Jul 26, 2024The Hacker NewsDigital Warfare / Cybersecurity Training “Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that the sharpest tools of peace are forged.” – Victor Hugo. In 1971, an unsettling message started appearing on several computers that comprised ARPANET, the precursor to
Technology
Apple has reduced the price of iPhone 15, iPhone 14 and other models in India following a reduction in the import duties. Consequently, the prices of some of Apple’s most popular models have seen a price drop from as little as Rs. 300 to as high as Rs. 6,000. This development comes a week after
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform” capable of targeting users of more
Vivo Y18i has been silently launched in India. The new Vivo Y series smartphone comes in two colour options with a 6.56-inch HD+ display. It has a Unisoc T612 chipset under the hood, coupled with 4GB RAM and 64GB storage. The budget handset flaunts a dual camera setup at the rear, headlined by a 13-megapixel primary shooter.
Jul 25, 2024NewsroomMalware / Cyber Espionage A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps
Microsoft added a new artificial intelligence (AI) feature to its Bing search engine on Wednesday. Dubbed Bing generative search, the feature shows a snapshot with the information for the searched query. The feature is similar to Google’s AI Overviews which was publicly released in the US in May. Bing’s AI-powered search feature also shows the
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment.
Google Pixel Buds Pro 2 are expected to launch soon as the Pixel Buds Pro successor. The Pixel Buds Pro were unveiled in May 2022. The second generation of these true wireless stereo (TWS) earphones are expected to be launched alongside the Pixel 9 series of smartphones at the Made by Google event on August 13. Previously,
A zero-day security flaw in Telegram’s mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking videos. The exploit appeared for sale for an unknown price in an underground forum on June 6, 2024, ESET said. Following responsible disclosure on June 26, the issue was addressed by Telegram
Apple Watch For Your Kids – the family setup experience for children – is now available to users in India. It enables adults to set up cellular Apple Watch models for their children, allowing them to make calls and send messages even if they don’t have an iPhone. Notably, the Cupertino-based technology conglomerate is also marketing
Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work. But what if there were a way to reduce or even altogether eliminate security questionnaires? The root problem isn’t a lack of great questionnaire products
Vivo V40 series has been teased by the company and will be launched in India soon. Recent reports hinted at the arrival of the smartphones in the country and now the firm has revealed the design and colour options of the handsets. It will include a base Vivo V40 and a Vivo V40 Pro variant,
Jul 23, 2024NewsroomICS Malware / Critical Infrastructure Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it
Talks over a global tax deal are continuing well past a June 30 deadline and governments are now looking to a Group of 20 finance leaders meeting this week for progress on a stalled plan to reallocate taxing rights on large multinational companies. The so-called “Pillar 1” arrangement, part of a 2021 global two-part tax
Jul 23, 2024NewsroomCyber Espionage / Chinese Hackers Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools. The campaign is a sign that the group “also engages in internal espionage,” Symantec’s Threat Hunter Team, part
OnePlus seems to have cooked up another interesting smartwatch with the launch of its new Watch 2R model. As the last character of the product name aptly describes, the OnePlus Watch 2R is an affordable version of the Watch 2. This is similar to the OnePlus 12R, a smartphone which offers similar performance as the
Jul 22, 2024NewsroomCloud Security / Phishing Attack A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises for their flexibility, cost effectiveness, and ease
Apple doesn’t follow a systematic launch timeline for the iPhone SE. The second iPhone SE was released in April 2020, while the newest third-generation model popped up in March 2022. Now, the iPhone SE 4 could be in the works for a release in the first half of next year if a recent leak is
The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced “technology suite” that runs the whole cybercrime supply chain spectrum to spearhead its operations. Infoblox
Infinix announced the introduction of its new near-field communication (NFC) technology last week. Dubbed 720-degree SphereTech NFC, the consumer technology brand claims that it has made significant advancements to the existing NFC technology to improve both its signal radius and the card reading area. At the moment, the company has not revealed which smartphones might
- 1
- 2
- 3
- …
- 233
- Next Page »