LocalStack zero-day vulnerabilities chained to achieve remote takeover of local instances

"Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from Sonarsource have documented how they combined cross-site scripting (XSS) and server-side request forgery (SSRF) vulnerabilities to achieve OS command injection against the open source Python application." The rest of the article: https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances

Californian vs. Federal Marijuana Laws, and Healthcare

"The present paper contrasts California’s Medical Marijuana Regulation and Safety Act with marijuana enforcement provisions of the federal Controlled Substances Act; while taking a look at the possible current and future effects of the two legislations on healthcare in California, in particular, and the United States, in general." Full text of this paper: https://www.slideshare.net/OlegNekrassovski/californian-vs-federal-marijuana-laws-and-healthcare

Psychopathy – Brief Overview of Its Behavioral, Experimental, and Neural Aspects

"Psychopathy is characterized by a pervasive pattern of behavioral (e.g., impulsivity), affective (e.g., lack of empathy), and interpersonal (e.g., manipulation) features. It is considered to be one of the most destructive personalities, showing robust correlations with aggression, criminality, and recidivism (Gordts, Uzieblo, Neumann, Van den Bussche, & Rossi, 2015). But, despite their criminal and violent... Continue Reading →

FORECASTING CHANGE IN MILITARY TECHNOLOGY, 2020-2040

From the Executive Summary: "What changes are likely in military technology over the next 20 years? This question isfascinating on its own terms. More importantly, answering it is crucial for making appropriatechanges in U.S. and allied weaponry, military operations, wartime preparations, anddefense budget priorities. To be sure, technology is advancing fast in many realms. But... Continue Reading →

National Security Commission on Artificial Intelligence – March 2021 Report

From the report's Executive Summary: "The rapidly improving ability of computer systems to solve problems and to perform tasks that would otherwise require human intelligence—and in some instances exceed human performance—is world altering. AI technologies are the most powerful tools in generations for expanding knowledge, increasing prosperity, and enriching the human experience. AI is also... Continue Reading →

Regexploit tool unveiled with a raft of ReDoS bugs already on its resume

 "A newly launched regex-scanning tool has been used by its architects to unearth multiple regular expression denial-of-service (ReDoS) vulnerabilities in popular NPM, Python, and Ruby dependencies. Released yesterday (March 11), Regexploit extracts regular expressions and scans them for widespread security weaknesses that, if exploited, can “bring a server to its knees”, said Doyensec researcher Ben Caller in... Continue Reading →

Blog at WordPress.com.

Up ↑

Design a site like this with WordPress.com
Get started