#vulnerability

[ follow ]
www.theguardian.com
1 week ago
FC Barcelona

Barcelona v PSG: Champions League quarter-final, second leg live

Barcelona has faced three second-leg comebacks in the Champions League post-2015, highlighting their vulnerability in such situations. [ more ]
Music
Bustle
1 week ago
Music

These Taylor Swift Lyrics Prove She's The Queen Of "Tortured" Pop

Taylor Swift's song lyrics reflect deep emotions and vulnerability throughout her career. [ more ]
www.nytimes.com
1 month ago
Music

Tyla Avoids a Bad Romance, and 9 More New Songs

Tyla's debut album merges African rhythms with English lyrics and R&B delivery
Olivia Rodrigo's song 'So American' explores the vulnerability of young women to physical attraction and charming words. [ more ]
www.sbsun.com
1 month ago
Music

Soulful singer Teddy Swims lets his guard down with new music

Teddy Swims aims for vulnerability in music and life
He gained recognition through cover songs before writing original material [ more ]
Pitchfork
1 month ago
Music

Tierra Whack: World Wide Whack

Whack's album showcases rawness and vulnerability through dark themes and gallows humor.
She explores heavy topics like self-harm, suicidal ideation, anxiety, and depression in her music. [ more ]
Queerty
1 month ago
Music

Ben Platt's folk era, Dylan Mulvaney reclaims her "Girlhood", Tsatsamis channels Bronski Beat

Kacey Musgraves presents a sixth studio album blending genres like country, folk, and soft rock for a soothing springtime renewal.
Ben Platt showcases a vulnerable and folk-inspired sound in his latest track 'Andrew', a preview of his upcoming album Honeymind. [ more ]
Consequence
1 month ago
Music

Tierra Whack drops new album WORLD WIDE WHACK

WORLD WIDE WHACK is Tierra Whack's debut album featuring original images and videos.
The album explores themes of vulnerability, belonging, and perseverance, reflecting Whack's personal journey. [ more ]
moreMusic
Kotaku
1 week ago
Video games

Final Fantasy VII: The Kotaku Retro Review

Facing vulnerability and owning actions lead to true liberation and inspiration for self-authenticity. [ more ]
SFGATE
2 weeks ago
Los Angeles

Northern California student reported missing in Los Angeles area

The family of a missing woman from Northern California is actively searching in Los Angeles with LAPD support.
Noelle Lynch, a vulnerable 23-year-old, disappeared after being in an accident and exhibiting concerning behavior. [ more ]
UK news
www.independent.co.uk
2 weeks ago
UK news

Student died after using two to three big bottles' of laughing gas a day

Long-term laughing gas use may contribute to fatal health issues.
The student's environment indicated vulnerability and a history of substantial laughing gas consumption. [ more ]
www.independent.co.uk
1 month ago
UK news

Man took girl who could not swim out of her depth in sea and raped her, court told

The accused is charged with rape and sexual assault after allegedly taking advantage of a vulnerable victim in the sea.
The defendant coerced the victim into sexual acts by exploiting her vulnerability and lack of swim ability. [ more ]
www.independent.co.uk
1 month ago
UK news

Police harassed me': Woman tells of terrifying torment of sleeping rough

Women sleeping rough seek hidden spots for safety reasons.
Criminal Justice Bill could criminalize homelessness, especially impacting women on the streets. [ more ]
moreUK news
Mental health
www.bostonherald.com
2 weeks ago
Mental health

How do wildfires affect mental health? A new study examines the connection

Wildfires have significant mental health impacts, leading to an increase in prescriptions for depression and anxiety treatments.
Research on mental health effects of wildfires is scarce compared to studies on cardiovascular and respiratory impacts. [ more ]
Calm Sage - Your Guide to Mental and Emotional Well-being
1 month ago
Mental health

Vulnerability Hangover: What Is It And How to Cope With Its Effects

Feeling uncomfortable with vulnerability
Understanding vulnerability hangover [ more ]
www.theguardian.com
1 month ago
Mental health

Convenience therapy and quick fixes could be harmful to health | Letters

Therapy helps people seek emotional intimacy and authentic relationships.
AI therapy raises questions about authenticity and true connection. [ more ]
Calm Sage - Your Guide to Mental and Emotional Well-being
2 months ago
Mental health

The Psychology Behind Deflection As a Defense Mechanism

Deflection is a common defense mechanism to shift focus away from vulnerabilities.
Deflection serves as a protective shield to avoid scrutiny and criticism in social interactions. [ more ]
www.theguardian.com
3 months ago
Mental health

The big idea: is couples therapy a waste of time?

