Virus undercuts fungus"s attacks on wheat
A naturally occurring virus co-discovered by Agricultural Research Service (ARS) and university scientists may offer a way to undermine a costly fungal threat to wheat, barley and other small-grain crops......»»
BlackByte affiliates use new encryptor and new TTPs
BlackByte, the ransomware-as-a-service gang believed to be one of Conti’s splinter groups, has (once again) created a new iteration of its encryptor. “Talos observed some differences in the recent BlackByte attacks. Most notably, encrypte.....»»
Cybercriminals capitalize on travel industry’s peak season
Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to identi.....»»
PSA: Watch out for phishing attacks with fake banking app updates
A security researcher has discovered a phishing attack intended to fool iPhone users into installing what is claimed to be an update to their banking app. The attack works despite iOS protections because what is actually being ‘installed’ is a.....»»
Lateral movement: Clearest sign of unfolding ransomware attack
44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with kn.....»»
China proposes magnetic launch system for sending resources back to Earth
In his famous novel "The Moon is a Harsh Mistress," Robert A. Heinlein describes a future lunar settlement where future lunar residents ("Loonies") send payloads of wheat and water ice to Earth using an electromagnetic catapult......»»
Locked in a glacier: Virus adaptations to extreme weather provide climate change insights
Ancient viruses preserved in glacial ice hold valuable information about changes in Earth's climate, a new study suggests......»»
Widespread culling of crocodiles is not an effective way to stop attacks on humans, study shows
Education and community awareness, removal of problem animals and exclusion areas are significantly more effective in reducing saltwater crocodile attacks in the Northern Territory than a widespread culling program to reduce crocodile numbers, accord.....»»
Adversaries love bots, short-lived IP addresses, out-of-band domains
Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. In.....»»
Scientists discover novel receptor recognition mechanism for alphavirus
Eastern Equine Encephalitis virus (EEEV), an alphavirus, can cause central nervous system infections that can lead to severe encephalitis with a mortality rate of over 30%......»»
Breaking boundaries: The unexpected routes of minerals in crop growth
Imagine plants not just sipping nutrients dissolved in water, but actually munching on tiny mineral particles straight from the soil. A study sheds light on how wheat and lettuce aren't just passive feeders—they actively grab, transport, and utiliz.....»»
Most ransomware attacks occur between 1 a.m. and 5 a.m.
There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock moni.....»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Ancient microbes linked to evolution of human immune proteins
When you become infected with a virus, some of the first weapons your body deploys to fight it are those passed down to us from our microbial ancestors billions of years ago. According to new research from The University of Texas at Austin, two key e.....»»
Honey bees may play key role in spreading viruses to wild bumble bees
Honey bees may play a role in increasing virus levels in wild bumble bees each spring, according to researchers at Penn State who analyzed seasonal trends of parasite and virus transmission in bees......»»
Kids who survived shooting at Kansas City Super Bowl parade are scared, suffering panic attacks and sleep problems
Six months after Gabriella Magers-Darger's legs were burned by sparks from a ricocheted bullet at the Kansas City Chiefs Super Bowl parade in February, the 14-year-old is ready to leave the past behind......»»
Average DDoS attack costs $6,000 per minute
2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack duration increases DDoS attacks surged 106% from H2 2023 to H1 2024. The.....»»
A more varied diet would help the world"s economy as well as its health
More than 75% of the food consumed in the world today comes from just 12 plant and five animal species. The over-dependence on this small selection, which includes rice, maize and wheat, damages the environment and human health, and it makes our glob.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
Organizations turn to biometrics to counter deepfakes
The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations, according to iProov. Perce.....»»
Protecting academic assets: How higher education can enhance cybersecurity
Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally ident.....»»