US Agencies Say Russian Hackers Compromised Defense Contractors
Hackers backed by the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government.....»»
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says
Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused. Enlarge (credit: Getty Images) Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surve.....»»
New moves for self defense—how plants can inspire future soft robotic design
For plants, cleaning the air, providing food and medicines, and preserving our ecosystem is just another day's work. In the Department of Mechanical Engineering at Carnegie Mellon University, however, plants are being studied in new ways to inspire f.....»»
Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»
Rain Technology Laptop Switchable Privacy protects against visual hackers and snoopers
Rain Technology has introduced Laptop Switchable Privacy. Designed for tier one manufacturers and supply chain providers, the embedded screen technology protects against visual hackers and snoopers for enterprises and consumers — at the office or r.....»»
Bacterial defense strategy has potential application in genome editing
Scientists who have described in a new study the step-by-step details of a bacterial defense strategy see the mechanism as a promising platform for development of a new genome-editing method......»»
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
Vulnerability is easy to exploit and allows attackers to remotely execute commands. Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mira.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»
Trying to outrun Ukrainian drones? Kursk traffic cams still issue speeding tickets.
Drones are everywhere. Traffic cameras don't care. Enlarge / Ukrainian FPV drone hunting Russian army assets along a road. Imagine receiving a traffic ticket in the mail because you were speeding down a Russian road in.....»»
Bringing environmental justice to disadvantaged communities
Not all communities in the United States face the same risks for environmental problems such as air pollution, noise and wastewater. But how can federal agencies fairly identify which areas deserve the most help?.....»»
RSA Authenticator App improves cybersecurity for federal agencies
RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»
How VPNs protect you from governments, thieves, and your boss
Governments, ISPs, and even your employer can watch every online move you make. Here's how the best VPN apps can keep your online life safe.The best VPN for iPhone apps can protect you from governments, hackers, even your employerMany countries openl.....»»
Hackers infect ISPs with malware that steals customers’ credentials
Zero-day that was exploited since June to infect ISPs finally gets fixed. Enlarge (credit: Getty Images) Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day.....»»
Researchers investigate cell-free DNA as early sepsis marker in foals
It's hard to be a horse. It's especially hard to be a newborn foal, dropped into a world of microbes and bacteria with your sole initial defense against devastating infections being the antibodies you get from your mother's milk, or colostrum. Resear.....»»
AI used by police cannot tell Black people apart: Canada"s AI laws need urgent attention, say researchers
Artificial intelligence (AI) is a powerful tool. In the hands of public police and other criminal justice agencies, AI can lead to injustice. For example, Detroit resident Robert Williams was arrested in front of his children and held in detention fo.....»»
Week in review: PostgreSQL databases under attack, new Chrome zero-day actively exploited
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PostgreSQL databases under attack Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers......»»
From recycling to food: Can we eat plastic-munching microbes?
Researchers are trying to turn plastic-eating bacteria into food source for humans. Enlarge (credit: Olga Pankova/Moment via Getty Images) In 2019, an agency within the US Department of Defense released a call for resear.....»»
Chemists succeed in upscaling a common reagent for industrial level applications
The metallic element samarium, when bound with other elements, is an incredibly useful chemical reagent for synthesizing molecules that can lead to new pharmaceuticals. Discovered in a Russian mine in 1879, the element was named after the mineral it.....»»
Engineers design lookalike drug nanocarrier to evade lung"s lines of defense
A drug-carrying molecule designed to cure disease by slipping past the lung's natural defenses offers new hope for people with chronic or deadly respiratory diseases, say its creators, researchers in assistant professor Liheng Cai's Soft Biomatter La.....»»
GitHub Enterprise Server has a critical security flaw, so patch now
A newly discovered security flaw allows hackers to elevate their privileges and thus take over vulnerable endpoints......»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»