Jun 03, 2024The Hacker NewsCyber Threat Intelligence Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations require a holistic analysis across external data, inbound and outbound threats and network activity. This will enable evaluating the true state of cybersecurity in the enterprise. Cato’s Cyber Threat Research Lab
Technology
Apple has quietly downgraded the tech specs of the iPad Air (2024) that was unveiled at its ‘Let Loose’ event on May 7. The specifications page of the tablet on the Apple website has been updated and it now mentions that the iPad Air (2024) – equipped with the M2 SoC – features a 9-core
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence (AI) tools to manipulate public discourse or political outcomes online while obscuring their true identity. These activities, which were detected over the past three months,
Nothing Phone 2 was launched last year with Android 13 and was updated to the latest version by the end of the year. Now, the UK startup led by OnePlus Co-Founder Carl Pei has released a beta version of Android 15, Google’s upcoming operating system update that is expected to arrive later this year. The
May 31, 2024NewsroomCyber Attack / Credential Harvesting The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credential-harvesting web pages. APT28, also known by the names BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422,
The Reserve Bank of India (RBI) along with NPCI international payments ltd (NIPL) will work towards taking UPI to 20 countries by FY29. RBI Annual report says possibilities will be explored for increasing the global footprints of UPI and RuPay. “In light of goals for Viksit Bharat 2047, the Reserve Bank, along with NPCI International
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late 2023. “These repeated attacks against OT devices emphasize the crucial need to improve the security posture of OT devices and prevent critical systems from becoming easy targets,” the Microsoft Threat Intelligence team
Samsung’s Galaxy Ring is expected to be launched at its next Galaxy Unpacked event alongside next-generation foldable phones. The smart ring is touted to bring several health and sleep tracking monitors and rumours about its functionality are currently surfacing on the Web. A recent report indicates that Samsung is readying a new feature to assist
Jun 01, 2024NewsroomAI-as-a-Service / Data Breach Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. “We have suspicions that a subset of Spaces’ secrets could have been accessed without authorization,” it said in an advisory. Spaces offers a way for users to create,
After a thrilling IPL 2024 season, it is now time to witness another rollercoaster season of cricket tournament. Yes, we are talking about the ICC Men’s T20 World Cup 2024, which starts on June 01, 2024. The annual T20 World Cup tournament will be taking place in two countries: the West Indies and the United
May 31, 2024NewsroomNetwork Security / Cyber Attack More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users’ access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a
WhatsApp for Android is reportedly working on a new feature that will let users add and filter their favourite chats for easier access. This feature is under development and as per the report, it is rolling out to testers who have registered through the Google Play Beta Program. Once it rolls out in beta, these
May 31, 2024NewsroomThreat Detection / Endpoint Security Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years, mainly via email, digital documents, and chat. In turn, this has created an expansive attack surface and has
Anthropic is rolling out a new feature for Claude-3, its family of artificial intelligence (AI) models. Dubbed ‘Tool Use’ (or Function Calling), this feature enables Claude to interact with external tools and Application Programming Interfaces (APIs) to perform a wide variety of tasks. This way, the AI chatbot can perform tasks which are more specific
May 30, 2024NewsroomLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-1086 (CVSS score: 7.8), the high-severity issue relates to a use-after-free bug in the netfilter component that permits
Google unveiled the Fitbit Ace LTE smartband in the US on Wednesday, May 29. It is claimed to be a “new, first-of-its-kind connected smartwatch” for kids above the age of seven. It is said to come with the benefits of a smartphone without needing a phone. It gets support for calling, messaging and location sharing. The smart wearable
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operations center (SOC). The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported
Apple introduced the Beats Solo Buds alongside the Beats Solo 4 earlier in May. The latter started shipping in the US from May 2. At the time of launch, the company had revealed the price of the Beats Solo Buds but did not reveal when they would be available for purchase. Now, the firm has announced the online
May 29, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 times as of writing. Interestingly, the
Samsung’s next big Unpacked event is expected to take place in July in Paris with the Galaxy Z Fold 6 taking the spotlight. This year, the South Korean tech giant is expected to bring a significant design change to its book-style foldable phone. A recent leak from a tipster hints at a boxy makeover for
- « Previous Page
- 1
- …
- 34
- 35
- 36
- 37
- 38
- …
- 257
- Next Page »