Technology

May 03, 2024NewsroomCloud Security / Threat Intelligence Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to “facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services,” the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The
0 Comments
Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S. The Czech Republic’s Ministry of Foreign Affairs (MFA), in a statement,
0 Comments
May 03, 2024The Hacker NewsLive Webinar / Server Security In today’s rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent
0 Comments
May 03, 2024The Hacker NewsSaaS Security / Browser Security SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the existing security stack does not enable
0 Comments
Amazon Great Summer Sale 2024 is live for all shoppers in India and will last till May 7. The sale started yesterday after giving 12 hours of early access exclusively for Prime members. Millions of products by sellers across different categories such as tablets, smartphones, laptops, wearables, audio devices, consumer electronics and more are listed with
0 Comments
May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory. “The implications of this vulnerability pattern include arbitrary code execution and token theft, depending on an
0 Comments
Lately, OnePlus has been attempting to stretch its limbs as far and wide as possible in what appears to be an attempt to match (or at least come close to) Samsung’s device and software ecosystem. It’s still a long way from getting there, but it’s the effort that counts, and this is visible from the
0 Comments
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasn’t existed in the vulnerability management space. The benefits of using multiple scanning engines Generally
0 Comments
Amazon Greate Summer Sale is finally here! The biggest sale of 2024 till now brings a plethora of discounts and offers on various headphone products across different price segments. The premium segment offers great discounts on popular brands like Sony, Bose, Sennheiser, and more. Moreover, the e-commerce platform also brings some massive discounts on budget-centric
0 Comments
May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. The findings come from Elliptic in
0 Comments
May 01, 2024The Hacker NewsSecurity Awareness Training There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how
0 Comments
Apr 30, 2024NewsroomDocker Hub / Supply Chain Attack Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. “Over four million of the repositories in Docker Hub are imageless and
0 Comments
Amazfit Balance smartwatch is getting new features with the latest Zepp OS 3.5 update, including new artificial intelligence (AI)-powered features. The Zepp Health-owned brand has rolled out a new update that adds new sports modes, an enhancement to existing trackers, support for WhatsApp image messages, improved offline maps, and more. The premium smartwatch was launched in
0 Comments
Apr 30, 2024NewsroomMachine Learning / National Security The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. “These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems,” the
0 Comments