Technology

Not all heroes wear capes. Cybersecurity professionals are digital warriors who use their knowledge and skill to battle malicious hackers. Sounds like an exciting career, right? If the comic-book comparisons aren’t working for you, perhaps some figures will. According to ZipRecruiter, the average salary of a cybersecurity professional is just over $100,000 a year. The
0 Comments
A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called “intermittent encryption.” Called LockFile, the operators of the ransomware have been found exploiting recently disclosed flaws such as ProxyShell and PetitPotam to compromise Windows servers and deploy file-encrypting malware that
0 Comments
Microsoft Surface Duo 2 launch could be around the corner as the smartphone has now been spotted on Geekbench benchmarking site. The listings suggest some key specifications of the smartphone. The Microsoft Surface Duo 2 will succeed the original Microsoft Surface Duo smartphone that launched last year. A previous leak had also tipped some key
0 Comments
Cloud infrastructure security company Wiz on Thursday revealed details of a now-fixed Azure Cosmos database vulnerability that could have been potentially exploited to grant any Azure user full admin access to other customers’ database instances without any authorization. The flaw, which grants read, write, and delete privileges, has been dubbed “ChaosDB,” with Wiz researchers noting
0 Comments
U.S. technology firm Kaseya has released security patches to address two zero-day vulnerabilities affecting its Unitrends enterprise backup and continuity solution that could result in privilege escalation and authenticated remote code execution. The two weaknesses are part of a trio of vulnerabilities discovered and reported by researchers at the Dutch Institute for Vulnerability Disclosure (DIVD)
0 Comments
Moto E20 (codenamed Aruba) may launch soon as appears to have surfaced in a Geekbench listing. The listing also suggests some key specifications of the upcoming budget-friendly smartphone. The exact launch date of the smartphone has not yet been confirmed. Earlier this week, notable tipster Evan Blass (@evleaks) shared some official-looking renders of the smartphone,
0 Comments
Google and Microsoft said they are pledging to invest a total of $30 billion in cybersecurity advancements over the next five years, as the U.S. government partners with private sector companies to address threats facing the country in the wake of a string of sophisticated malicious cyber activity targeting critical infrastructure, laying bare the risks
0 Comments
Enterprise security and network appliance vendor F5 has released patches for more than two dozen security vulnerabilities affecting multiple versions of BIG-IP and BIG-IQ devices that could potentially allow an attacker to perform a wide range of malicious actions, including accessing arbitrary files, escalating privileges, and executing JavaScript code. Of the 29 bugs addressed, 13
0 Comments
Snapchat has brought its next-generation Scan to the homescreen to let people easily access augmented reality (AR) based utility to identify dogs, food, and plants and can use their camera to solve math equations. The Scan feature last received an update in 2019 to let users experience its AR advancements. Snapchat parent Snap also partnered
0 Comments
Today I discuss an attack vector conducive to cross-organizational spread, in-home local propagation. Though often overlooked, this vector is especially relevant today, as many corporate employees remain working from home. In this post, I contrast in-home local propagation with traditional vectors through which a threat (ransomware in particular) spreads throughout an organization. I discuss the
0 Comments
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely new backdoor on infected systems, indicating the operators are continuously retooling their malware arsenal to avoid detection and stay under the radar. The previously undocumented malware has been dubbed “Sardonic” by Romanian cybersecurity
0 Comments
I’m sure you would agree that, in today’s digital world, the majority of applications we work on require some type of credentials – to connect to a database with a username/password, to access computer programs via authorized tokens, or API keys to invoke services for authentication. Credentials, or sometimes just referred to as ‘Secrets,’ are
0 Comments
Vivo X70 Pro’s official-looking renders have surfaced online, hinting that the smartphone may launch soon. The Vivo X70 series is expected to debut in September. However, there has been no official confirmation from the company regarding the smartphone’s launch. Vivo X70 Pro was also spotted on the Google Play Console listing that hints at the
0 Comments
A previously undisclosed “zero-click” exploit in Apple’s iMessage was abused by Israeli surveillance vendor NSO Group to circumvent iOS security protections and target nine Bahraini activists. “The hacked activists included three members of Waad (a secular Bahraini political society), three members of the Bahrain Center for Human Rights, two exiled Bahraini dissidents, and one member
0 Comments