Schwarzenegger's memoir-cum-self-help book Be Useful opens on his lowest point, but he refuses to dwell on it and instructs readers to Google the story instead.
Schwarzenegger shows resistance to displays of vulnerability, even when discussing attending couples therapy with his ex-wife. [ more ]
moreMental health
The New Yorker
2 weeks ago
Fashion & style

"Love Song, with Removed Cyst"

The poem describes a moment of intimate care and vulnerability between two individuals.
The speaker reflects on their perception of sanity and uses vivid imagery to convey their emotions. [ more ]
JavaScript
SVR.JS Blog
1 week ago
JavaScript

IMPORTANT! Update Node.JS to 18.20.1, 20.12.1, 21.7.2 or newer!

Older Node.JS versions had CVE-2024-27982 vulnerability with HTTP request smuggling potential.
Space before Content-Length header could allow attackers to smuggle in a second request. [ more ]
SVR.JS Blog
1 month ago
JavaScript

IMPORTANT! Update Node.JS to 18.19.1, 20.11.1, 21.6.2 or newer!

Sending specially crafted HTTP request leads to resource exhaustion and denial of service in older versions of Node.JS.
The vulnerability involves lack of limitations on chunk extension bytes causing CPU and network bandwidth exhaustion. [ more ]
moreJavaScript
Harvard Business Review
1 month ago
Business

How Pixar Fosters a Culture of Vulnerability at Work

Sharing personal stories at work is essential for well-being and success, but must be approached strategically.
Leaders should encourage vulnerability and authenticity by breaking down workplace barriers to storytelling. [ more ]
Privacy professionals
Theregister
1 month ago
Privacy professionals

Windows Server memory leak in patch confirmed by Microsoft

Microsoft introduced a memory leak in March patches affecting Windows domain controllers.
A patch has been issued to fix the memory leak issue, causing domain controllers to crash. [ more ]
ReadWrite
2 months ago
Privacy professionals

Hackers actively targeting severe authentication bypass flaw in ConnectWise software

Vulnerability in ConnectWise ScreenConnect allows easy exploitation
Malicious hackers actively exploiting the flaw [ more ]
TechCrunch
2 months ago
Privacy professionals

Researchers warn high-risk ConnectWise flaw under attack is 'embarrassingly easy' to exploit | TechCrunch

High-risk vulnerability in ConnectWise ScreenConnect is easy to exploit
Malicious hackers actively exploiting the flaw [ more ]
Tripwire
2 months ago
Privacy professionals

Rhysida ransomware cracked! Free decryption tool released

Researchers have discovered a vulnerability in the Rhysida ransomware that allows for encrypted files to be unscrambled.
A Rhysida ransomware recovery tool has been developed and is being distributed to the public through the Korea Internet and Security Agency. [ more ]
The Verge
2 months ago
Privacy professionals

Twitter alternative spouts a massive leak

Spoutible's API had a vulnerability that allowed hackers to take full control of users' accounts.
Hackers could obtain users' personal information, hashed passwords, 2FA codes, and password reset tokens. [ more ]
NBC News
3 months ago
Privacy professionals

U.S. cyber watchdog issues emergency directive to federal agencies about remote work software

The U.S. cyber watchdog agency issued an emergency directive requiring federal agencies to protect against a dangerous vulnerability in a software program.
The vulnerability in the software program, Ivanti Connect Secure, has allowed hackers to gain significant access to businesses and government agencies. [ more ]
morePrivacy professionals
San Francisco Bay Times
1 month ago
SF LGBT

About Our Cover: 3.21.24 - San Francisco Bay Times

Personal connection fosters empathy and solidarity
Vulnerability challenges assumptions and biases [ more ]
www.standard.co.uk
1 month ago
London

