Mar 21, 2025Ravie LakshmananCybercrime / Cyber Espionage The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United
Technology
Noise Master Buds were introduced in India in February. With these TWS earphones, the company ventures out of its budget segment and into a slightly more premium category. At a reasonably handsome price of Rs. 7,999, these headsets offer Bose-tuned audio and a total battery life of up to 44 hours to interested buyers. Having
Mar 20, 2025Ravie LakshmananMalware / Threat Analysis YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. “What’s intriguing about this malware is how much it collects,” Kaspersky said in an analysis. “It grabs account information from VPN and gaming clients, and all kinds
Alphabet’s Google was warned to step in line with the European Union’s Big Tech rules or risk hefty fines as part of a two-pronged escalation against Silicon Valley that risks further inflaming tensions with US President Donald Trump. The European Commission chastised Google for allegedly breaching the bloc’s landmark Digital Markets Act by favoring in-house services across
Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s approach, offers a framework for comprehending and implementing effective cybersecurity measures. The Essence of
Huawei Pura X has been launched in China as the latest foldable phone from the Shenzen-based manufacturer with a unique design. The clamshell foldable phone has a 6.3-inch inner screen with a 16:10 aspect ratio that’s the widest on a clamshell foldable. It also gets a 3.5-inch external display and a triple camera setup. The handset
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote
Vodafone Idea is in exploratory talks with various satellite communication providers, including Starlink, the company said on Wednesday, a week after the Indian telecom firm’s rivals signed deals with Elon Musk’s company. The mobile operator made the disclosure after Indian stock exchanges sought a clarification on its stock move and a report by local financial
Mar 19, 2025The Hacker NewsIdentity Security / Webinar In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks
Realme Buds Air 7 have been launched in India. The TWS earphones are claimed to offer a battery life of up to 13 hours on a single charge. They are said to provide a total playback time of up to 52 hours with the case. The earphones have an IP55 dust and splash resistance rating.
Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. “This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious
Apple lost its fight at Germany’s top civil court to overturn a regulator’s decision to put it under tighter antitrust scrutiny alongside other US tech giants. The judges on Tuesday said the Federal Cartel Office was right to find that the iPhone maker’s footprint across markets meets the threshold for more oversight. Apple is one of the
Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity
OneXSugar was unveiled on Monday at the ongoing Game Developers Conference (GDC) 2025 in San Francisco. It is a dual screen handheld gaming console that has a 6.01-inch primary display and a 3.92-inch secondary screen. Two other handhelds were also announced at the event — the Ayaneo Pocket S2 and Ayaneo Gaming Pad, equipped with 6.3-inch
Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions – Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat
Baidu released two new artificial intelligence (AI) models on Sunday. First, the Ernie 4.5 is a foundation model that succeeds the company’s previous generation, while the second, Ernie X1, is a reasoning-focused model. The latter is also the Chinese tech giant’s first attempt at a “deep-thinking” AI model, and Baidu claims that the large language
Mar 17, 2025Ravie LakshmananCybersecurity / Hacking News From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats
Apple supplier Foxconn will reportedly start manufacturing AirPods at its Hyderabad facility soon. The production of wireless earphones is said to be limited to exports. This move is likely to be part of Apple’s plans to diversify its manufacturing network beyond China. The brand is currently assembling all models in the latest iPhone 16 series, including
Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker, according to findings from CyberArk. Clipper malware is a type of cryware (as coined by Microsoft) that’s designed to monitor a victim’s clipboard content and facilitate
Apple Inc.’s top executive overseeing its Siri virtual assistant told staff that delays to key features have been ugly and embarrassing, and a decision to publicly promote the technology before it was ready made matters worse. Robby Walker, who serves as a senior director at Apple, delivered the stark comments during an all-hands meeting for
- 1
- 2
- 3
- …
- 281
- Next Page »