Technology

Users searching for TeamViewer remote desktop software on search engines like Google are being redirected to malicious links that drop ZLoader malware onto their systems while simultaneously embracing a stealthier infection chain that allows it to linger on infected devices and evade detection by security solutions. “The malware is downloaded from a Google advertisement published
0 Comments
Researchers on Monday took the wraps off a newly discovered Linux and Windows re-implementation of Cobalt Strike Beacon that’s actively set its sights on government, telecommunications, information technology, and financial institutions in the wild. The as-yet undetected version of the penetration testing tool — codenamed “Vermilion Strike” — marks one of the rare Linux ports,
0 Comments
Infinix Zero X, Zero X Pro, and Zero X Neo were launched on Monday as the company’s camera-focussed smartphones. The new models come with a periscope lens that is coupled with the company’s proprietary Galileo Algorithm Engine. According to Infinix this setup enables users to capture high-resolution moon shots from their smartphones. The new Infinix
0 Comments
A previously undocumented backdoor that was recently found targeting an unnamed computer retail company based in the U.S. has been linked to a longstanding Chinese espionage operation dubbed Grayfly. In late August, Slovakian cybersecurity firm ESET disclosed details of an implant called SideWalk, which is designed to load arbitrary plugins sent from an attacker-controlled server,
0 Comments
Samsung Galaxy A52s 5G, the latest Galaxy A-series handset from the South Korean smartphone maker, has reportedly started receiving the September Android security patch. The update may include stability improvements and bug fixes, as per the report. Eligible handsets in the European region are receiving the update. The company has already rolled out the security
0 Comments
Russian internet giant Yandex has been the target of a record-breaking distributed denial-of-service (DDoS) attack by a new botnet called Mēris. The botnet is believed to have pummeled the company’s web infrastructure with millions of HTTP requests, before hitting a peak of 21.8 million requests per second (RPS), dwarfing a recent botnet-powered attack that came
0 Comments
A mix of banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain are the target of a newly discovered Android trojan that could enable attackers to siphon personally identifiable information from infected devices, including banking credentials and open the door for on-device fraud. Dubbed S.O.V.A. (referring to the Russian word for owl),
0 Comments
The Linux community was caught unprepared when, in December 2020, as part of a change in the way Red Hat supports and develops CentOS, Red Hat suddenly announced that it’s cutting the official CentOS 8 support window from ten years – to just two, with support ending Dec 31, 2021. It created a peculiar situation
0 Comments
Microsoft on Wednesday said it remediated a vulnerability in its Azure Container Instances (ACI) services that could have been exploited by a malicious actor “to access other customers’ information” in what the researcher described as the “first cross-account container takeover in the public cloud.” An attacker exploiting the weakness could execute malicious commands on other
0 Comments