Two 13-year-old girls from Sussex missing in Stockwell

Search launched for missing 13-year-old girls in Stockwell.
Descriptions of missing 13-year-old girls Ruby and Lacey. [ more ]
Time Out London
1 month ago
London

Revealed: the London neighbourhoods most vulnerable to heatwaves

Climate change will lead to hotter summers in London, impacting certain boroughs more than others.
Hackney, Tower Hamlets, Islington, and Camden are identified as the most vulnerable boroughs to urban heatwaves. [ more ]
ReadWrite
1 month ago
Artificial intelligence

Hackers can read your encrypted AI-assistant chats

Researchers found vulnerability in cloud-based AI assistants like Chat-GPT, enabling interception of conversations by hackers.
Hackers can decrypt responses by intercepting small tokens sent by chatbots like Chat-GPT, exposing confidential information. [ more ]
Ars Technica
3 months ago
Artificial intelligence

New attack steals AI secrets from GPUs made by Apple, AMD, and Qualcomm

Demand for GPU chips is increasing as companies rely on them for running large language models and processing data at scale.
Researchers have uncovered a vulnerability in multiple brands of GPUs, including Apple, Qualcomm, and AMD chips, that could allow attackers to steal data from a GPU's memory. [ more ]
Information security
CyberScoop
1 month ago
Information security

What resources do small utilities need to defend against cyberattacks?

Small utilities face cyberattack risks
Limited resources hinder small utilities' cybersecurity [ more ]
Theregister
2 months ago
Information security

Exploiting critical ConnectWise bug is 'embarrassingly easy'

ConnectWise ScreenConnect vulnerability requires urgent patch due to its severity rating, including RCE and path traversal flaws.
Researchers quickly developed working exploits, emphasizing the ease and severity of the vulnerabilities. [ more ]
Zero Day Initiative
2 months ago
Information security

Zero Day Initiative - The February 2024 Security Update Review

Adobe released six patches addressing 29 CVEs, with fixes for Acrobat and Reader being prioritized due to critical-rated code execution bugs.
Microsoft released a patch for a 0-day discovered by the ZDI Threat Hunting Team. [ more ]
TechCrunch
2 months ago
Information security

Researchers say attackers are mass-exploiting new Ivanti VPN flaw | TechCrunch

Hackers are mass exploiting a third vulnerability in Ivanti's VPN appliance, affecting thousands of organizations worldwide.
One of the newly discovered flaws is a server-side request forgery flaw, which is being actively exploited by hacking groups. [ more ]
Zero Day Initiative
2 months ago
Information security

Zero Day Initiative - CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability

Ivanti Avalanche, an enterprise mobility management program, has recently been patched for a remote code execution vulnerability.
Successful exploitation of the vulnerability could allow an authenticated attacker to execute code in the context of SYSTEM. [ more ]
TechCrunch
2 months ago
Information security

Apple fixes zero-day bug in Apple Vision Pro that 'may have been exploited' | TechCrunch

Apple releases first security patch for Vision Pro
Patch fixes vulnerability in WebKit that may have been exploited by hackers [ more ]
moreInformation security
Tech industry
www.npr.org
1 month ago
Tech industry

Health industry struggles to recover from cyberattack on a unit of UnitedHealth

Cyberattack on Change Healthcare causes billing issues for medical practices
Healthcare system vulnerable to hackers with shortcomings in response [ more ]
WSJ
4 months ago
Tech industry

Apple Makes Security Changes to Protect Users From iPhone Thefts

Apple is addressing a security vulnerability that allowed iPhone thieves to access customer accounts and steal information.
A new iOS setting called Stolen Device Protection is being rolled out to beta testers to defend against these attacks. [ more ]
moreTech industry
TODAY.com
1 month ago
Parenting

Bradley Cooper didn't connect with his newborn baby. Me either, but I got shamed for it

Struggles with bonding as a parent are common, including for public figures like Bradley Cooper.
Sharing vulnerabilities about parenthood can lead to mixed reactions, from support to criticism. [ more ]
Harvard Gazette
1 month ago
Coronavirus

