Technology

Jul 22, 2024NewsroomCloud Security / Phishing Attack A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises for their flexibility, cost effectiveness, and ease
0 Comments
The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced “technology suite” that runs the whole cybercrime supply chain spectrum to spearhead its operations. Infoblox
0 Comments
Infinix announced the introduction of its new near-field communication (NFC) technology last week. Dubbed 720-degree SphereTech NFC, the consumer technology brand claims that it has made significant advancements to the existing NFC technology to improve both its signal radius and the card reading area. At the moment, the company has not revealed which smartphones might
0 Comments
Jul 19, 2024The Hacker NewsMalware / Mobile Security A suspected pro-Houthi threat group targeted at least three humanitarian organizations in Yemen with Android spyware designed to harvest sensitive information. These attacks, attributed to an activity cluster codenamed OilAlpha, entail a new set of malicious mobile apps that come with their own supporting infrastructure, Recorded Future’s
0 Comments
Apple Vision Pro, which was unveiled last year at the company’s Worldwide Developers Conference (WWDC), will now support new immersive video content. The company announced on Thursday that new series and films captured in Apple Immersive Video will be available exclusively to Apple Vision Pro users starting this week. Apple’s immersive video technology utilises the 180-degree field of
0 Comments
Amazon Prime Day 2024 sale is currently underway in India. It commenced at midnight on July 20 for Amazon Prime users and will continue through July 21. The popular e-commerce platform is presenting significant markdowns on a diverse range of products, spanning fashion items, home furnishings, large appliances and personal electronic gadgets. Tablets from leading
0 Comments
Jul 19, 2024NewsroomRansomware / Cybercrime Two Russian nationals have pleaded guilty in a U.S. court for their participation as affiliates in the LockBit ransomware scheme and helping facilitate ransomware attacks across the world. The defendants include Ruslan Magomedovich Astamirov, 21, of Chechen Republic, and Mikhail Vasiliev, 34, a dual Canadian and Russian national of Bradford,
0 Comments
Businesses across the world have been hit by widespread disruptions to their Windows workstations stemming from a faulty update pushed out by cybersecurity company CrowdStrike. “CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts,” the company’s CEO George Kurtz said in a statement. “Mac and
0 Comments
Jul 18, 2024The Hacker NewsApp Security / Security Awareness Let’s face it: AppSec and developers often feel like they’re on opposing teams. You’re battling endless vulnerabilities while they just want to ship code. Sound familiar? It’s a common challenge, but there is a solution. Ever wish they proactively cared about security? The answer lies in
0 Comments
Apple has updated the company’s Apple Store app, revamping it with new options and personalisation settings. Its latest update to Apple’s shopping platform where users can learn about, explore and purchase the company’s devices has been overhauled, including the ‘For You’ section which is claimed to offer users a more personalised experience. Two existing options
0 Comments
Jul 18, 2024NewsroomMalware / Windows Security Cybersecurity researchers have shed light on an adware module that purports to block ads and malicious websites, while stealthily offloading a kernel driver component that grants attackers the ability to run arbitrary code with elevated permissions on Windows hosts. The malware, dubbed HotPage, gets its name from the eponymous
0 Comments