Advertisements


US Agencies Say Russian Hackers Compromised Defense Contractors

Hackers backed by the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government.....»»

Category: topSource:  slashdotFeb 17th, 2022

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused. Enlarge (credit: Getty Images) Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surve.....»»

Category: topSource:  arstechnicaRelated NewsAug 30th, 2024

New moves for self defense—how plants can inspire future soft robotic design

For plants, cleaning the air, providing food and medicines, and preserving our ecosystem is just another day's work. In the Department of Mechanical Engineering at Carnegie Mellon University, however, plants are being studied in new ways to inspire f.....»»

Category: topSource:  physorgRelated NewsAug 29th, 2024

Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites

Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»

Category: securitySource:  netsecurityRelated NewsAug 29th, 2024

Rain Technology Laptop Switchable Privacy protects against visual hackers and snoopers

Rain Technology has introduced Laptop Switchable Privacy. Designed for tier one manufacturers and supply chain providers, the embedded screen technology protects against visual hackers and snoopers for enterprises and consumers — at the office or r.....»»

Category: securitySource:  netsecurityRelated NewsAug 29th, 2024

Bacterial defense strategy has potential application in genome editing

Scientists who have described in a new study the step-by-step details of a bacterial defense strategy see the mechanism as a promising platform for development of a new genome-editing method......»»

Category: topSource:  informationweekRelated NewsAug 29th, 2024

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Vulnerability is easy to exploit and allows attackers to remotely execute commands. Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mira.....»»

Category: topSource:  arstechnicaRelated NewsAug 28th, 2024

Pioneer Kitten: Iranian hackers partnering with ransomware affiliates

A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Trying to outrun Ukrainian drones? Kursk traffic cams still issue speeding tickets.

Drones are everywhere. Traffic cameras don't care. Enlarge / Ukrainian FPV drone hunting Russian army assets along a road. Imagine receiving a traffic ticket in the mail because you were speeding down a Russian road in.....»»

Category: topSource:  arstechnicaRelated NewsAug 28th, 2024

Bringing environmental justice to disadvantaged communities

Not all communities in the United States face the same risks for environmental problems such as air pollution, noise and wastewater. But how can federal agencies fairly identify which areas deserve the most help?.....»»

Category: topSource:  pcmagRelated NewsAug 27th, 2024

RSA Authenticator App improves cybersecurity for federal agencies

RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»

Category: securitySource:  netsecurityRelated NewsAug 27th, 2024

How VPNs protect you from governments, thieves, and your boss

Governments, ISPs, and even your employer can watch every online move you make. Here's how the best VPN apps can keep your online life safe.The best VPN for iPhone apps can protect you from governments, hackers, even your employerMany countries openl.....»»

Category: appleSource:  appleinsiderRelated NewsAug 27th, 2024

Hackers infect ISPs with malware that steals customers’ credentials

Zero-day that was exploited since June to infect ISPs finally gets fixed. Enlarge (credit: Getty Images) Malicious hackers likely working on behalf of the Chinese government have been exploiting a high-severity zero-day.....»»

Category: topSource:  arstechnicaRelated NewsAug 27th, 2024

Researchers investigate cell-free DNA as early sepsis marker in foals

It's hard to be a horse. It's especially hard to be a newborn foal, dropped into a world of microbes and bacteria with your sole initial defense against devastating infections being the antibodies you get from your mother's milk, or colostrum. Resear.....»»

Category: topSource:  physorgRelated NewsAug 26th, 2024

AI used by police cannot tell Black people apart: Canada"s AI laws need urgent attention, say researchers

Artificial intelligence (AI) is a powerful tool. In the hands of public police and other criminal justice agencies, AI can lead to injustice. For example, Detroit resident Robert Williams was arrested in front of his children and held in detention fo.....»»

Category: topSource:  informationweekRelated NewsAug 26th, 2024

Week in review: PostgreSQL databases under attack, new Chrome zero-day actively exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PostgreSQL databases under attack Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers......»»

Category: securitySource:  netsecurityRelated NewsAug 25th, 2024

From recycling to food: Can we eat plastic-munching microbes?

Researchers are trying to turn plastic-eating bacteria into food source for humans. Enlarge (credit: Olga Pankova/Moment via Getty Images) In 2019, an agency within the US Department of Defense released a call for resear.....»»

Category: topSource:  arstechnicaRelated NewsAug 23rd, 2024

Chemists succeed in upscaling a common reagent for industrial level applications

The metallic element samarium, when bound with other elements, is an incredibly useful chemical reagent for synthesizing molecules that can lead to new pharmaceuticals. Discovered in a Russian mine in 1879, the element was named after the mineral it.....»»

Category: topSource:  physorgRelated NewsAug 23rd, 2024

Engineers design lookalike drug nanocarrier to evade lung"s lines of defense

A drug-carrying molecule designed to cure disease by slipping past the lung's natural defenses offers new hope for people with chronic or deadly respiratory diseases, say its creators, researchers in assistant professor Liheng Cai's Soft Biomatter La.....»»

Category: topSource:  pcmagRelated NewsAug 22nd, 2024

GitHub Enterprise Server has a critical security flaw, so patch now

A newly discovered security flaw allows hackers to elevate their privileges and thus take over vulnerable endpoints......»»

Category: topSource:  marketingvoxRelated NewsAug 22nd, 2024

GenAI models are easily compromised

95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024