Technology

Feb 12, 2024NewsroomVulnerability / Data Recovery Cybersecurity researchers have uncovered an “implementation vulnerability” that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). “Through a comprehensive analysis
0 Comments
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person “conspiring to participate in or attempting to
0 Comments
Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT) called Warzone RAT. The domains – www.warzone[.]ws and three others – were “used to sell computer malware used by cybercriminals to secretly access and steal data from
0 Comments
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a fast-paced development process while staying up-to-date with the latest security patches. However, in practice, developers often face a large amount of security work without clear
0 Comments
WhatsApp, the popular messaging platform Meta owns, has rolled out a new feature allowing users to block spam directly from their lock screens. This update aims to combat the rising prevalence of spam messages and give users greater control over their messaging experience. Spam messages have long been a concern for messaging networks such as
0 Comments
Frame AI Glasses, a new artificial intelligence (AI)-powered wearable gadget, has been unveiled by Brilliant Labs. The device competes with similar wearable AI products such as Humane’s AI Pin and the Rabbit R1. The AI glasses by the company visually appear like standard prescription glasses but are equipped with a micro-OLED display and multimodal AI
0 Comments
Apple has been making preparations to open the gates of iOS to allow third-party app marketplaces and apps on its platform in the European Union (EU). It recently rolled out the iOS 17.4 betas versions of the upcoming update that added support for alternative marketplaces. Now, the iPhone maker has released updates for App Store
0 Comments
Feb 09, 2024NewsroomMobile Security / Cyber Threat Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. “Typical MoqHao requires users to install and launch the app to get their desired purpose, but this new variant requires no execution,” McAfee Labs said
0 Comments
HMD Global recently refreshed its online presence by dropping the Nokia branding from all spheres. Nokia.com is now redirected to HMD.com, and the X (formerly Twitter) handle of @nokiamobile has changed to @HMDglobal. The Finnish company was already expected to launch its products, including smartphones. This major transition led many to believe we would see
0 Comments
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some critical infrastructure networks in the country for at least five years. Targets of the threat actor include communications, energy, transportation, and water and wastewater systems sectors in the U.S. and Guam. “Volt Typhoon’s choice of
0 Comments
Feb 07, 2024NewsroomDevice Security / Vulnerability The maintainers of shim have released version 15.8 to address six security flaws, including a critical bug that could pave the way for remote code execution under specific circumstances. Tracked as CVE-2023-40547 (CVSS score: 9.8), the vulnerability could be exploited to achieve a Secure Boot bypass. Bill Demirkapi of
0 Comments