Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks

Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks July 29, 2024 01:06 PM Microsoft warns that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability (CVE-2024-37085) in attacks. This medium-severity security flaw was discovered by Microsoft researchers and fixed with the release of ESXi 8.0 U3 on June 25. The bug … Read more

Scientists Reconstruct Woolly Mammoth’s 28 Chromosome Pairs

As biotech startups develop ways to resurrect the woolly mammoth, an international team of scientists have reconstructed the iconic Ice Age beast’s 28 pairs of chromosomes. This genetic breakthrough was made possible by a chromosome extracted from a 52,000-year-old mammoth that freeze-dried soon after death in northeastern Siberia. This fossilized chromosome provides unprecedented details about … Read more

Complex Life on Earth May Be Much Older Than Thought

Complex life on Earth may be much older than thought. A group of scientists found evidence in Gabon showing environmental conditions for animal life 2.1 billion years ago. However, they believe these organisms were restricted to an inland sea and didn’t spread globally. The research adds to a debate over whether unexplained formations in Franceville, … Read more

The role of angular momentum in star-planet formation

The text discusses the formation of star-planet systems and how angular momentum plays a crucial role in shaping the system’s configuration. Here’s a simplified summary: 1. A massive clump of matter collapses under its own gravity, becoming asymmetrical with one axis longer than others. 2. The collapse causes the shortest axis to become pancaked, forming … Read more

Elon Musk’s Vision System Falls Short in Simulations

Elon Musk’s ambitious eye implants, which aim to restore and even exceed normal human vision, are unlikely to reach this goal, according to scientists who have used virtual patients to expose the limitations of this technology. The researchers at the University of Washington used detailed computational modeling simulations to demonstrate that cortical implants like Blindsight … Read more

philosopher Ian Hacking’s book “The Social Construction of What?” (1999)

This is an excerpt from philosopher Ian Hacking’s book “The Social Construction of What?” (1999). The author argues that all scientific frameworks are interest-dependent, meaning they are shaped by the values, beliefs, and goals of the researchers who create them. He uses the example of astronomical nomenclature to illustrate this point. Hacking is not saying … Read more

GTA 6 leaks weren’t a big deal, says former Rockstar developer

The massive GTA 6 leaks weren’t that big a deal, according to former Rockstar developer Obbe Vermeij. He says they only mattered because the studio is so secretive. Vermeij didn’t follow the leak closely, but thinks it’s not as important as people think. “It’s just because there are millions of people waiting for any news, … Read more

War’s Unintended Victims: Animals Suffering from Stress and Anxiety

Animals are also suffering from stress and anxiety due to the war. A study conducted at Tel Aviv University found that the sound of explosions from fired rockets induces stress and anxiety in geckos, leading to a sharp increase in their metabolic rates. This energy cost may be life-threatening if chronic. The researchers believe this … Read more

Grupo X Ciber (GXC) Ofrece Soluciones de Phishing con Malware Android

A Spanish-speaking cybercrime group called GXC Team has been observed bundling phishing kits with malicious Android applications. This is a level of service known as malware-as-a-service (MaaS). The phishing kit costs between $150 and $900 per month, while the bundle including the kit and Android malware costs around $500 per month. The targets include users … Read more