Technology

May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The three vulnerabilities reside in version 8.4 of FRRouting, a popular open source internet routing protocol suite for Linux
0 Comments
May 02, 2023Ravie LakshmananMobile Security / Spyware A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups. The malware, dubbed BouldSpy, has been attributed with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Targeted victims include
0 Comments
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations and nation-state operators. Today, however, it has become a commoditized tool, well within the skillset of any ransomware threat actor. This makes real-time detection and prevention of lateral movement a
0 Comments
Apr 28, 2023Ravie LakshmananData Security / Malware A significant number of victims in the consumer and enterprise sectors located across Australia, Japan, the U.S., and India have been affected by an evasive information-stealing malware called ViperSoftX. ViperSoftX was first documented in 2020, with cybersecurity company Avast detailing a campaign in November 2022 that leveraged the
0 Comments
Apr 28, 2023Ravie LakshmananNetwork Security / Vulnerability Networking equipment maker Zyxel has released patches for a critical security flaw in its firewall devices that could be exploited to achieve remote code execution on affected systems. The issue, tracked as CVE-2023-28771, is rated 9.8 on the CVSS scoring system. Researchers from TRAPA Security have been credited
0 Comments
Samsung recently introduced skin temperature-based sensor for women’s menstrual health tracker on the Galaxy Watch 5 series. The tech giant is now reportedly working on adding more health-tracking features based on skin temperature. However, there are no further details available about the update yet. Meanwhile, the menstrual cycle tracking feature is currently accessible across 32
0 Comments
Apr 29, 2023Ravie LakshmananData Safety / Privacy / AI OpenAI, the company behind ChatGPT, has officially made a return to Italy after the company met the data protection authority’s demands ahead of April 30, 2023, deadline. The development was first reported by the Associated Press. OpenAI’s CEO, Sam Altman, tweeted, “we’re excited ChatGPT is available
0 Comments
Apr 29, 2023Ravie LakshmananHealthcare / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released an Industrial Control Systems (ICS) medical advisory warning of a critical flaw impacting Illumina medical devices. The issues impact the Universal Copy Service (UCS) software in the Illumina MiSeqDx, NextSeq 550Dx, iScan, iSeq 100, MiniSeq, MiSeq, NextSeq 500, NextSeq
0 Comments
Realme 11 series smartphones, comprising the vanilla Realme 11, Realme 11 Pro, and Realme 11 Pro+, are confirmed to launch on May 10 in China. While the smartphones’ debut is still more than a week away, the company has revealed the display specifications of the Realme 11 Pro+ via a Weibo post. Additionally, the smartphone
0 Comments
Someone is trying to end the liberty and freedom of your kids.   On Wednesday April 26th, a bipartisan team that included Hawaii Democratic Senator Brian Schatz, Arkansas Republican Tom Cotton, Connecticut Democrat Chris Murphy, and Alabama Republican Katie Britt introduced The Protecting Kids on Social Media Act. An act that strangles the freedom of
0 Comments
Apr 28, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Threat actors are advertising a new information stealer for the Apple macOS operating system called Atomic macOS Stealer (or AMOS) on Telegram for $1,000 per month, joining the likes of MacStealer. “The Atomic macOS Stealer can steal various types of information from the victim’s machine, including Keychain passwords,
0 Comments