vulnerabilities in the BIOS/UEFI firmware used by several computer vendors like Intel, AMD, Lenovo, Dell, HP, Asus, Microsoft, Fujitsu, Juniper Networks, Acer.....»»
Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)
On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»
Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)
On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»
Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)
On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»
LG smart TVs may be taken over by remote attackers
Bitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted (root) access to the devices. “Although the vulnerable service is intended for LAN access.....»»
Thousands of LG TVs are vulnerable to takeover—here’s how to ensure yours isn’t one
LG patches four vulnerabilities that allow malicious hackers to commandeer TVs. Enlarge (credit: Getty Images) As many as 91,000 LG TVs face the risk of being commandeered unless they receive a just-released security upd.....»»
SINEC Security Guard identifies vulnerable production assets
Production facilities are increasingly the target of cyberattacks. Industrial companies are therefore required to identify and close potential vulnerabilities in their systems. To address the need to identify cybersecurity vulnerabilities on the shop.....»»
Critical takeover vulnerabilities in 92,000 D-Link devices under active exploitation
D-Link won't be patching vulnerable NAS devices because they're no longer supported. Enlarge (credit: Getty Images) Hackers are actively exploiting a pair of recently discovered vulnerabilities to remotely commandeer net.....»»
Cracking the code of flash floods: New insights from China"s mountainous regions
Recently, researchers have made breakthroughs in flash flood forecasting by studying how different rainfall patterns affect flash floods in China's mountainous regions. This research leads to the possibility of more accurate and localized flood warni.....»»
Scientists report that buffer and pH strongly affect the phase separation of SARS-CoV-2 N protein
In a new paper published in Molecular Biology of the Cell, the Allain lab (IBC) reported that the phase separation of the SARS-CoV-2 N protein strongly depends on the chosen buffer and pH. For example, the protonation of a single histidine side chain.....»»
Pets and the solar eclipse: How sudden increase in darkness during what should be the middle of day may affect pets
On Monday, 13 states in the U.S.—starting with Texas—will experience brief moments of nighttime darkness mid-day as the moon glides in front of the sun, blocking its rays......»»
Critical milestone: how new SEC rules affect business cybersecurity
Critical milestone: how new SEC rules affect business cybersecurity.....»»
April 2024 Patch Tuesday forecast: New and old from Microsoft
This month, we have a new product preview from Microsoft, and some older products are being prepared for end-of-support. But before we go there, March 2024 Patch Tuesday was pretty mild, with 60 unique vulnerabilities addressed. We saw updates to Mic.....»»
Threat actors are raising the bar for cyber attacks
From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, applications, and user behavior. The consequences of successful cyber attacks can.....»»
How Will the Solar Eclipse Affect Animals? NASA Needs Your Help to Find Out
NASA’s Eclipse Soundscapes project will collect observations and soundscapes recorded by the public during the April 8 total solar eclipse......»»
How do manufacturing choices affect microfiber shed?
New research in Frontiers of Environmental Science sheds light on how manufacturing choices influence microfiber release in textiles......»»
What is thermal throttling and how does it affect frame rates?
Thermal throttling is what happens if your PC gets too hot. It slows itself down to prevent permanent damage. Here's how you can prevent both......»»
Ivanti vows to transform its security operating model, reveals new vulnerabilities
Ivanti has released patches for new DoS vulnerabilities affecting Ivanti Connect Secure (SSL VPN solution) and Ivanti Policy Secure (NAC solution), some of which could also lead to execution of arbitrary code or information disclosure. Also, three mo.....»»
New AirPods Max Update is Live, Here’s How to Update
Apple’s pushed a new firmware update to the AirPods Max. If you want to keep your headphones up-to-date, here’s what you need to know. Updates for the AirPods Max don’t come as frequently as updates for the iPhone and Mac. Apple rol.....»»
NVD: NIST is working on longer-term solutions
The recent conspicuous faltering of the National Vulnerability Database (NVD) is “based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support,” says the U.S......»»
Apple rolling out new firmware update for AirPods Max
Apple is rolling out a new firmware version for AirPods Max users today. The update is the first firmware release for AirPods Max users since the end of January, but don’t expect any major changes. more….....»»