Technology

Dec 14, 2022Ravie LakshmananPatch Management / Vulnerability Tech giant Microsoft released its last set of monthly security updates for 2022 with fixes for 49 vulnerabilities across its software products. Of the 49 bugs, six are rated Critical, 40 are rated Important, and three are rated Moderate in severity. The updates are in addition to 24
0 Comments
Dec 13, 2022Ravie LakshmananOpen Source / Vulnerability Database Google on Tuesday announced the open source availability of OSV-Scanner, a scanner that aims to offer easy access to vulnerability information about various projects. The Go-based tool, powered by the Open Source Vulnerabilities (OSV) database, is designed to connect “a project’s list of dependencies with the vulnerabilities
0 Comments
Moto E13 been spotted on benchmarking site Geekbench suggesting that Lenovo-owned smartphone manufacturer Motorola is working on another E-series phone. The listing reveals key specifications regarding the operating system and processor on the handset. The purported smartphone from Motorola could be powered by an octa-core processor paired with 2GB of RAM, and could run on
0 Comments
Dec 13, 2022Ravie Lakshmanan An active malware campaign is targeting the Python Package Index (PyPI) and npm repositories for Python and JavaScript with typosquatted and fake modules that deploy a ransomware strain, marking the latest security issue to affect software supply chains. The typosquatted Python packages all impersonate the popular requests library: dequests, fequests, gequests,
0 Comments
OnePlus 11R could reportedly be equipped with an alert slider and an infrared blaster (IR) for remote controls. Newly leaked images of a OnePlus 11R’ prototype have given enthusiasts an insight on the upcoming smartphone’s camera island, display and more. The OnePlus 11 series will reportedly comprise two smartphones – the OnePlus 11 and OnePlus
0 Comments
Dec 12, 2022Ravie LakshmananEndpoint Detection / Data Security High-severity security vulnerabilities have been disclosed in different endpoint detection and response (EDR) and antivirus (AV) products that could be exploited to turn them into data wipers. “This wiper runs with the permissions of an unprivileged user yet has the ability to wipe almost any file on
0 Comments
OnePlus 11, which is said to the company’s upcoming flagship smartphone powered by the new Snapdragon 8 Gen 2 SoC, has reportedly been spotted on the Compulsory Certification of China (3C) website. The listing also reveals a key specification of the purported successor to the OnePlus 10 with regard to its charging capabilities. The handset
0 Comments
Samsung Galaxy A54 5G has been spotted on Geekbench, hinting at the upcoming launch of the handset. The South Korean conglomerate is yet to announce plans to launch the purported Galaxy A-series phone. Meanwhile, some of the specifications of the Samsung Galaxy A54 handset have already been tipped via a new Geekbench listing. The Samsung
0 Comments
Dec 09, 2022Ravie Lakshmanan Cybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S. Cisco Talos said the attackers behind the operation have moved from using malicious emails to alternative delivery methods such as the exploitation of a now-patched remote code execution (RCE) flaw in Netwrix auditor as
0 Comments
Dec 10, 2022Ravie LakshmananEnterprise Security / IP Phones Cisco has released a new security advisory warning of a high-severity flaw affecting IP Phone 7800 and 8800 Series firmware that could be potentially exploited by a remote attacker to cause remote code execution or a denial-of-service (DoS) condition. The networking equipment major said it’s working on
0 Comments
Dec 10, 2022Ravie LakshmananHack-for-Hire / Threat Intelligence Travel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a broader campaign aimed at legal and financial investment institutions in the Middle East and Europe. The attacks targeting law firms throughout 2020 and 2021 involved a revamped variant of a malware
0 Comments
Dec 10, 2022Ravie LakshmananWeb App Firewall / Web Security A new attack method can be used to circumvent web application firewalls (WAFs) of various vendors and infiltrate systems, potentially enabling attackers to gain access to sensitive business and customer information. Web application firewalls are a key line of defense to help filter, monitor, and block
0 Comments
Businesses know they need cybersecurity, but it seems like a new acronym and system is popping up every day. Professionals that aren’t actively researching these technologies can struggle to keep up. As the cybersecurity landscape becomes more complicated, organizations are desperate to simplify it. Frustrated with the inefficiencies that come with using multiple vendors for
0 Comments