An “aggressive” advanced persistent threat (APT) group known as SideWinder has been linked to over 1,000 new attacks since April 2020. “Some of the main characteristics of this threat actor that make it stand out among the others, are the sheer number, high frequency and persistence of their attacks and the large collection of encrypted
Technology
FAU-G is set to receive a new map called Dugong Rock Island. Developer nCore Games has released a teaser trailer for this upcoming map. It appears to be an abandoned naval base. There are buildings that offer elevated vantage points to the players. This new map is shown to have an underground area as well.
An analysis of the mobile threat landscape in 2022 shows that Spain and Turkey are the most targeted countries for malware campaigns, even as a mix of new and existing banking trojans are increasingly targeting Android devices to conduct on-device fraud (ODF). Other frequently targeted countries include Poland, Australia, the U.S., Germany, the U.K., Italy,
LED-LCD technology in TVs is still the most common and affordable type, and Xiaomi smartly chose to focus its products around it during its early years of selling televisions in India. The company still pushes large volumes of its affordable LED televisions, but has also experimented with premium TVs such as the Mi QLED TV 4K range
A nascent Linux-based botnet named Enemybot has expanded its capabilities to include recently disclosed security vulnerabilities in its arsenal to target web servers, Android devices, and content management systems (CMS). “The malware is rapidly adopting one-day vulnerabilities as part of its exploitation capabilities,” AT&T Alien Labs said in a technical write-up published last week. “Services
Xiaomi 12X has started getting the Android 12 update with MIUI 13 on top globally. The smartphone was launched in December last year with Android 11. The European markets had started receiving the Android 12 update two weeks ago. The smartphone appeared on a community forum with the build number V13.0.1.0.SLDMIXM. The handset is also
It’s no secret that 3rd party apps can boost productivity, enable remote and hybrid work and are overall, essential in building and scaling a company’s work processes. An innocuous process much like clicking on an attachment was in the earlier days of email, people don’t think twice when connecting an app they need with their
Redmi is rumoured to be working on an Ultra variant of the Redmi K50. It is expected to come with a 2K resolution OLED touchscreen with 120Hz refresh rate. The smartphone will likely get the Snapdragon 8+ Gen 1 and 100W fast charging. The Redmi smartphone is expected to launch in the latter half of
OnePlus recently launched its 10R 5G in India. The new phone is the successor to the the OnePlus 9R (Review) and is priced just below this year’s OnePlus 9RT (Review). However, it looks very different from anything the Chinese smartphone maker has designed so far. On one hand, it does look unique, and newcomers to the
Cloud-based repository hosting service GitHub on Friday shared additional details into the theft of GitHub integration OAuth tokens last month, noting that the attacker was able to access internal NPM data and its customer information. “Using stolen OAuth user tokens originating from two third-party integrators, Heroku and Travis CI, the attacker was able to escalate
Redmi 11 5G India launch could take place in June, according to a new report. The smartphone is expected to debut as a successor to the Redmi 10, and the first handset in the series to feature 5G connectivity. The smartphone will reportedly be powered by a MediaTek Dimensity 700 SoC and pack a 5,000mAh
Four high severity vulnerabilities have been disclosed in a framework used by pre-installed Android System apps with millions of downloads. The issues, now fixed by its Israeli developer MCE Systems, could have potentially allowed threat actors to stage remote and local attacks or be abused as vectors to obtain sensitive information by taking advantage of
Oppo Reno 8 series and Oppo Pad Air India launch could take place by July, according to a report. The company’s latest Reno series smartphones and midrange tablet made their debut in China earlier this week. The Oppo Reno 8 and Reno 8 Pro is equipped with a Snapdragon 7 Gen 1 and MediaTek Dimensity
A 37-year-old man from New York has been sentenced to four years in prison for buying stolen credit card information and working in cahoots with a cybercrime cartel known as the Infraud Organization. John Telusma, who went by the alias “Peterelliot,” pleaded guilty to one count of racketeering conspiracy on October 13, 2021. He joined
Pixel 7 and Pixel 7 Pro — Google’s upcoming flagship smartphones — display specifications have surfaced online, well ahead of the launch of the handsets later this year. The smartphones are tipped to feature the same displays as the Pixel 6 and Pixel 6 Pro that debuted last year. The company teased its next generation
Details have emerged about a recently patched critical remote code execution vulnerability in the V8 JavaScript and WebAssembly engine used in Google Chrome and Chromium-based browsers. The issue relates to a case of use-after-free in the instruction optimization component, successful exploitation of which could “allow an attacker to execute arbitrary code in the context of
A year-long international investigation has resulted in the arrest of the suspected head of the SilverTerrier cybercrime group by the Nigeria Police Force. “The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims,” Interpol said in a statement. Operation
Twitter, which is in the process of being acquired by Tesla CEO Elon Musk, has agreed to pay $150 million to the U.S. Federal Trade Commission (FTC) to settle allegations that it abused non-public information collected for security purposes to serve targeted ads. In addition to the monetary penalty for “misrepresenting its privacy and security
The maintainers of the Tails project have issued a warning that the Tor Browser that’s bundled with the operating system is unsafe to use for accessing or entering sensitive information. “We recommend that you stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages,
In any organization, there are certain accounts that are designated as being privileged. These privileged accounts differ from standard user accounts in that they have permission to perform actions that go beyond what standard users can do. The actions vary based on the nature of the account but can include anything from setting up new