Menu

Blog

Archive for the ‘security’ category: Page 4

Oct 21, 2024

AI Vulnerability in Hindsight: Investigating NVIDIA Container Toolkit CVE-2024–0132

Posted by in categories: robotics/AI, security

Analyze the NVIDIA Container Toolkit CVE-2024–0132 vulnerability and its implications for AI system security with recommended remediation steps.

Oct 21, 2024

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Posted by in category: security

Critical cryptographic flaws in top E2EE cloud platforms risk user data, allowing file tampering and injection.

Oct 21, 2024

Internet Archive breached again through stolen access tokens

Posted by in categories: internet, security

The Internet Archive was breached again, this time on their Zendesk email support platform after repeated warnings that threat actors stole exposed GitLab authentication tokens.

Since last night, BleepingComputer has received numerous messages from people who received replies to their old Internet Archive removal requests, warning that the organization has been breached as they did not correctly rotate their stolen authentication tokens.

“It’s dispiriting to see that even after being made aware of the breach weeks ago, IA has still not done the due diligence of rotating many of the API keys that were exposed in their gitlab secrets,” reads an email from the threat actor.

Oct 19, 2024

SpaceX wins $733M Space Force launch contract

Posted by in categories: security, space

SpaceX was awarded an eight-launch, $733 million contract by the U.S. Space Force on Friday, as part of an ongoing program intended to foster competition among launch providers.

The award includes seven launches for the Space Development Agency and one for the National Reconnaissance Office, all anticipated to use Falcon 9s and occur no earlier than 2026.

The massive new contract is part of a U.S. Space Force Space Systems Command (SSC) program with the catchy name of “National Security Space Launch Phase 3 Lane 1.” This third round of contracts was split into two lanes last year: Lane 1, for lower-risk missions and near-Earth orbits; and Lane 2, for heavy-lift missions and the more demanding orbits.

Oct 17, 2024

True Anomaly Taps Firefly Aerospace to Launch Jackal Autonomous Orbital Vehicle for U.S. Space Force VICTUS HAZE Tactically Responsive Space Mission

Posted by in categories: government, robotics/AI, security, space

Ready to set another industry record!


New multi-launch agreement between Firefly Aerospace and True Anomaly includes three Alpha missions to provide rapid launch capabilities for Tactically Responsive Space mission sets

Cedar Park, Texas, October 17, 2024Firefly Aerospace, Inc., an end-to-end space transportation company, and space defense technology company True Anomaly, Inc., today announced a multi-launch agreement for three responsive launch missions aboard Firefly’s Alpha rocket. The first mission will deploy the True Anomaly Jackal Autonomous Orbital Vehicle (AOV) for the U.S. Space Force Space Systems Command’s VICTUS HAZE Tactically Responsive Space (TacRS) mission targeted for 2025. The two additional missions are available for execution between 2025 and 2027.

Continue reading “True Anomaly Taps Firefly Aerospace to Launch Jackal Autonomous Orbital Vehicle for U.S. Space Force VICTUS HAZE Tactically Responsive Space Mission” »

Oct 17, 2024

Silicon metasurfaces unlock broad-spectrum infrared imaging

Posted by in categories: food, security

While are valuable tools for enhanced vision, food and plant quality control, security, etc, today’s cameras often face significant drawbacks. For instance, they are bulky and power-hungry, requiring cooling systems that limit their functionalities.

More importantly, current semiconductor-based technology used in the cameras only captures a narrow band of the infrared spectrum based on the absorption band of the semiconductor detector. This means that every application would need a separate camera.

“Due to the complications of today’s bulky, power-hungry and expensive infrared imaging technology, we are unlikely to have an infrared camera at home. However, nonlinear frequency conversion, a process that manipulates and translates electromagnetic signals across various frequency regimes, holds a massive potential to revolutionize infrared detection technology,” said Prof Mohsen Ramhami, the leader of Advanced Optics and Photonics Lab, and a UK Research and Innovation Future Leaders Fellow.

Oct 16, 2024

Janus-like metasurface technology shows different optical responses according to the direction of light

Posted by in categories: innovation, security

Metasurface technology is an advanced optical technology that is thinner, lighter, and more capable of precisely controlling light through nanometer-sized artificial structures than conventional technologies. KAIST researchers have overcome the limitations of existing metasurface technologies and successfully designed a Janus metasurface capable of perfectly controlling asymmetric light transmission. By applying this technology, they have also proposed an innovative method to significantly enhance security by only decoding information under specific conditions.

Oct 15, 2024

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

Posted by in category: security

Jetpack releases a critical security update to fix a vulnerability affecting 27 million WordPress sites.

Oct 15, 2024

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

Posted by in category: security

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions.

That’s according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the credentials of those users.

“The advanced adversaries were observed exploiting and chaining zero-day vulnerabilities to establish beachhead access in the victim’s network,” security researchers Faisal Abdul Malik Qureshi, John Simmons, Jared Betts, Luca Pugliese, Trent Healy, Ken Evans, and Robert Reyes said.

Oct 12, 2024

The Next Frontier: DNA Emerges as a Powerhouse for Data Storage and Computing

Posted by in categories: biotech/medical, computing, security

Researchers from NC State and Johns Hopkins have developed a breakthrough technology that leverages DNA for data storage and computing, offering capabilities such as storing, retrieving, computing, and rewriting data.

This technology is made viable by innovative polymer structures called dendricolloids, enhancing data density and preservation. It enables functions similar to electronic devices and could potentially secure data for millennia, providing a promising foundation for the future of molecular computing.

DNA Data Storage and Computing.

Page 4 of 14812345678Last