CMF Phone 1 is set to make its debut on July 8 alongside the CMF Buds Pro 2 and CMF Watch Pro 2. The Nothing sub-brand is actively sharing teasers about the components used in its upcoming handset, which is expected to arrive in the competitive budget segment. Most recently, CMF has disclosed the chipset
Technology
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and cryptocurrency miners. The development marks the threat’s transition from what appeared to be a dormant botnet with unclear motives to a financially motivated operation. “With its latest updates to the crypto miner, ransomware payload, and rootkit elements, it
Figma, the website and app design platform, introduced a user interface (UI) redesign and multiple new artificial intelligence (AI) features, on Wednesday. The company is calling the new look UI3 as this is the third significant redesign of the platform since its launch in closed beta in 2016. Alongside, a suite of new AI features
Jun 27, 2024The Hacker NewsArtificial Intelligence / SaaS Security While some SaaS threats are clear and visible, others are hidden in plain sight, both posing significant risks to your organization. Wing’s research indicates that an astounding 99.7% of organizations utilize applications embedded with AI functionalities. These AI-driven tools are indispensable, providing seamless experiences from collaboration
Samsung Galaxy Z Flip 6 and Galaxy Z Fold 6 are expected to debut in the coming days as the latest foldable phones from the South Korean tech conglomerate. On Wednesday, Samsung announced that its next Galaxy Unpacked event of the year would take place on July 10, and the company has now opened pre-order
Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the wild shortly after details of the bug were publicly disclosed. The vulnerability, tracked as CVE-2024-5806 (CVSS score: 9.1), concerns an authentication bypass that impacts the following versions – From 2023.0.0 before
The iPhone 15 Pro arrived last year, promising hardware capable of running triple-A games on mobile platforms. Several console titles have since been released for iOS, including games from the Resident Evil franchise, Death Stranding and, most recently, Assassin’s Creed Mirage. Turns out that these major titles have not found many takers among iPhone users.
Jun 26, 2024NewsroomCyber Attack / Malware Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors across the world between 2021 and 2023. While one cluster of activity has been associated with the ChamelGang (aka CamoFei), the second cluster overlaps
Samsung Galaxy Unpacked will take place on July 10, and the firm’s Galaxy Watch 7 series and Galaxy Buds 3 series are expected to be released at the event alongside the Galaxy Z Fold 6 and Z Flip 6 phones. Ahead of the debut of these wearables and audio products, a publication has leaked details of
Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk – the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do not
Genesys International, the Mumbai-based mapping, survey, and geospatial solutions company, launched artificial intelligence-powered navigation maps on Monday. The map encompasses 83 lakh kilometres across India. The company claims it was built specifically for the automotive and mobility industries of the country and will help build personalised driving experiences and offer location intelligence. Alongside this, the
Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses. Elastic Security Labs has codenamed the approach GrimResource after identifying an artifact (“sccm-updater.msc“) that was
Casio G-Shock GBD-300, with a shock-resistant design, has been unveiled. The smartwatch has a water resistance rating of 20 bar, which means it can be used during activities like swimming and other high-impact water sports. It supports Bluetooth connectivity and is compatible with the G-Shock Move companion app. The company has not yet revealed the price of
Jun 24, 2024NewsroomVulnerability / Artificial Intelligence Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry out vulnerability research with an aim to improve automated discovery approaches. “The Naptime architecture is centered around the interaction between an AI agent and a target codebase,” Google Project
Apple is reportedly planning to bring Meta Platforms’ artificial intelligence (AI) models to its devices, adding it to OpenAI’s ChatGPT. At the Worldwide Developers Conference (WWDC) 2024, the Cupertino-based tech giant unveiled its in-house AI features under the Apple Intelligence umbrella. Alongside it also announced the integration of ChatGPT within iOS 18, iPadOS 18, and
Jun 24, 2024The Hacker NewsThreat Intelligence / Cybersecurity Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. Cybersecurity professionals
WhatsApp is said to be working on several new features for the Android platform. According to a feature tracker, one of the features introduced in the latest WhatsApp for Android beta app update is a new in-app dialler. This feature is speculated to make WhatsApp calling convenient by allowing users to make calls directly from
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor. Dubbed PHANTOM#SPIKE by Securonix, the unknown threat actors behind the activity have leveraged military-related phishing documents to activate the infection sequence. “While there are many
Anthropic released the first entrant in the Claude 3.5 large language model (LLM) family, Claude 3.5 Sonnet, on Friday. The new release comes just three months after the AI firm unveiled the Claude 3 family of artificial intelligence (AI) models. As per the company, the latest AI model can outperform Claude 3 Opus, the most
Jun 22, 2024NewsroomNational Security / Cyber Espionage The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed sanctions against a dozen individuals serving executive and senior leadership roles at Kaspersky Lab, a day after the Russian company was banned by the Commerce Department. The move “underscores our commitment to ensure the integrity
- « Previous Page
- 1
- …
- 29
- 30
- 31
- 32
- 33
- …
- 257
- Next Page »