Uncategorized

India launches contest to build homegrown web browser

India launches contest to build homegrown web browser 10/08/2023 at 07:02 By Simon Sharwood Almost certainly based on a FOSS engine, but with tweaks for the nation’s use cases India’s government has decided the nation needs an indigenous web browser and has launched the Indian Web Browser Development Challenge (IWBDC) to make it happen.… This […]

React to this headline:

Loading spinner

India launches contest to build homegrown web browser Read More »

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers 10/08/2023 at 05:19 By Thomas Claburn Seven ex-tweeps bring the receipts, as the kids say Twitter has been sued by seven former employees who allege they were discriminated against on the basis of sex, age, race, and/or for taking medical

React to this headline:

Loading spinner

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older, female engineers Read More »

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers 10/08/2023 at 03:47 By Thomas Claburn Seven women bring the receipts, as the kids say Twitter has been sued by seven female former employees who allege they were discriminated against on the basis of sex, age, race, and/or for taking

React to this headline:

Loading spinner

Lawsuit: We’ve got the stats to prove Twitter ax fell unfairly on older female engineers Read More »

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends 10/08/2023 at 02:32 By Jessica Lyons Hardcastle New international laws needed ‘to bring accountability’ Ukraine’s cybersecurity boss Victor Zhora says he expects Russia’s online attacks against his country – including cyber “war crimes” – will continue long after the physical war ends

React to this headline:

Loading spinner

Ukraine’s Victor Zhora: Russia’s cyber ‘war crimes’ will continue after ground invasion ends Read More »

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’ 10/08/2023 at 02:19 By Dan Robinson It may actually be the anti-superconductor, quips one research team Enthusiasm over the purported room temperature superconductor LK-99 is waning further as more research teams are unable to reproduce the original findings. In fact, one at a

React to this headline:

Loading spinner

Never mind room temperature, LK-99 slammed as ‘not a superconductor at all’ Read More »

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks 10/08/2023 at 02:03 By Tobias Mann It’s like a nesting doll of security flaws AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running vulnerable machine.… This article is

React to this headline:

Loading spinner

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks Read More »

US Supreme Court allows ‘ghost guns’ to fall under federal purview

US Supreme Court allows ‘ghost guns’ to fall under federal purview 10/08/2023 at 01:33 By Brandon Vigliarolo 3D printers beware, Biden’s on the Build-Your-Own-Blunderbuss beat The Biden administration’s crackdown on 3D-printed gun parts can be allowed to be enforced, at least temporarily, after the US Supreme Court voted to let the rule to stand.… This

React to this headline:

Loading spinner

US Supreme Court allows ‘ghost guns’ to fall under federal purview Read More »

CLI-beautifying ANSI escape sequences can also make your log files a security threat

CLI-beautifying ANSI escape sequences can also make your log files a security threat 10/08/2023 at 00:46 By Brandon Vigliarolo When you can’t even cat your telemetry safely, who can you trust? Black Hat  Spend much time working in a command-line terminal and you’re likely to have at least a passing familiarity with ANSI escape sequences.

React to this headline:

Loading spinner

CLI-beautifying ANSI escape sequences can also make your log files a security threat Read More »

X tries to win back advertisers with brand safety promises

X tries to win back advertisers with brand safety promises 10/08/2023 at 00:03 By Brandon Vigliarolo Meanwhile, platform keeps paying creators a share of ad revenue, but without similar safety features The site formerly known as Twitter is trying yet again to lure advertisers back, this time with a series of brand safety concessions that

React to this headline:

Loading spinner

X tries to win back advertisers with brand safety promises Read More »

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you 09/08/2023 at 23:49 By Iain Thomson If you’re so smart, prove it by safeguarding our infrastructure Black Hat  In a surprise announcement at the opening Black Hat keynote today, DARPA unveiled what it’s called an AI Cyber Challenge (AIxCC).

React to this headline:

Loading spinner

DARPA tells AI world: Make a model that secures software, there’s $20M in it for you Read More »

Say hello to Downfall, another data-leaking security hole in several years of Intel chips

Say hello to Downfall, another data-leaking security hole in several years of Intel chips 09/08/2023 at 22:47 By Thomas Claburn It is with a heavy heart that we must announce that the boffins are at it again Black Hat  Googlers have lately found not one but two more security vulnerabilities in Intel and AMD processors

React to this headline:

Loading spinner

Say hello to Downfall, another data-leaking security hole in several years of Intel chips Read More »

Researchers discover algorithm to create shapes that roll down pre-determined paths

Researchers discover algorithm to create shapes that roll down pre-determined paths 09/08/2023 at 22:35 By Lindsay Clark Lopsided solids promise applications in quantum mechanics and medicine Researchers have developed a method to construct solid objects that roll down pre-determined paths, which they reckon could have applications in quantum mechanics and medicine.… This article is an

React to this headline:

Loading spinner

Researchers discover algorithm to create shapes that roll down pre-determined paths Read More »

Rapid7 prepares to toss 18% of workforce to cut costs

Rapid7 prepares to toss 18% of workforce to cut costs 09/08/2023 at 21:03 By Paul Kunert Operating expenses almost as high as actual turnover in latest quarterly numbers Rapid7 is initiating a restructuring process that will involve shedding 18 percent of its workforce after net losses widened over the most recent quarter.… This article is

React to this headline:

Loading spinner

Rapid7 prepares to toss 18% of workforce to cut costs Read More »

Large-user applications vulnerable to dependency confusion attacks

Large-user applications vulnerable to dependency confusion attacks 09/08/2023 at 19:48 By A OX Security report found applications with more than 1 billion users are using dependencies which are vulnerable to dependency confusion attacks. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Large-user applications vulnerable to dependency confusion attacks Read More »

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs 09/08/2023 at 19:31 By Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. Called Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569), the novel methods follow the disclosure of another newly discovered security vulnerability affecting AMD’s Zen 2 architecture-based

React to this headline:

Loading spinner

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs Read More »

Social media for research and threat intelligence

Social media for research and threat intelligence 09/08/2023 at 19:18 By Learn about threat intelligence on this episode of The Security Podcasts with Igal Lytzki, Incident Response team leader at Perception Point. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Social media for research and threat intelligence Read More »

Can ‘Mad Libs for incident response’ prevent the next MOVEit?

Can ‘Mad Libs for incident response’ prevent the next MOVEit? 09/08/2023 at 18:17 By Jessica Lyons Hardcastle IBM X-Force lead says yes Black Hat  While MOVEit is just the latest example of a managed file transfer (MFT) tool being exploited by criminals to maximize the amount of data – and money –— they can grab,

React to this headline:

Loading spinner

Can ‘Mad Libs for incident response’ prevent the next MOVEit? Read More »

China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign

China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign 09/08/2023 at 17:47 By Hackers associated with China’s Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia, Europe, and North America from 2021 to 2023. Cybersecurity firm Recorded Future attributed the intrusion set to a nation-state group

React to this headline:

Loading spinner

China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign Read More »

The Impact of Patient Care on Healthcare Cybersecurity Practices

The Impact of Patient Care on Healthcare Cybersecurity Practices 09/08/2023 at 17:03 By The role humans play in cybersecurity generally focuses on how people can be the weakest link in an organization’s defense structure. However, when it comes to securing the healthcare industry, people are still paramount, but for quite different reasons. This article is

React to this headline:

Loading spinner

The Impact of Patient Care on Healthcare Cybersecurity Practices Read More »

Scroll to Top