Technology

Oppo’s successor to last year’s foldable Oppo Find N is reportedly set to release as Oppo Find N2. The purported foldable smartphone has been tipped by Digital Chat Station via a Weibo post with regards to key specifications including details about the processor, display, battery, build form, and software. The specifications and details of the
0 Comments
An advanced persistent threat (APT) group of Chinese origin codenamed DiceyF has been linked to a string of attacks aimed at online casinos in Southeast Asia for years. Russian cybersecurity company Kaspersky said the activity aligns with another set of intrusions attributed to Earth Berberoka (aka GamblingPuppet) and DRBControl, citing tactical and targeting similarities as
0 Comments
Samsung Galaxy A24 specifications have been leaked online, ahead of the arrival of the purported successor to the Galaxy A23 smartphone. According to details shared by a Vietnamese publication, the upcoming handset will be powered by Samsung’s older Exynos 7904 chipset and pack a 4,000mAh battery. Unlike previous affordable A-Series phones, the Galaxy A24 is
0 Comments
Cybersecurity researchers have shared more details about a now-patched security flaw in Azure Service Fabric Explorer (SFX) that could potentially enable an attacker to gain administrator privileges on the cluster. The vulnerability, tracked as CVE-2022-35829, carries a CVSS severity rating of 6.2 and was addressed by Microsoft as part of its Patch Tuesday updates last
0 Comments
The China-aligned espionage-focused actor dubbed Winnti has set its sights on government organizations in Hong Kong as part of an ongoing campaign dubbed Operation CuckooBees. Active since at least 2007, Winnti (aka APT41, Barium, Bronze Atlas, and Wicked Panda) is the name designated to a prolific cyber threat group that carries out Chinese state-sponsored espionage
0 Comments
New research has disclosed what’s being called a security vulnerability in Microsoft 365 that could be exploited to infer message contents due to the use of a broken cryptographic algorithm. “The [Office 365 Message Encryption] messages are encrypted in insecure Electronic Codebook (ECB) mode of operation,” Finnish cybersecurity company WithSecure said in a report published
0 Comments
The threat actors behind the Black Basta ransomware family have been observed using the Qakbot trojan to deploy the Brute Ratel C4 framework as a second-stage payload in recent attacks. The development marks the first time the nascent adversary simulation software is being delivered via a Qakbot infection, cybersecurity firm Trend Micro said in a
0 Comments
Samsung Galaxy M04 and Galaxy A04e have reportedly been spotted on the Bluetooth Special Interest Group (SIG) certification website. These smartphones are believed to support Bluetooth v5.0 connectivity. Not much is known about these Samsung handsets in terms of specifications. Notably, the Galaxy M04 is supposedly listed along with the Galaxy A04e models. As the
0 Comments
Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. Characterizing it as a “multi-vector attack consisting of UDP and TCP floods,” researcher Omer Yoachimik said the DDoS attack targeted the Minecraft server Wynncraft in Q3 2022. “The entire 2.5 Tbps
0 Comments
Redmi Pad is the company’s entry level tablet that was launched in India last week. This entry-level tablet is competitive when it comes to specifications and pricing. According to the company, the tablet is aimed at entertainment, e-learning, browsing, and gaming. On this week’s episode of the Orbital podcast, we note that not many manufacturers
0 Comments
With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is
0 Comments
Telecommunications and IT service providers in the Middle East and Asia are being targeted by a previously undocumented Chinese-speaking threat group dubbed WIP19. The espionage-related attacks are characterized by the use of a stolen digital certificate issued by a Korean company called DEEPSoft to sign malicious artifacts deployed during the infection chain to evade detection.
0 Comments