WordPress plugin bug puts thousands of sites at risk of attack
A patch has been issued, with researchers urging WordPress admins to apply it as soon as possible......»»
Fisker"s abandoned HQ left in disarray with hazardous waste, clay models, landlord says
The bankrupt automaker's landlord says it faces "tens of thousands of dollars" in cleanup costs and damage repair......»»
Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572)
For October 2024 Patch Tuesday, Microsoft has released fixes for 117 security vulnerabilities, including two under active exploitation: CVE-2024-43573, a spoofing bug affecting the Windows MSHTML Platform, and CVE-2024-43572, a remote code execution.....»»
OpenBSD 7.6 released: security improvements, new hardware support, and more!
OpenBSD is a free, multi-platform 4.4BSD-based UNIX-like operating system. The 57th release, OpenBSD 7.6, comes with new features, various improvements, bug fixes, and tweaks. Security improvements Added -fret-clean option to the compiler, defaulting.....»»
Ivanti fixes three CSA zero-days exploited in the wild (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Ivanti has patched three additional Cloud Service Appliance (CSA) zero-day flaws, which have been exploited by attackers in conjuction with a zero-day bug the company accidentally fixed in September. The fixed zero-days “We are aware of a limit.....»»
Can visiting genocide memorials make you more empathic?
Each year, people visit museums and memorial sites as part of educational interventions organized around the remembrance of a genocide or an atrocity. Many schools visit a concentration camp as part of Holocaust education, such as Auschwitz-Birkenau......»»
Chinese hack of US ISPs shows why Apple is right about backdoors for law enforcement
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US. What’s notable about the attack is that it compromised security backdoors deliberately created t.....»»
iPhone Mirroring is currently a privacy and legal risk on work Macs
One of the new features of iOS 18 and macOS Sequoia is iPhone Mirroring – but using this with a personal iPhone on a work Mac currently creates a privacy risk for employees, and a legal risk for businesses. The problem, as cybersecurity company.....»»
BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is of the essence when Fortune 500 security teams find themselves waking up to a Code Red vu.....»»
Dashlane Credential Risk Detection prevents credential-based breaches
Dashlane launched Credential Risk Detection, a solution that continuously monitors and detects at-risk credential activity in real-time across the workforce, whether employees use a password manager or not. The web extension-based solution is the lat.....»»
Injured comb jellies can fuse into a single organism
Ctenophores merge with neighbors at wound sites, making animals with duplicate parts. Comb jellies, technically known as ctenophores, are one of the weirdest creatures on Earth. T.....»»
Microsoft Word may delete your files — here’s how to avoid it
A new bug in Microsoft Word is randomly deleting user files, but we know how to work around it......»»
Colleges could benefit from taking a data-driven look at hostility toward Jews on campus
In the year that has passed since the Oct. 7 attack by Hamas on Israel, college campuses have been embroiled in debates about the resulting conflict. A major focus of these debates has been the surge in reports of antisemitic harassment of Jewish stu.....»»
Hurricane Helene"s reach was shocking, another example of how climate change "is here and now," scientists say
Many people were stunned to see the intense flooding and devastation caused by Hurricane Helene in western North Carolina communities, located inland and tucked thousands of feet above sea level in the Blue Ridge Mountains......»»
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in v.....»»
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and.....»»
Study of global primate populations reveals predictors of extinction risk
An international team of biologists, planetary scientists and conservationists has conducted a large-scale study of non-human primate populations around the world to gauge their risk of extinction due to climate change......»»
No more bricked iPads: Apple fixes several bugs in iOS, iPadOS, macOS updates
Apple claims it fixed a critical bug that bricked M4 iPads. On Thursday, Apple released the first software updates for its devices since last month's rollout of iOS 18 and macOS S.....»»
YouTube fixes glitch that wrongly removed accounts, deleted videos
YouTube confirmed all channels back online after mistaken removals. YouTube confirmed Friday that a bug mistakenly removing seemingly thousands of accounts wrongly marked as shari.....»»
Phage cocktail shows promise against drug-resistant bacteria
Researchers have a new battle tactic to fight drug-resistant bacterial infections. Their strategy involves using collections of bacteriophages, viruses that naturally attack bacteria. In a new study, researchers at the University of Chicago Pritzker.....»»
The first iOS 18 update fixes a major bug with Apple’s Passwords app
You can now download iOS 18.0.1 on your iPhone. The update includes a number of security fixes that address problems with the original iOS 18 release......»»