Apple has assembled $14 billion (roughly Rs. 1,16,442 crore) worth of iPhones in India in fiscal 2024, Bloomberg News reported on Wednesday. Apple now makes as much as 14 percent or about 1 in 7 of its marquee devices from India, the report said, citing people familiar with the matter. Foxconn assembled nearly 67 percent
Technology
Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report
Google is reportedly working on a new warning message for Google Messages that can prevent users from falling for a phishing scam or unknowingly installing malware on their devices. This feature will be triggered whenever the user clicks on a link sent by a number not saved in the Contacts. The new warning message is
Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets. The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked,
Meta is gearing up to launch the next generation of its artificial intelligence (AI) models, Llama 3, in the summer and it is said to bring new capabilities to its chatbots. Now, a new report suggests that the tech giant could launch two of its smaller AI models as soon as next week, much earlier
Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The sandbox, according to V8 Security technical lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within the host process.” The search behemoth
Nothing Ear and Nothing Ear A will be launched by the company next month, the UK startup led by OnePlus Co-Founder Carl Pei announced on Friday. The firm’s third generation of truly wireless stereo (TWS) audio products was previously expected to make its debut as the Nothing Ear 3, but the company announced that it
Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems. “The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious file download posing as an invoice,” Trustwave SpiderLabs researcher Karla
Apple has reportedly entered a deal with the stock photos and videos library Shutterstock to use the data to train its artificial intelligence (AI) models. The report also confirms the speculations that the tech giant is likely in the advanced stages of developing its in-house foundation model. Even as earlier reports have mentioned that the
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese hacking crew called UNC3886, whose
Redmi Turbo 3 is confirmed to launch in China in the near future, and the company’s first smartphone in the ‘Turbo’ lineup has now been spotted in leaked images. Tipster Fixed Focus Digital (translated from Chinese) shared a hands-on image of the purported Redmi Turbo 3 as well as two renders showing the rear panel
Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET,” Resecurity said in a technical report published this week. “It employs the
Instagram is one of the few social media platforms that are now engraved into our lifestyles. Whether sharing your vacation photos on Story, watching reels, or keeping a tab on your friends, Instagram is one platform to get all these. However, having so much screen time on the platform can be overwhelming for many. This
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top
Samsung Galaxy Watch FE will be launched soon, according to a report. The South Korean tech conglomerate could soon introduce a ‘Fan Edition’ (FE) version of its Galaxy Watch smartwatch, which runs on Google’s Wear OS operating system. It is expected to arrive at a lower price than the company’s recent smartwatch models, and its
Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The attack leverages CVE-2024-20720 (CVSS score: 9.1), which has been described by Adobe as a case of “improper neutralization of special elements” that could pave the way for arbitrary code
Apple urged a U.S. appeals court on Friday to overturn a U.S. trade tribunal’s decision to ban imports of some Apple Watches in a patent dispute with medical-monitoring technology company Masimo. Apple told the U.S. Court of Appeals for the Federal Circuit that the U.S. International Trade Commission’s decision was based on a “series of
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious
Vivo T3x 5G and iQoo Z9x 5G could soon be launched in India, as both smartphones were recently spotted on the Bureau of Indian Standards (BIS) certification listing, as per a report. The smartphones are the sub-models of the Vivo T3 and iQoo Z9 series, respectively. The iQoo Z9x was also reportedly spotted on the
Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 213
- Next Page »