Technology

Motorola is reportedly working on a new flagship smartphone codenamed ‘Frontier 22’. The handset is yet to be officially confirmed by the Lenovo-owned company, but some renders along with specifications of the phone have now surfaced online. The leaked renders of the rumoured Motorola phone show a hole-punch display and triple rear camera unit. Motorola
0 Comments
A previously undocumented cyber-espionage malware aimed at Apple’s macOS operating system leveraged a Safari web browser exploit as part of a watering hole attack targeting politically active, pro-democracy individuals in Hong Kong. Slovak cybersecurity firm ESET attributed the intrusion to an actor with “strong technical capabilities,” calling out the campaign’s overlaps to that of a
0 Comments
Cybersecurity researchers on Tuesday took the wraps off a multi-stage espionage campaign targeting high-ranking government officials overseeing national security policy and individuals in the defense industry in Western Asia. The attack is unique as it leverages Microsoft OneDrive as a command-and-control (C2) server and is split into as many as six stages to stay as
0 Comments
Realme 9 Pro and Realme 9 Pro+ smartphones are inching towards their launch in India. Ahead of the official debut, the renders of the handsets have surfaced online, suggesting the colour options for the two phones. Realme is said to bring the new smartphones in three distinct colour options, namely Aurora Green, Midnight Black, and
0 Comments
OnePlus 9 and OnePlus 9 Pro smartphones are getting a new OxygenOS 12 update based on Android 12. The update brings a lot of features including some system-level optimisations, dark mode customisation, enhancements in Gallery, camera, and Canvas AOD as well as fixes to various issues. OnePlus says the latest update includes some region-specific features.
0 Comments
Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from unsuspecting users. The instances of token fraud in the wild include hiding 99% fee functions and concealing backdoor routines, researchers from Check Point said in a report shared with The Hacker News. Smart contracts
0 Comments
Researchers have disclosed details of two critical security vulnerabilities in Control Web Panel that could be abused as part of an exploit chain to achieve pre-authenticated remote code execution on affected servers. Tracked as CVE-2021-45467, the issue concerns a case of a file inclusion vulnerability, which occurs when a web application is tricked into exposing
0 Comments
Latest analysis into the wiper malware that targeted dozens of Ukrainian agencies earlier this month has revealed “strategic similarities” to NotPetya malware that was unleashed against the country’s infrastructure and elsewhere in 2017. The malware, dubbed WhisperGate, was discovered by Microsoft last week, which said it observed the destructive cyber campaign targeting government, non-profit, and
0 Comments
An active espionage campaign has been attributed to the threat actor known as Molerats that abuses legitimate cloud services like Google Drive and Dropbox to host malware payloads and for command-and-control and the exfiltration of data from targets across the Middle East. The cyber offensive is believed to have been underway since at least July
0 Comments
The U.S. Treasury Department on Thursday announced sanctions against four current and former Ukrainian government officials for engaging in “Russian government-directed influence activities” in the country, including gathering sensitive information about its critical infrastructure. The agency said the four individuals were involved in different roles as part of a concerted influence campaign to destabilize the
0 Comments
A previously undocumented firmware implant deployed to maintain stealthy persistence as part of a targeted espionage campaign has been linked to the Chinese-speaking Winnti advanced persistent threat group (APT41). Kaspersky, which codenamed the rootkit MoonBounce, characterized the malware as the “most advanced UEFI firmware implant discovered in the wild to date,” adding “the purpose of
0 Comments