Vulnerability in DJI drones may reveal pilot’s location
Serious security vulnerabilities have been identified in multiple DJI drones. These weaknesses had the potential to allow users to modify crucial drone identification details such as its serial number and even bypass security mechanisms that enable a.....»»
NASA"s Curiosity rover discovers a surprise in a Martian rock
Scientists were stunned on May 30 when a rock that NASA's Curiosity Mars rover drove over cracked open to reveal something never seen before on the Red Planet: yellow sulfur crystals......»»
Researchers reveal pivotal role of online communities in helping those affected by pet theft
Social media and online communities can play a crucial role for owners searching for their stolen pets, researchers have revealed, both in physically tracking them down and as a source of comfort after their loss......»»
Nature"s gender reveal: Key gene controls female flowers in Cucurbita pepo
Sex determination in cucurbits such as squash is influenced by a complex interplay of environmental, hormonal, and genetic factors, with ethylene being the primary hormone promoting female flower development......»»
Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s threat researchers. Several PoC exploits have been published, including one.....»»
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) tool. Find vulnerabilities for major operating system packages Alpine Amazo.....»»
Vulnerability in Cisco Smart Software Manager lets attackers change any user password
Yep, passwords for administrators can be changed, too. Enlarge Cisco on Wednesday disclosed a maximum-security vulnerability that allows remote threat actors with no authentication to change the password of any user, in.....»»
Microbial structures in Antarctic lake could reveal more about how life evolved
In the depths of remote Antarctic lakes, communities of microorganisms are thriving where few life forms can survive. Scientists are studying structures formed by these communities to understand more about microscopic life in these extreme environmen.....»»
AI helps reveal history of iconic Australian tree
Scientists have harnessed new developments in machine learning to look at Australian eucalypt species, unveiling their transformation over millions of years......»»
Logged forests can still have ecological value—if not pushed too far
Researchers have analyzed data from 127 studies to reveal 'thresholds' for when logged rainforests lose the ability to sustain themselves. The results could widen the scope of which forests are considered 'worth' conserving, but also show how much lo.....»»
Mega-iceberg melt affects important marine ecosystem
Scientists have for the first time taken in-situ ocean measurements during the collapse of a giant iceberg in the sub-Antarctic. These new observations reveal how ocean ecosystems may be affected if more icebergs calve due to warmer ocean temperature.....»»
Researchers reveal parsec-scale radio emission properties of dual AGNs by multi-phase-center VLBI observations
Galaxy mergers play a crucial role in the cosmological evolution of galaxies. During galaxy merging, tidal torques can trigger the accretion and feedback of the central black holes in merging galaxies, forming dual active galactic nuclei (AGNs)......»»
Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with Tre.....»»
Firmware update hides Bluetooth fingerprints
A smartphone’s unique Bluetooth fingerprint could be used to track the device’s user–until now. A team of researchers has developed a simple firmware update that can completely hide the Bluetooth fingerprint, eliminating the vulnerability. Blue.....»»
Prime Day drone deals: budget drones as cheap as $27
Prime Day is here, and we're checking out the very best Prime Day drone deals happening this week......»»
LIMITED TIME DEAL saves you 20% on the DJI Air 3!
The DJI Air 3 Fly More Combo is currently 20% off in this limited time deal, so if you’ve been thinking of buying a drone, this is it! The post LIMITED TIME DEAL saves you 20% on the DJI Air 3! appeared first on Phandroid. Drones are inc.....»»
Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
The maintainers of the Exim mail transfer agent (MTA) have fixed a critical vulnerability (CVE-2024-39929) that currently affects around 1.5 million public-facing servers and can help attackers deliver malware to users. About CVE-2024-39929 The vulne.....»»
NASA’s flagship mission to Europa has a problem: Vulnerability to radiation
"What keeps me awake right now is the uncertainty." Enlarge / An artist's illustration of the Europa Clipper spacecraft during a flyby close to Jupiter's icy moon. (credit: NASA/JPL-Caltech) The launch date for the Europ.....»»
Impacts of extreme drought on forest ecosystems reveal species-specific adaptation differences in Northeast China
A recent study from China has shed light on the profound impacts of extreme droughts on forest ecosystems, particularly in water-limited regions. The findings revealed significant differences in how various tree species respond to such stressors......»»
On NYC beaches, angry birds fight drones patrolling for sharks and struggling swimmers
A fleet of drones patrolling New York City's beaches for signs of sharks and struggling swimmers is drawing backlash from an aggressive group of seaside residents: local shorebirds......»»
Exim vulnerability affecting 1.5M servers lets attackers attach malicious files
Based on past attacks, it wouldn’t be surprising to see active targeting this time, too. Enlarge More than 1.5 million email servers are vulnerable to attacks that can deliver executable attachments to user accounts,.....»»