An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims. “To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of
Technology
OnePlus Nord 2 5G was launched on Thursday as the latest model in the company’s Nord series. In comparison with last year’s OnePlus Nord that came with quad rear cameras and had dual selfie cameras, the OnePlus Nord 2 5G has triple rear cameras and a punch-hole display with a single selfie camera. The new
Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system. Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that’s remotely
Vivo Y53s NFC has been launched in Indonesia and is up for pre-orders starting today, July 22. Earlier this month, Vivo Y53s was launched in Vietnam but that model did not have NFC support. Other than NFC functionality, both phones seem to have the same specifications as per the Vivo Indonesia website and the e-retailer
A software package available from the official NPM repository has been revealed to be actually a front for a tool that’s designed to steal saved passwords from the Chrome web browser. The package in question, named “nodejs_net_server” and downloaded over 1,283 times since February 2019, was last updated seven months ago (version 1.1.2), with its
Google is updating Chrome for Android with an easier way for users to manage permissions for each site. Alongside the updated site permission controls, Chrome for Android is getting Site Isolation improvements to better protect users from malicious websites. Google is also expanding Chrome Actions by adding new options to make privacy and security management
Microsoft’s Windows 10 and the upcoming Windows 11 versions have been found vulnerable to a new local privilege escalation vulnerability that permits users with low-level permissions access Windows system files, in turn, enabling them to unmask the operating system installation password and even decrypt private keys. “Starting with Windows 10 build 1809, non-administrative users are
Netflix is getting into gaming, for real. In its quarterly letter to shareholders, the video-streaming service announced that it’s currently in the “early stages” of expanding into games. On the earnings call, Netflix founder and co-CEO Reed Hastings said they are “pushing” on it, while COO and chief product officer Greg Peters called gaming a
Details have emerged about a high severity security vulnerability affecting a software driver used in HP, Xerox, and Samsung printers that has remained undetected since 2005. Tracked as CVE-2021-3438 (CVSS score: 8.8), the issue concerns a buffer overflow in a print driver installer package named “SSPORT.SYS” that can enable remote privilege and arbitrary code execution.
Xiaomi Mi Mix 4 and Mi CC 11 phones have been spotted on China’s certification site TENAA, hinting that the two phones may launch soon. The Mi Mix 4 key specifications have also been leaked by a tipster on Weibo suggesting that the phone may have a 6.67-inch OLED panel and an in-display selfie camera.
Cybersecurity researchers on Tuesday lifted the lid on a previously undocumented malware strain dubbed “MosaicLoader” that singles out individuals searching for cracked software as part of a global campaign. “The attackers behind MosaicLoader created a piece of malware that can deliver any payload on the system, making it potentially profitable as a delivery service,” Bitdefender
Redmi Note 10T 5G launch in India is set for today (Tuesday, July 20). The launch will take place through a virtual event. The Redmi Note 10T 5G will debut as the fifth model in the Redmi Note 10 series that already comprises the Redmi Note 10, Redmi Note 10 Pro, Redmi Note 10 Pro
A threat group likely based in Romania and active since at least 2020 has been behind an active cryptojacking campaign targeting Linux-based machines with a previously undocumented SSH brute-forcer written in Golang. Dubbed “Diicot brute,” the password cracking tool is alleged to be distributed via a software-as-a-service model, with each threat actor furnishing their own
WhatsApp on Monday started rolling out joinable group calls to let users join a group video or voice call after it’s started and was missed initially. This will help users join a group call even if they initially miss a call when their phone rings. The update also brings an easy way to let you
Merely days after Microsoft sounded the alarm on an unpatched security vulnerability in the Windows Print Spooler service, possibly yet another zero-day flaw in the same component has come to light, making it the fourth printer-related flaw to be discovered in recent weeks. “Microsoft Windows allows for non-admin users to be able to install printer
OnePlus Nord 2 specifications and colour options have leaked ahead of this week’s launch. The phone is all set to launch in India on July 22. The OnePlus Nord 2 renders have also leaked and the design shown is similar to what has leaked in the past. The phone is seen to sport a hole-punch
Web infrastructure and website security company Cloudflare last month fixed a critical vulnerability in its CDNJS library that’s used by 12.7% of all websites on the internet. CDNJS is a free and open-source content delivery network (CDN) that serves about 4,041 JavaScript and CSS libraries, making it the second most popular CDN for JavaScript after
Oppo A16 has been launched in Indonesia as a budget-friendly offering that succeeds Oppo A15 from October last year. The phone has slim bezels on the side and a thick chin. It comes with a notched display and a triple rear camera setup. Oppo A16 is offered in three colours and a single RAM +
Instagram earlier this week introduced a new “Security Checkup” feature that aims to keep accounts safe and help users—whose accounts may have been compromised—to recover them. In order to gain access to accounts, users will be prompted to perform a series of steps, which include checking recent login activity, reviewing profile information, and updating contact
How can you prevent payments apps from being misused if you lose your phone? With Unified Payments Interface (UPI) in India, services like Paytm, Google Pay, Phone Pe, and others have become something of a necessity. Most users have at least one payment app on their phones linked with UPI. While UPI offers a secure