Time to finally stop worrying about COVID? - Harvard Gazette

CDC updated COVID-19 isolation policy from 5 days to 1 after symptoms improve
William Hanage emphasizes the continued vulnerability of some populations despite CDC updates. [ more ]
www.independent.co.uk
1 month ago
Social justice

Girl at risk of self-harm restrained and stripped twice by male prison officers

The girl in a young offenders' institution was forcibly stripped by male prison guards, sparking shock and concern.
Wetherby young offenders institution faces challenges with high self-harm rates among children in care. [ more ]
The Art Newspaper - International art news and events
1 month ago
Design

We could weep-Francesco Vezzoli to unveil teary masterpieces in Venice

Francesco Vezzoli's exhibition features tear-embroidered artworks at Museo Correr in Venice.
Vezzoli aims to challenge the absence of tears in art history and advocate for the importance of vulnerability and intimacy in art. [ more ]
www.theguardian.com
5 months ago
Design

Nightmarish, playful, erotic: the revelatory Sydney show of art titan Louise Bourgeois

The Art Gallery of NSW is exhibiting a summer exhibition of Louise Bourgeois's work, including a documentary clip of the artist peeling a tangerine, which symbolizes a formative and damaging childhood experience.
The exhibition reveals the vulnerable core of Bourgeois, who was known for her prickly public persona and spider sculptures.
The clip is buried in the bowels of the exhibition, emphasizing the need to navigate through beauty and analysis to find enlightenment. [ more ]
Pitchfork
1 month ago
Music

Watch Paramore's New "Thick Skull" Video

Being in a band involves vulnerability and self-discovery through music creation.
Growing up involves letting go of the need for validation and fitting into a specific mold. [ more ]
Tiny Buddha
2 months ago
Career

How Admitting Your Weaknesses Could Actually Make You Stronger - Tiny Buddha

Admitting weaknesses is a sign of strength, not weakness.
Culture fears showing weaknesses, but vulnerability is valuable. [ more ]
Slate Magazine
2 months ago
Career

My Aunt Has Fallen in Love With a Scammer

Romance scammers often target vulnerable individuals, like those who are lonely and not tech-savvy.
It can be difficult to reason with someone who is caught up in a romance scam, even with evidence and explanations. [ more ]
Tiny Buddha
5 months ago
Career

Trapped in Shame: How I Found Mental Freedom After Prison - Tiny Buddha

Shame thrives in secrecy, silence, and judgment, but with empathy and vulnerability, it cannot survive.
Shame is an insidious disease that lives in isolation, separation, and disconnection.
By shining a light on shame and being vulnerable, individuals can begin their journey towards healing and self-acceptance. [ more ]
Pitchfork
2 months ago
Music

Watch Fever Ray's New "Shiver" Video

Speculating about the story behind skeletons
Exploring themes of love and vulnerability [ more ]
Tiny Buddha
2 months ago
Writing

22 Things That Have Helped Me Grow and Love Myself - Tiny Buddha

Learning to love yourself is important
Being vulnerable and accepting your flaws is a sign of strength [ more ]
https://www.rogerebert.com/
2 months ago
Writing

Edward Zwick Is Revisiting His Past, Wondering About His Future | Interviews | Roger Ebert

The author found writing a book to be liberating because it allowed him to express his own thoughts and feelings without worrying about others' opinions.
Writing a memoir in the first-person was a vulnerable and revealing experience for the author, but it was also liberating and part of the process of creation. [ more ]
www.theguardian.com
3 months ago
Writing

It was a real trauma': the TS Eliot poetry prize winner on his turbulent upbringing

Jason Allen-Paisant wins the TS Eliot prize for poetry with his book Self-Portrait as Othello.
The book explores themes of masculinity, Black masculinity, and vulnerability, addressing questions about the character of Othello that are not addressed in the play. [ more ]
ReadWrite
2 months ago
Privacy professionals

Cyber security agency warns this WordPress widget might leak data

A critical security vulnerability has been found in the Cryptocurrency Widgets WordPress plugin that could expose user data.
The vulnerability stems from insufficient escaping on user-supplied input and lack of preparation on SQL queries. [ more ]
Axios
2 months ago
Information security

New security flaw in flaw in Microsoft's code development and testing environment

