LocalStack zero-day vulnerabilities chained to achieve remote takeover of local instances
"Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from Sonarsource have documented how they combined cross-site scripting (XSS) and server-side request forgery (SSRF) vulnerabilities to achieve OS command injection against the open source Python application." The rest of the article: https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances
Learning, Insight, and Innovation in Animals in the Context of Evolution
Full text of this research paper: https://www.slideshare.net/OlegNekrassovski/learning-insight-and-innovation-in-animals-in-the-context-of-evolution
Californian vs. Federal Marijuana Laws, and Healthcare
"The present paper contrasts California’s Medical Marijuana Regulation and Safety Act with marijuana enforcement provisions of the federal Controlled Substances Act; while taking a look at the possible current and future effects of the two legislations on healthcare in California, in particular, and the United States, in general." Full text of this paper: https://www.slideshare.net/OlegNekrassovski/californian-vs-federal-marijuana-laws-and-healthcare
Psychopathy – Brief Overview of Its Behavioral, Experimental, and Neural Aspects
"Psychopathy is characterized by a pervasive pattern of behavioral (e.g., impulsivity), affective (e.g., lack of empathy), and interpersonal (e.g., manipulation) features. It is considered to be one of the most destructive personalities, showing robust correlations with aggression, criminality, and recidivism (Gordts, Uzieblo, Neumann, Van den Bussche, & Rossi, 2015). But, despite their criminal and violent... Continue Reading →
FORECASTING CHANGE IN MILITARY TECHNOLOGY, 2020-2040
From the Executive Summary: "What changes are likely in military technology over the next 20 years? This question isfascinating on its own terms. More importantly, answering it is crucial for making appropriatechanges in U.S. and allied weaponry, military operations, wartime preparations, anddefense budget priorities. To be sure, technology is advancing fast in many realms. But... Continue Reading →
National Security Commission on Artificial Intelligence – March 2021 Report
From the report's Executive Summary: "The rapidly improving ability of computer systems to solve problems and to perform tasks that would otherwise require human intelligence—and in some instances exceed human performance—is world altering. AI technologies are the most powerful tools in generations for expanding knowledge, increasing prosperity, and enriching the human experience. AI is also... Continue Reading →
“Enhancing Security and Stability in Afghanistan” – DoD’s Latest Report to Congress
"This report describes efforts to enhance security and stability in Afghanistan from December 1, 2019, through May 31, 2020. The data cutoff date for this report is April 30, 2020. This report complements other reports and information about Afghanistan provided to Congress and is not intended to be the single source of all information about... Continue Reading →
Regexploit tool unveiled with a raft of ReDoS bugs already on its resume
"A newly launched regex-scanning tool has been used by its architects to unearth multiple regular expression denial-of-service (ReDoS) vulnerabilities in popular NPM, Python, and Ruby dependencies. Released yesterday (March 11), Regexploit extracts regular expressions and scans them for widespread security weaknesses that, if exploited, can “bring a server to its knees”, said Doyensec researcher Ben Caller in... Continue Reading →