Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with the goal of stealing users’ Google Cloud credentials from a narrow pool of victims. The package, named “lr-utils-lib,” attracted a total of 59 downloads before it was taken down.
Technology
OpenAI launched a temporary prototype of an artificial intelligence (AI) search engine dubbed SearchGPT on Thursday. The announcement came just a day after Microsoft rolled out its Bing generative search. Currently, SearchGPT is available in limited release, with access to a small group of users and publishers. The company has also opened a waitlist for
Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known malware called PlugX. The Paris Prosecutor’s Office, Parquet de Paris, said the initiative was launched on July 18 and that it’s expected to continue for “several months.” It further
Meta Quest 3 will soon be integrated with the company’s artificial intelligence (AI) chatbot Meta AI, the company confirmed on Tuesday. The chatbot will become the mixed-reality headset’s official AI assistant and will respond to verbal queries. Just like the social media apps by the company, Meta AI on Quest will also be able to
Jul 26, 2024The Hacker NewsDigital Warfare / Cybersecurity Training “Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that the sharpest tools of peace are forged.” – Victor Hugo. In 1971, an unsettling message started appearing on several computers that comprised ARPANET, the precursor to
Apple has reduced the price of iPhone 15, iPhone 14 and other models in India following a reduction in the import duties. Consequently, the prices of some of Apple’s most popular models have seen a price drop from as little as Rs. 300 to as high as Rs. 6,000. This development comes a week after
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform” capable of targeting users of more
Vivo Y18i has been silently launched in India. The new Vivo Y series smartphone comes in two colour options with a 6.56-inch HD+ display. It has a Unisoc T612 chipset under the hood, coupled with 4GB RAM and 64GB storage. The budget handset flaunts a dual camera setup at the rear, headlined by a 13-megapixel primary shooter.
Jul 25, 2024NewsroomMalware / Cyber Espionage A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps
Microsoft added a new artificial intelligence (AI) feature to its Bing search engine on Wednesday. Dubbed Bing generative search, the feature shows a snapshot with the information for the searched query. The feature is similar to Google’s AI Overviews which was publicly released in the US in May. Bing’s AI-powered search feature also shows the
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment.
Google Pixel Buds Pro 2 are expected to launch soon as the Pixel Buds Pro successor. The Pixel Buds Pro were unveiled in May 2022. The second generation of these true wireless stereo (TWS) earphones are expected to be launched alongside the Pixel 9 series of smartphones at the Made by Google event on August 13. Previously,
A zero-day security flaw in Telegram’s mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking videos. The exploit appeared for sale for an unknown price in an underground forum on June 6, 2024, ESET said. Following responsible disclosure on June 26, the issue was addressed by Telegram
Apple Watch For Your Kids – the family setup experience for children – is now available to users in India. It enables adults to set up cellular Apple Watch models for their children, allowing them to make calls and send messages even if they don’t have an iPhone. Notably, the Cupertino-based technology conglomerate is also marketing
Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work. But what if there were a way to reduce or even altogether eliminate security questionnaires? The root problem isn’t a lack of great questionnaire products
Vivo V40 series has been teased by the company and will be launched in India soon. Recent reports hinted at the arrival of the smartphones in the country and now the firm has revealed the design and colour options of the handsets. It will include a base Vivo V40 and a Vivo V40 Pro variant,
Jul 23, 2024NewsroomICS Malware / Critical Infrastructure Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it
Talks over a global tax deal are continuing well past a June 30 deadline and governments are now looking to a Group of 20 finance leaders meeting this week for progress on a stalled plan to reallocate taxing rights on large multinational companies. The so-called “Pillar 1” arrangement, part of a 2021 global two-part tax
Jul 23, 2024NewsroomCyber Espionage / Chinese Hackers Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools. The campaign is a sign that the group “also engages in internal espionage,” Symantec’s Threat Hunter Team, part
OnePlus seems to have cooked up another interesting smartwatch with the launch of its new Watch 2R model. As the last character of the product name aptly describes, the OnePlus Watch 2R is an affordable version of the Watch 2. This is similar to the OnePlus 12R, a smartphone which offers similar performance as the
- « Previous Page
- 1
- …
- 23
- 24
- 25
- 26
- 27
- …
- 257
- Next Page »