A flaw in Microsoft's code development and testing environment could impact over 70,000 open-source projects.
The vulnerability in Azure Pipelines allows hackers to inject malicious code into source code and other projects hosted in code testing environments. [ more ]
ComputerWeekly.com
3 months ago
Information security

Cisco fixes high-impact flaw in unified comms platform | Computer Weekly

A critical vulnerability in Cisco Unity Connection could allow unauthenticated and remote attackers to gain root privileges
Cisco has released software updates to address the vulnerability [ more ]
WSJ
4 months ago
Privacy professionals

Apple Makes Security Changes to Protect Users From iPhone Thefts

Apple is addressing a security vulnerability that allowed iPhone thieves to access customer accounts and steal information.
A new iOS setting called Stolen Device Protection is being rolled out to beta testers to defend against these attacks. [ more ]
WSJ
4 months ago
Privacy professionals

Apple Makes Security Changes to Protect Users From iPhone Thefts

Apple is addressing a security vulnerability that allowed iPhone thieves to access customer accounts and steal information.
A new iOS setting called Stolen Device Protection is being rolled out to beta testers to defend against these attacks. [ more ]
WSJ
4 months ago
Privacy professionals

Apple Makes Security Changes to Protect Users From iPhone Thefts

Apple is addressing a security vulnerability that allowed iPhone thieves to access customer accounts and steal information.
A new iOS setting called Stolen Device Protection is being rolled out to beta testers to defend against these attacks. [ more ]
The Comics Journal
2 months ago
Books

"Girls Like Us": Karina Shor & Natalie Norris in Conversation about the Perils and Triumphs of Making Graphic Memoirs About Trauma - The Comics Journal

Natalie Norris and Karina Shor both published their debut graphic novel memoirs, choosing to depict the most painful and traumatic parts of their lives.
Natalie Norris chose her story based on the structure of the story, while Karina Shor felt that her traumatic story carried the most emotional weight. [ more ]
ESPN.com
2 months ago
Liverpool FC

Jurgen Klopp has announced he's leaving Liverpool. Now what?

Jurgen Klopp announced his decision to leave Liverpool at the end of the season with honesty and vulnerability.
Klopp's announcement highlights the importance of acknowledging one's limitations and prioritizing mental health in a macho sports environment. [ more ]
InfoWorld
2 months ago
Web development

Mobb unveils vulnerability fixer for GitHub users

Mobb Fixer provides developers with code fixes for security alerts in GitHub pull requests.
Mobb's remediation technology combines security research and traditional semantic analysis with generative AI to enhance code coverage. [ more ]
Developer Tech News
3 months ago
Information security

GitHub rotates credentials following vulnerability discovery

GitHub has rotated encryption keys following the discovery of a vulnerability that could have enabled threat actors to steal credentials.
GitHub addressed another high-severity vulnerability this week that could have allowed elevation of privilege. [ more ]
Independent.ie
3 months ago
Public health

Number of people who died while homeless was up 30pc in 2020

The number of homeless deaths in Ireland increased by more than 31% in 2020 compared to the previous year.
Three out of four of those who died were male, and more than half of the deaths occurred in Dublin. [ more ]
Theregister
3 months ago
Information security

CISA: Critical SharePoint vuln is under active exploitation

Ransomware criminals have acquired a functional exploit for a critical Microsoft SharePoint vulnerability.
The vulnerability, known as CVE-2023-29357, allows for remote code execution (RCE) and has a severity score of 9.8. [ more ]
The Bootstrapped Founder
3 months ago
Digital life

Kasey Jones - The Art of Strategic Self-Revelation in the Digital Age

Building a personal brand online requires strategic self-revelation
Overcoming fear of public judgment and embracing vulnerability are crucial for personal growth [ more ]
Acm
10 months ago
Digital life

U.S. Government Agencies Hit in Global Cyberattack

Cyberattacks are increasingly targeting government agencies, and they can have a wide-reaching impact.
Organizations should implement strong security measures to protect themselves from cyberattacks, such as regular patching and monitoring activity.
Education is essential to combat cyberattacks, both in terms of teaching users how to identify phishing emails and other malicious activity, as well as in terms of encouraging users to report suspicious activity. [ more ]
WSJ
4 months ago
Apple

