The most frequently reported vulnerability types and severities
Bishop Fox collected and analyzed publicly disclosed reports from January to July 2022 to better understand the most frequently reported vulnerability types, the highest-disclosed bounties, and more. In this Help Net Security video, Carlos Yanez, Sec.....»»
Large radio bubble detected in galaxy NGC 4217
An international team of astronomers has performed radio observations of a star-forming galaxy known as NGC 4217. The observational campaign detected a large radio bubble in the galaxy's halo. The finding was reported in a paper published September 2.....»»
Daily 5 report for Oct. 4: Rough times for EV makers, but future looks good
EV maker Rivian reported disappointing Q3 sales, but electrification news should improve next week as The Battery Show highlights the latest technologies......»»
Damage and insurance losses from Hurricane Helene could cost billions
Insurance losses are expected to reach roughly $6.4 billion, and insurance providers may reevaluate how they price policies and what types of coverage they offer......»»
If you think your robot vacuum is watching you, you might not be wrong
A new report finds a worrisome Ecovacs vulnerability.....»»
X fined over $400,000 for refusing to address child abuse concerns
Elon Musk's X is at odds with the Australian government over its policies regarding child abuse. X, formerly Twitter, owes the Australian government some money.Bloomberg reported on Thursday that Elon Musk's microblogging site has to pay the eq.....»»
Verizon: Service Restored Following Yesterday’s Network Outage
Some time around 7:45am on the west coast, reports started popping up that Verizon was experiencing a network outage. At its absolute peak, roughly 1.6 million users reported issues with the network, according to Downdetector. How accurate that figur.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Why trolls, extremists, and others spread conspiracy theories they don’t believe
Some just want to promote conflict, cause chaos, or even just get attention. There has been a lot of research on the types of people who believe conspiracy theories, and their rea.....»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Attackers exploit critical Zimbra vulnerability using cc’d email addresses
When successful, attacks install a backdoor. Getting it to work reliably is another matter. Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimb.....»»
Filament structure found to activate and regulate CRISPR-Cas "protein scissors"
CRISPR-Cas systems help to protect bacteria from viruses. Several different types of CRISPR-Cas defense systems are found in bacteria, which differ in their composition and functions. Among them, the most studied proteins today are Cas9 and Cas12, al.....»»
Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519)
Attackers are actively exploiting CVE-2024-45519, a critical Zimbra vulnerability that allows them to execute arbitrary commands on vulnerable installations. Proofpoint’s threat researchers say that the attacks started on September 28 – s.....»»
Swiss glaciers are receding again after 2 punishing years and despite a good start to 2024
The volume of Switzerland's glaciers shrank again this summer, compounding the negative impact of climate change after a devastating two-year run that depleted the ice by more than 10%, scientific experts reported Tuesday......»»
Balbix D3 accelerates vulnerability mitigation
Balbix unveild Balbix D3, the latest version of its exposure management platform. Packed with AI innovations, Balbix D3 is designed to help cybersecurity teams mitigate critical exposures faster than ever before, protecting organizations against emer.....»»
Dyson’s first dedicated wet floor cleaner is built to tackle all types of spills
The Dyson WashG1 is the company's first dedicated wet floor cleaner, capable of separating out wet and dry debris for easier maintenance and improved cleaning......»»
Stellantis recalls 194,000 Jeep plug-in hybrids over fire risks
Stellantis is recalling 194,000 Jeep plug-in hybrids over fire risks after 13 fires were reported,.....»»
Motorola is back with another nostalgic ThinkPhone
Motorola's back with a new Lenovo ThinkPad-inspired smartphone, the ThinkPhone 25. Aimed primarily at business types, it looks like anyone can buy it......»»
Epic sues Google and Samsung, again under the guise of fighting for ‘all developers’
Epic today filed a new lawsuit against Google and Samsung, four years after first suing Google over its app store monopoly. This time around, as reported by our friends at 9to5Google, Epic is focused on Samsung’s “Auto Blocker” feature that lim.....»»
Apple backs out of backing OpenAI, report claims
Apple dropped out of the $6.5 billion investment round at the 11th hour. Enlarge / The Apple Park campus in Cupertino, California. (credit: Anadolu Agency | Getty) A few weeks back, it was reported that Apple was explori.....»»
Verizon customers face mass-scale outage across the US
More than 100,000 reports appeared on Downdetector. Enlarge / A Downdetector map showing where Verizon outages are reported. (credit: Downdetector) Wireless customers of Verizon and AT&T have found that they cannot make.....»»