Technology

Mar 21, 2025Ravie LakshmananCybercrime / Cyber Espionage The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United
0 Comments
Noise Master Buds were introduced in India in February. With these TWS earphones, the company ventures out of its budget segment and into a slightly more premium category. At a reasonably handsome price of Rs. 7,999, these headsets offer Bose-tuned audio and a total battery life of up to 44 hours to interested buyers. Having
0 Comments
Mar 20, 2025Ravie LakshmananMalware / Threat Analysis YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. “What’s intriguing about this malware is how much it collects,” Kaspersky said in an analysis. “It grabs account information from VPN and gaming clients, and all kinds
0 Comments
Alphabet’s Google was warned to step in line with the European Union’s Big Tech rules or risk hefty fines as part of a two-pronged escalation against Silicon Valley that risks further inflaming tensions with US President Donald Trump. The European Commission chastised Google for allegedly breaching the bloc’s landmark Digital Markets Act by favoring in-house services across
0 Comments
Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s approach, offers a framework for comprehending and implementing effective cybersecurity measures. The Essence of
0 Comments
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote
0 Comments
Mar 19, 2025The Hacker NewsIdentity Security / Webinar In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks
0 Comments
Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. “This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious
0 Comments
Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity
0 Comments
OneXSugar was unveiled on Monday at the ongoing Game Developers Conference (GDC) 2025 in San Francisco. It is a dual screen handheld gaming console that has a 6.01-inch primary display and a 3.92-inch secondary screen. Two other handhelds were also announced at the event — the Ayaneo Pocket S2 and Ayaneo Gaming Pad, equipped with 6.3-inch
0 Comments
Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions – Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat
0 Comments
Baidu released two new artificial intelligence (AI) models on Sunday. First, the Ernie 4.5 is a foundation model that succeeds the company’s previous generation, while the second, Ernie X1, is a reasoning-focused model. The latter is also the Chinese tech giant’s first attempt at a “deep-thinking” AI model, and Baidu claims that the large language
0 Comments
Mar 17, 2025Ravie LakshmananCybersecurity / Hacking News From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats
0 Comments
Apple supplier Foxconn will reportedly start manufacturing AirPods at its Hyderabad facility soon. The production of wireless earphones is said to be limited to exports. This move is likely to be part of Apple’s plans to diversify its manufacturing network beyond China. The brand is currently assembling all models in the latest iPhone 16 series, including
0 Comments
Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker, according to findings from CyberArk. Clipper malware is a type of cryware (as coined by Microsoft) that’s designed to monitor a victim’s clipboard content and facilitate
0 Comments