Apple Makes Security Changes to Protect Users From iPhone Thefts

Apple is addressing a security vulnerability that allowed iPhone thieves to access customer accounts and steal information.
A new iOS setting called Stolen Device Protection is being rolled out to beta testers to defend against these attacks. [ more ]
New York Post
4 months ago
Bayern Munich

Manchester United vs. Bayern Munich prediction: Champions League odds, pick, best bets

Manchester United needs to win against Bayern Munich and have Galatasaray and FC Copenhagen play to a draw to avoid an early exit from the Champions League.
Bayern Munich's B-team is still quite talented and Manchester United has already shown vulnerability against lower-ranked teams. [ more ]
Createsend
4 months ago
World news

The Morning Risk Report: Cyberattacks Leave Schools, Hospitals and Utilities Struggling to Pay Ransoms

Cyberattacks on the public sector are increasing due to weak protections.
Schools and hospitals are particularly vulnerable to cybercrime.
Municipalities are investing in security measures after experiencing attacks. [ more ]
Databreaches
4 months ago
Information security

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors.
The vulnerability (CVE-2023-26360) allows for arbitrary code execution and affects ColdFusion 2018 and ColdFusion 2021 versions. [ more ]
NPR
4 months ago
Digital life

Feeling alone? 5 tips to create connection and combat loneliness

Loneliness is a widespread issue, affecting around 1 in 4 adults globally.
Societal changes and individualistic values may increase vulnerability to loneliness. [ more ]
NPR
4 months ago
Digital life

Feeling alone? 5 tips to create connection and combat loneliness

Loneliness is a widespread issue, affecting around 1 in 4 adults globally.
Societal changes and individualistic values may increase vulnerability to loneliness. [ more ]
NPR
4 months ago
Digital life

Feeling alone? 5 tips to create connection and combat loneliness

Loneliness is a widespread issue, affecting around 1 in 4 adults globally.
Societal changes and individualistic values may increase vulnerability to loneliness. [ more ]
NPR
4 months ago
Digital life

Feeling alone? 5 tips to create connection and combat loneliness

Loneliness is a widespread issue, affecting around 1 in 4 adults globally.
Societal changes and individualistic values may increase vulnerability to loneliness. [ more ]
NPR
4 months ago
Digital life

Feeling alone? 5 tips to create connection and combat loneliness

Loneliness is a widespread issue, affecting around 1 in 4 adults globally.
Societal changes and individualistic values may increase vulnerability to loneliness. [ more ]
TechRepublic
4 months ago
Privacy professionals

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Cybersecurity researchers discovered a vulnerability in Google Workspace that could allow unwanted access to Workspace APIs.
The vulnerability allows attackers to use privilege escalation to gain access that would otherwise only be available to Super Admins. [ more ]
Forbes
4 months ago
Privacy professionals

Security Remains A Real Concern With Real-Time Communication Tools

Collaborative tools like Zoom have security vulnerabilities that can be exploited by hackers.
A vulnerability in Zoom Rooms could have allowed unauthorized access to sensitive information.
Hackers quickly found exploits during the pandemic, including Zoombombing. [ more ]
Forbes
4 months ago
Privacy professionals

Security Remains A Real Concern With Real-Time Communication Tools

Collaborative tools like Zoom have security vulnerabilities that can be exploited by hackers.
A vulnerability in Zoom Rooms could have allowed unauthorized access to sensitive information.
Hackers quickly found exploits during the pandemic, including Zoombombing. [ more ]
Forbes
4 months ago
Information security

Security Remains A Real Concern With Real-Time Communication Tools

Collaborative tools like Zoom have security vulnerabilities that can be exploited by hackers.
A vulnerability in Zoom Rooms could have allowed unauthorized access to sensitive information.
Hackers quickly found exploits during the pandemic, including Zoombombing. [ more ]
SecurityWeek
4 months ago
Information security

Critical Vulnerability Found in Ray AI Framework

A critical vulnerability in the Ray compute framework for AI allows unauthorized access to all nodes.
The vulnerability allows attackers to submit or delete jobs without authentication and retrieve sensitive information.
Ray does not enforce authentication by default and does not support any type of authorization model. [ more ]
SecurityWeek
4 months ago
Information security

