Technology

The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. “This group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions of Kavach multi-authentication (MFA) applications,” Zscaler ThreatLabz researcher Sudeep Singh said in a Thursday
0 Comments
Google’s Pixel smartphones have always been known for their excellent camera capabilities, despite not always having the most competitive hardware. But with some of the recent crop of flagship Android phones sporting add-on imaging chipsets, manufacturers have been able to deliver a similar level of imaging quality that easily rival the Pixel’s AI photography smarts. Google’s return
0 Comments
Every SaaS app user and login is a potential threat; whether it’s bad actors or potential disgruntled former associates, identity management and access control is crucial to prevent unwanted or mistaken entrances to the organization’s data and systems. Since enterprises have thousands to tens of thousands of users, and hundreds to thousands of different apps,
0 Comments
A set of four Android apps released by the same developer has been discovered directing victims to malicious websites as part of an adware and information-stealing campaign. The apps, published by a developer named Mobile apps Group and currently available on the Play Store, have been collectively downloaded over one million times. According to Malwarebytes,
0 Comments
Microsoft has reportedly rolled out a feature to Office Insiders — its testing program with early access to new Microsoft Office features and updates — that allows a user to insert images from their Android phone directly to Microsoft Word or PowerPoint on the Web. The feature is aimed at easing the process of transferring
0 Comments
Multiple vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software that could be chained together by an unauthenticated, remote attacker to fully take over affected servers. “These vulnerabilities can be chained together by an unauthenticated, remote attacker to gain code execution on the server running Checkmk version 2.1.0p10 and lower,” SonarSource researcher Stefan Schiller
0 Comments
Samsung has seemingly toned down its sales expectations for 2023 after purportedly falling short of its target for this year. The South Korean tech giant is expected to compete fiercely with Apple when it launches the Galaxy S23 series in 2023. It is reportedly expecting the Galaxy S23 Ultra to outperform its other two siblings
0 Comments
Microsoft on Tuesday said it addressed an authentication bypass vulnerability in Jupyter Notebooks for Azure Cosmos DB that enabled full read and write access. The tech giant said the problem was introduced on August 12, 2022, and rectified worldwide on October 6, 2022, two days after responsible disclosure from Orca Security, which dubbed the flaw
0 Comments
The OpenSSL project has rolled out fixes to contain two high-severity flaws in its widely used cryptography library that could result in a denial-of-service (DoS) and remote code execution. The issues, tracked as CVE-2022-3602 and CVE-2022-3786, have been described as buffer overrun vulnerabilities that can be triggered during X.509 certificate verification by supplying a specially-crafted
0 Comments
In today’s world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS, penetration testing is now an essential security requirement for organisations of all sizes. But what should you look for when choosing the right provider? The sheer number of providers can be daunting, and finding one
0 Comments
The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360’s Network Security Research Lab said in a report published last week. Fodcha
0 Comments
The increased use of information technology in our everyday life and business has led to cyber-attacks becoming more sophisticated and large-scale. For organizations to thrive in this era of technology, they must develop robust security strategies to detect and mitigate attacks. Defense in depth is a strategy in which companies use multiple layers of security
0 Comments
Redmi Note 12 Discovery Edition was launched in China on Thursday. The new smartphone by the Xiaomi sub-brand was unveiled alongside the Redmi Note 12, Redmi Note 12 Pro and Redmi Note 12 Pro+ phones. The Redmi Note 12 Discovery Edition has similar specifications to the regular Redmi Pro+ model. However, the Redmi Note 12
0 Comments