Toggle light / dark theme

Microsoft updates mitigation for ProxyNotShell Exchange zero days

Microsoft has updated the mitigations for the latest Exchange zero-day vulnerabilities tracked as CVE-2022–41040 and CVE-2022–41082, also referred to ProxyNotShell.

The initial recommendations were insufficient as researchers showed that they can be easily bypassed to allow new attacks exploiting the two bugs.

Unfortunately, the current recommendations are still not enough and the proposed mitigation can still allow ProxyNotShell attacks.

Saudi Arabia’s $500 billion megacity NEOM will host winter games in desert

The event will take place in a man-made city with a year-round winter sports complex.

Can you make snow in the desert? It seems you can, as Saudi Arabia will be hosting the 2029 Asian Winter Games, according to a report.


The games will take place at an under-construction US$500 billion megacity called Neom that is set to boast a year-round winter sports complex along with other futuristic amenities and features.

Water-based chips could be the future of neural networks

Researchers are working on water-based microprocessors that could one day be used as a more diverse alternative to the current wafer architecture of today, with applications ranging from AI to DNA synthesis and likely beyond.

The chips in question are still in the prototype stage, so don’t expect processors with built in water cooling just yet, but the way they work is really exciting. They use a technique called ionics, which involves manipulating different ion species in liquid, as opposed to the standard electrons shooting through our semiconductors today.

Microsoft confirms hackers are actively exploiting Exchange zero-day flaws

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Microsoft Exchange server is one of those enterprise staples, but it’s also a key target for cybercriminals. Last week, GTSC reported attacks had begun chaining two new zero-day Exchange exploits as part of coordinated attacks.

While information is limited, Microsoft has confirmed in a blog post that these exploits have been used by a suspected state-sponsored threat actor to target fewer than 10 organizations and successfully exfiltrate data.

Cognitive and Behavioral Neurology

E to forgetting and false memories. However, if we believe that episodic memory developed to flexibly and creatively combine and rearrange memories of prior events in order to plan for the future, then it is quite a good system. We argue that consciousness originally developed as part of the episodic memory system—quite likely the part needed to accomplish that flexible recombining of information. We posit further that consciousness was subsequently co-opted to produce other functions that are not directly relevant to memory per se, such as problem-solving, abstract thinking, and language. We suggest that this theory is compatible with many phenomena, such as the slow speed and the after-the-fact order of consciousness, that cannot be explained well by other theories. We believe that our theory may have profound implications for understanding intentional action and consciousness in general. Moreover, we suggest that episodic memory and its associated memory systems of sensory, working, and semantic memory as a whole ought to be considered together as the conscious memory system in that they, together, give rise to the phenomenon of consciousness. Lastly, we suggest that the cerebral cortex is the part of the brain that makes consciousness possible, and that every cortical region contributes to this conscious memory system…

/* */