A new high-severity vulnerability has been disclosed in the Zimbra email suite that, if successfully exploited, enables an unauthenticated attacker to steal cleartext passwords of users sans any user interaction. “With the consequent access to the victims’ mailboxes, attackers can potentially escalate their access to targeted organizations and gain access to various internal services and
Technology
The X80 and the X80 Pro (Review) are the latest additions to Vivo’s camera-centric flagship X series. We have already reviewed the Vivo X80 Pro and today, we’ll be focusing on the X80. It’s important to understand that Vivo has made some changes to its naming convention for its latest X series. The X80 actually replaces the X70 Pro from
A Chinese advanced persistent threat (APT) known as Gallium has been observed using a previously undocumented remote access trojan in its espionage attacks targeting companies operating in Southeast Asia, Europe, and Africa. Called PingPull, the “difficult-to-detect” backdoor is notable for its use of the Internet Control Message Protocol (ICMP) for command-and-control (C2) communications, according to
Realme RMX3551 smartphone has made its way to China’s TENAA certification website. The model number has previously been reported to belong to the Realme GT 2 Explorer Master Edition. The new smartphone has been listed online with features like UHD resolution display, an in-display fingerprint sensor, dual-SIM support, and more. The smartphone has reportedly been
A technically sophisticated threat actor known as SeaFlower has been targeting Android and iOS users as part of an extensive campaign that mimics official cryptocurrency wallet websites intending to distribute backdoored apps that drain victims’ funds. Said to be first discovered in March 2022, the cluster of activity “hint[s] to a strong relationship with a
Samsung Galaxy Z Flip 4 battery images have reportedly surfaced and hint at a major upgrade in the battery capacity of the foldable smartphone from Samsung. The Galaxy Flip 4 is said to be powered by two batteries with different capacities and the charging speed is also expected to be increased to 25W. The handset’s
The Iranian state-sponsored threat actor tracked under the moniker Lyceum has turned to using a new custom .NET-based backdoor in recent campaigns directed against the Middle East. “The new malware is a .NET based DNS Backdoor which is a customized version of the open source tool ‘DIG.net,'” Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar
OnePlus’s new smartphone codenamed Ovaltine is reportedly making its way to the market soon. The handset is expected to come with OnePlus 10 or OnePlus 10T moniker. The launch date of the smartphone has not been shared by OnePlus yet, but ahead of it, renders and specifications of it have leaked online. The OnePlus 10
Common cybercriminals are a menace, there’s no doubt about it – from bedroom hackers through to ransomware groups, cybercriminals are causing a lot of damage. But both the tools used and the threat posed by common cybercriminals pale in comparison to the tools used by more professional groups such as the famous hacking groups and
Nothing Phone 1, the first smartphone from the brand led by Carl Pei, is all set to launch globally on July 12. One month before the formal debut, the pre-booking details of the smartphone have leaked online. As per the leak, users will be able to pre-book the Nothing Phone 1 via Flipkart by paying
As many as eight zero-day vulnerabilities have been disclosed in Carrier’s LenelS2 HID Mercury access control system that’s used widely in healthcare, education, transportation, and government facilities. “The vulnerabilities uncovered allowed us to demonstrate the ability to remotely unlock and lock doors, subvert alarms and undermine logging and notification systems,” Trellix security researchers Steve Povolny
Tecno Pova 3 India launch is set to take place soon. Although Tecno is yet to announce the exact date of its debut, a dedicated microsite on Amazon India is teasing the launch and specifications of the new Pova series phone in the country. The phone will be powered by the MediaTek Helio G88 SoC,
A novel hardware attack dubbed PACMAN has been demonstrated against Apple’s M1 processor chipsets, potentially arming a malicious actor with the capability to gain arbitrary code execution on macOS systems. It leverages “speculative execution attacks to bypass an important memory protection mechanism, ARM Pointer Authentication, a security feature that is used to enforce pointer integrity,”
OnePlus started providing a physical alert slider on its smartphones since the launch of the OnePlus One. Located on the upper left edge of the phone, it allows the user to set sound profile of the phone as silent, vibrate, and ring without unlocking the screen. According to a tipster, this practice will change soon
Cybercriminals are impersonating popular crypto platforms such as Binance, Celo, and Trust Wallet with spoofed emails and fake login pages in an attempt to steal login details and deceptively transfer virtual funds. “As cryptocurrency and non-fungible tokens (NFTs) become more mainstream, and capture headlines for their volatility, there is a greater likelihood of more individuals
Samsung Galaxy Z Fold 4 and Galaxy Z Flip 4 have been on the rumour mill for quite some time now. The South Korean brand is expected to unveil the latest foldable phones in August this year. Ahead of the launch, a new leak suggests that Samsung will add a swipe for split-screen feature on
A new research undertaken by a group of academics from the University of California San Diego has revealed for the first time that Bluetooth signals can be fingerprinted to track smartphones (and therefore, individuals). The identification, at its core, hinges on imperfections in the Bluetooth chipset hardware introduced during the manufacturing process, resulting in a
Poco is reportedly launching a new smartphone this year and it is said to be a rebranded version of the Redmi Note 10S. The Chinese brand is also expected to launch a Pro variant of the smartphone as well. The details of the rumoured smartphone were reportedly spotted in Mi Code. The handset was also
Cybersecurity researchers have taken the wraps off what they call a “nearly-impossible-to-detect” Linux malware that could be weaponized to backdoor infected systems. Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim’s resources like
HTC is hosting an event on June 28 where it is expected to launch its ‘metaverse’ smartphone under the Viverse brand. The phone is speculated to be focussed on delivering augmented reality (AR) and virtual reality (VR) experiences. Earlier this year, the Taiwanese company introduced interoperable ecosystem Viverse to set the pitch for making a