Technology

As many as 34 Russian-speaking gangs distributing information-stealing malware under the stealer-as-a-service model stole no fewer than 50 million passwords in the first seven months of 2022. “The underground market value of stolen logs and compromised card details is estimated around $5.8 million,” Singapore-headquartered Group-IB said in a report shared with The Hacker News. Aside
0 Comments
Google Docs, Google Sheets, and Google Slides have been optimised for tablets and foldable phones, the search giant has announced, as part of several changes to its workspace applications for documents, spreadsheets, and presentations. The company previously announced it would update more than 20 Google applications to run better on tablets during Google I/O earlier
0 Comments
Microsoft on Tuesday disclosed the intrusion activity aimed at Indian power grid entities earlier this year likely involved the exploitation of security flaws in a now-discontinued web server called Boa. The tech behemoth’s cybersecurity division said the vulnerable component poses a “supply chain risk that may affect millions of organizations and devices.” The findings build
0 Comments
A malicious extension for Chromium-based web browsers has been observed to be distributed via a long-standing Windows information stealer called ViperSoftX. Czech-based cybersecurity company dubbed the rogue browser add-on VenomSoftX owing to its standalone features that enable it to access website visits, steal credentials and clipboard data, and even swap cryptocurrency addresses via an adversary-in-the-middle
0 Comments
Vivo X90, Vivo X90 Pro, and Vivo X90 Pro+ were launched in China on Tuesday (November 22), through a livestream event that was hosted on the company’s website and social media channels. The new flagship series brings a list of upgrades over last year’s Vivo X80 models. They feature Zeiss-branded cameras and the company’s V2
0 Comments
The Luna Moth campaign has extorted hundreds of thousands of dollars from several victims in the legal and retail sectors. The attacks are notable for employing a technique called callback phishing or telephone-oriented attack delivery (TOAD), wherein the victims are social engineered into making a phone call through phishing emails containing invoices and subscription-themed lures.
0 Comments
Australian software company Atlassian has rolled out security updates to address two critical flaws affecting Bitbucket Server, Data Center, and Crowd products. The issues, tracked as CVE-2022-43781 and CVE-2022-43782, are both rated 9 out of 10 on the CVSS vulnerability scoring system. CVE-2022-43781, which Atlassian said was introduced in version 7.0.0 of Bitbucket Server and
0 Comments
Samsung Electronics has expanded its partnership with Google to bring a new chipset for its upcoming flagship smartphones, according to details shared by a tipster. In the coming years, Samsung Galaxy phones and tablets could get more powerful. The South Korean technology giant has been making Google’s Tensor chips that power its Pixel smartphones, and
0 Comments
A notorious advanced persistent threat actor known as Mustang Panda has been linked to a spate of spear-phishing attacks targeting government, education, and research sectors across the world. The primary targets of the intrusions from May to October 2022 included counties in the Asia Pacific region such as Myanmar, Australia, the Philippines, Japan, and Taiwan,
0 Comments
Vivo X90 specifications are officially out and the smartphone will come with support for 120W fast charging among other features. The upcoming handset from Vivo will come in two different display options from which the users can choose, including the BOE Q9 and the Samsung E6 panel. The smartphone will launch in China on November
0 Comments