Exploitation of Critical ownCloud Vulnerability Begins

Threat actors are exploiting a critical information disclosure vulnerability in ownCloud shortly after its public disclosure.
The vulnerability impacts the Graphapi app and allows attackers to retrieve sensitive information.
Administrators are urged to follow mitigation steps outlined by ownCloud. [ more ]
www.theguardian.com
4 months ago
Relationships

This is how we do it: Sometimes we go to cinemas and have sex in the back row'

The narrator is in a passionless marriage and seeks excitement through an affair
Noel makes the narrator feel vulnerable and more honest [ more ]
CyberScoop
5 months ago
Privacy professionals

Researchers want more detail on industrial control system alerts

Rockwell Automation released a security advisory about a vulnerability in one of its products.
By publicly revealing the vulnerability and urging customers to patch their system, Rockwell may have effectively burned the ability of a foreign intelligence agency to attack U.S. critical infrastructure systems. [ more ]
CyberScoop
5 months ago
Privacy professionals

Researchers want more detail on industrial control system alerts

Rockwell Automation released a security advisory about a vulnerability in one of its products.
By publicly revealing the vulnerability and urging customers to patch their system, Rockwell may have effectively burned the ability of a foreign intelligence agency to attack U.S. critical infrastructure systems. [ more ]
SecurityWeek
5 months ago
DevOps

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

Researchers warn that hundreds of organizations and open-source projects are vulnerable to public exposure of Kubernetes configuration secrets.
Kubernetes secrets are often stored unencrypted in the API server's underlying datastore, making them vulnerable to attacks.
The research uncovered instances in public repositories where Kubernetes secrets were inadvertently uploaded, affecting individuals, open-source projects, and large organizations. [ more ]
SecurityWeek
5 months ago
DevOps

Microsoft Patches Sensitive Information Disclosure Vulnerability in Azure CLI

Microsoft has released patches and guidance to address a high-severity vulnerability in Azure Command-Line Interface (CLI).
The vulnerability could expose sensitive information, such as credentials, through GitHub Actions logs.
The bug existed because certain Azure CLI functions inadvertently exposed secrets through CI/CD logs. [ more ]
SecurityWeek
5 months ago
DevOps

Critical Authentication Bypass Flaw in VMware Cloud Director Appliance

VMware has released an urgent patch for an authentication bypass bug in its Cloud Director Appliance product.
The vulnerability has a high severity score and can be exploited by malicious actors with network access.
The company recommends following its guidance to mitigate the issue. [ more ]
SecurityWeek
5 months ago
Information security

Citrix, Gov Agencies Issue Fresh Warnings on CitrixBleed Vulnerability

CVE-2023-4966 (CitrixBleed) is a critical vulnerability in Citrix's NetScaler product that leads to information disclosure.
The flaw had been exploited as a zero-day since August and mass exploitation began three weeks ago.
LockBit ransomware gang has started exploiting the vulnerability, targeting organizations across multiple critical infrastructure sectors. [ more ]
Dark Reading
5 months ago
Privacy professionals

AutoZone Files MOVEit Data Breach Notice With State of Maine

AutoZone experienced a data breach affecting 184,995 individuals, including residents of Maine.
A threat actor exploited a vulnerability in the MOVEit file transfer application to exfiltrate data from the AutoZone system.
AutoZone has temporarily disabled the application, patched the vulnerabilities, and is offering credit monitoring and identity protection services to affected individuals. [ more ]
Dark Reading
5 months ago
Privacy professionals

AutoZone Files MOVEit Data Breach Notice With State of Maine

AutoZone experienced a data breach affecting 184,995 individuals, including residents of Maine.
A threat actor exploited a vulnerability in the MOVEit file transfer application to exfiltrate data from the AutoZone system.
AutoZone has temporarily disabled the application, patched the vulnerabilities, and is offering credit monitoring and identity protection services to affected individuals. [ more ]
Dark Reading
5 months ago
Information security

