Anthropic released the first entrant in the Claude 3.5 large language model (LLM) family, Claude 3.5 Sonnet, on Friday. The new release comes just three months after the AI firm unveiled the Claude 3 family of artificial intelligence (AI) models. As per the company, the latest AI model can outperform Claude 3 Opus, the most
Technology
Jun 22, 2024NewsroomNational Security / Cyber Espionage The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed sanctions against a dozen individuals serving executive and senior leadership roles at Kaspersky Lab, a day after the Russian company was banned by the Commerce Department. The move “underscores our commitment to ensure the integrity
Meta is attempting to enhance and streamline its operations in the Web3 and wearables markets. The company has reportedly divided its Reality Labs team into two separate entities where one team will work on the metaverse-focussed Quest headsets and the other will dedicate its time to hardware wearables that Meta may launch in the future.
Jun 22, 2024NewsroomPhishing Attack / Adware A new campaign is tricking users searching for the Meta Quest (formerly Oculus) application for Windows into downloading a new adware family called AdsExhaust. “The adware is capable of exfiltrating screenshots from infected devices and interacting with browsers using simulated keystrokes,” cybersecurity firm eSentire said in an analysis, adding
Apple will delay launching three new artificial intelligence features because landmark European Union tech rules require it to ensure that rival products and services can function with its devices, the U.S. tech group said on Friday. Apple underscored its AI push earlier this month with a slew of new features and software enhancements for its
Jun 22, 2024NewsroomCyber Espionage / Threat Intelligence Russian organizations have been targeted by a cybercrime gang called ExCobalt using a previously unknown Golang-based backdoor known as GoRed. “ExCobalt focuses on cyber espionage and includes several members active since at least 2016 and presumably once part of the notorious Cobalt Gang,” Positive Technologies researchers Vladislav Lunin
Samsung Galaxy S25 series could be equipped with an Exynos 2500 chipset after all, according to a South Korean news report that contradicts claims that the firm plans to exclusively use Qualcomm’s next-generation Snapdragon mobile processor for its upcoming flagship smartphones. The firm is reportedly working on improving the yield of its chipset, with only
Jun 21, 2024NewsroomMalware / Threat Intelligence A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign primarily targeting government entities across Asia and EMEA (Europe, Middle East, and Africa) with SugarGh0st malware since at least August 2023. “SneakyChef uses lures that are scanned documents of government agencies, most of which
Tata Consultancy Services (TCS), the multinational IT service provider, announced signing a new deal with US-based Xerox on Friday. This deal expands the strategic partnership between the two companies and will let TCS build a cloud-native and generative artificial intelligence (AI) led digital platform for Xerox. The Mumbai-based IT giant will also create a cloud-first
Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to drop a backdoor called Oyster (aka Broomstick and CleanUpLoader). That’s according to findings from Rapid7, which identified lookalike websites hosting the malicious payloads that users are redirected to after searching for them
OnePlus recently launched its first WearOS-powered smartwatch, the OnePlus Watch 2, but it already seems to be cooking up another one as per a new leak. In February, OnePlus launched its Watch 2, which was powered by two processors and two operating systems, both of which switched seamlessly and delivered better battery life as described
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.5), the “UEFIcanhazbufferoverflow” vulnerability has been described as a case of a buffer overflow stemming from the use
Apple has allegedly been targeted in a data breach that resulted in a hacker stealing the source code of its internal tools. A threat actor group that goes by the name ‘IntelBroker’ has assumed responsibility for the theft of the source code for three internal tools commonly used by the tech giant. IntelBroker has reportedly
Jun 20, 2024The Hacker NewsEndpoint Protection / Data Security Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but lack integration. Top Cybersecurity Challenges: Discuss the main challenges MSPs face, including integration issues, limited visibility across systems,
Motorola Razr 50 Ultra is expected to come in new colourways, according to a tipster on social media. The smartphone is set to launch in China, alongside the standard Motorola Razr 50, on June 25, the company confirmed in a Weibo post a few days ago. However, it is expected to make its global debut
Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken’s Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it
Nvidia became the world’s most valuable company on Tuesday, dethroning tech heavyweight Microsoft as its high-end processors play a central role in a scramble to dominate artificial intelligence technology. Shares of the chipmaker climbed 3.5 percent to $135.58, lifting its market capitalization to $3.335 trillion (roughly Rs. 2,78,15,901 crore), just days after overtaking iPhone maker
Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does
Apple Vision Pro 2 – the rumoured successor to the Cupertino-based tech giant’s first-ever mixed-reality headset – may not see the light of day at all, according to a report. This development is reportedly due to poor sales of the AR/VR headset which costs $3,499 (roughly Rs. 2,90,000) for the base 256GB storage model. However,
Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the European Union to scan users’ private messages for detection child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned Meredith Whittaker, president of the Signal Foundation, which maintains the privacy-focused messaging service of the same name. “Mandating mass scanning of
- « Previous Page
- 1
- …
- 30
- 31
- 32
- 33
- 34
- …
- 257
- Next Page »