Technology

OnePlus 12 is expected to arrive soon in the market and succeed the current flagship model, OnePlus 11. The company has already confirmed some key specifications of the upcoming model. Design renders and other details were previously leaked by tipsters and now OnePlus has confirmed several important camera details of the smartphone. The OnePlus 12
0 Comments
Nov 09, 2023NewsroomEndpoint Security / Malware A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. “This incident is a part of a larger malvertising campaign that targets other utilities like Notepad++, Citrix, and
0 Comments
Nov 08, 2023NewsroomPrivacy / Data Security Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called “Protect IP Address in Calls” that masks users’ IP addresses to other parties by relaying the calls through its servers. “Calls are end-to-end encrypted, so even if a call is relayed through WhatsApp servers,
0 Comments
Nov 08, 2023NewsroomCloud Security / Cryptocurrency Cybersecurity researchers have developed what’s the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges. Cybersecurity company SafeBreach said it discovered three different methods to run the miner, including one that can be executed on a victim’s environment without attracting any
0 Comments
Nov 07, 2023NewsroomEndpoint Security / Malware The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain dubbed ObjCShellz. Jamf Threat Labs, which disclosed details of the malware, said it’s used as part of the RustBucket malware campaign, which came to light earlier this year. “Based on previous attacks
0 Comments
Nov 07, 2023NewsroomEndpoint Security / Malware A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection. “The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools
0 Comments
The Amazon Great Indian Festival sale, which kicked off October 7 for Amazon Prime members, is now into its final phase. The sale brings deep discounts and offers on a wide variety of products, including smartphones, tablets, laptops, gaming consoles, PC peripherals and more. The Amazon sale, which has now been going on for a
0 Comments
Nov 06, 2023NewsroomData Security / Malvertising An updated version of an information stealer malware known as Jupyter has resurfaced with “simple yet impactful changes” that aim to stealthily establish a persistent foothold on compromised systems. “The team has discovered new waves of Jupyter Infostealer attacks which leverage PowerShell command modifications and signatures of private keys
0 Comments
Nov 06, 2023NewsroomCyber War / Malware Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware. The intrusions, which took place as recently as October, have been attributed to an Iranian nation-state hacking
0 Comments
Nov 03, 2023The Hacker NewsArtificial Intelligence / Cyber Threat Here is what matters most when it comes to artificial intelligence (AI) in cybersecurity: Outcomes. As the threat landscape evolves and generative AI is added to the toolsets available to defenders and attackers alike, evaluating the relative effectiveness of various AI-based security offerings is increasingly important
0 Comments
Nov 04, 2023NewsroomMobile Security / Android Google is rolling out an “Independent security review” badge in the Play Store’s Data safety section for Android apps that have undergone a Mobile Application Security Assessment (MASA) audit. “We’ve launched this banner beginning with VPN apps due to the sensitive and significant amount of user data these apps
0 Comments