tags
-
Blog
Virtual reality could be the next frontier in software development: Devs are excited about productivity and virtualization benefits — but hefty price tags and health concerns may hamper adoption
Virtual and augmented reality could be the next big trend in software development as devs warm to the use of the tools, but there are still a few key barriers blocking adoption. VR/AR tech offers programmers a more focussed work environment, with a virtualized workspace but research suggests the platform isn’t quite mature enough for widespread adoption. JetBrains’ 2024 State…
Read More » -
Blog
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog, including a critical OS command injection impacting Progress Kemp LoadMaster. The flaw, discovered by Rhino Security Labs and tracked as CVE-2024-1212, was addressed via an update released on February 21, 2024. However, this is the first report of it being under…
Read More » -
Blog
Google tags a tenth Chrome zero-day as exploited this year
Today, Google revealed that it patched the tenth zero-day exploited in the wild in 2024 by attackers or security researchers during hacking contests. Tracked as CVE-2024-7965 and reported by a security researcher known only as TheDog, the now-patched high-severity vulnerability is described as an inappropriate implementation in Google Chrome’s V8 JavaScript engine that can let remote attackers exploit heap corruption via a crafted HTML page.…
Read More » -
Blog
Exchange Online mistakenly tags emails as malware
Image: MidjourneyMicrosoft is investigating an Exchange Online false positive issue causing emails containing images to be wrongly tagged as malicious and sent to quarantine. “Users’ email messages containing images may be incorrectly flagged as malware and quarantined,” Microsoft said in a service alert posted on the Microsoft 365 admin center two hours ago. “We’re reviewing service monitoring telemetry to isolate…
Read More »