Kinsing Cyberattackers Target Apache ActiveMQ Flaw to Mine Crypto

Attackers are exploiting a critical remote code execution vulnerability in Apache ActiveMQ, infecting vulnerable Linux systems with a cryptocurrency miner.
The Kinsing malware is targeting the flaw to mine cryptocurrency and drain resources from infected systems.
The vulnerability allows remote attackers with access to an ActiveMQ message broker to execute arbitrary commands on affected systems. [ more ]
www.securityweek.com
5 months ago
Information security

Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products

Johnson Controls has released patches for a critical vulnerability found in its industrial refrigeration products.
The flaw could allow unauthorized access to debug features and full administrative control of the system.
Attacks targeting refrigeration systems can cause disruption and financial damage. [ more ]
Truthout
5 months ago
Environment

Landmark Fifth National Climate Assessment Acknowledges Gender Disparities

The Fifth National Climate Assessment includes a section on women's health and acknowledges the vulnerability of LGBTQ+ people to the climate crisis.
The assessment finds that climate action does not meet the urgency of the crisis and many impacts are already locked into the future. [ more ]
TechCrunch
5 months ago
Privacy professionals

Hackers are exploiting 'CitrixBleed' bug in the latest wave of mass cyberattacks | TechCrunch

Hackers are exploiting a critical vulnerability in Citrix NetScaler systems to launch cyberattacks against big-name organizations.
The vulnerability, known as CitrixBleed, allows attackers to extract sensitive information and compromise networks without a password. [ more ]
TechCrunch
5 months ago
Privacy professionals

Hackers are exploiting 'CitrixBleed' bug in the latest wave of mass cyberattacks | TechCrunch

Hackers are exploiting a critical vulnerability in Citrix NetScaler systems to launch cyberattacks against big-name organizations.
The vulnerability, known as CitrixBleed, allows attackers to extract sensitive information and compromise networks without a password. [ more ]
SecurityWeek
5 months ago
Information security

New Intel CPU Vulnerability 'Reptar' Can Allow DoS Attacks, Privilege Escalation

A newly disclosed vulnerability affecting some Intel processors could lead to a crash and potentially privilege escalation and information disclosure.
The vulnerability, known as Reptar and CVE-2023-23583, can be exploited by an attacker who already has access to the targeted system.
Intel has released microcode updates to patch the issue and users are advised to ensure their BIOS, system OS, and drivers are up to date. [ more ]
www.nytimes.com
10 months ago
NYC parents

Opinion | I Thought I Was Fatherless. Then I Realized What a Father Was.

I heard my father's voice for the first time three years ago when I was 14 years old.For years, a CD had been sitting in a clear plastic case in my desk drawer, but I had never been able to get myself to play it.I would pick up the shiny disc, stare at the faded black ink that said Donor Interview, notice my distorted reflection in the silver circle, then put the CD back down.
www.cnn.com
10 months ago
US politics

Millions of Americans' personal data exposed in global hack

Millions of people in Louisiana and Oregon have had their data compromised in the sprawling cyberattack that has also hit the US federal government, state agencies said late Thursday.The breach has affected 3.5 million Oregonians with driver's licenses or state ID cards, and anyone with that documentation in Louisiana, authorities said.
www.nytimes.com
10 months ago
US politics

Russian Ransomware Group Breached Federal Agencies in Cyberattack

A Russian ransomware group gained access to data from federal agencies, including the Energy Department, in an attack that exploited file transfer software to steal and sell back users' data, U.S. officials said on Thursday.Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, described the breach as largely opportunistic and neither focused on specific high-valuable information nor as damaging as previous cyberattacks on U.S. government agencies.
Pinstripe Alley
10 months ago
New York Yankees

Shut the front door: Anthony Volpe's slider problem, and possible solution

At this time on Tuesday, I was fully prepared to write the case for Anthony Volpe to be optioned to Scranton, work on his swing decisions in a lower stakes environment, and target a return to the big league team after 50 or so games with the Railriders.I can still probably make that argument, that that's best for his long term development, but with Hal Steinbrenner, Aaron Boone and the rest of the Yankee brain trust coming out and saying that Volpe is the guy and won't be optioned, we must focus on what is, not what we wish to be.
[ Load more ]