Jun 21, 2024NewsroomMalware / Threat Intelligence A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign primarily targeting government entities across Asia and EMEA (Europe, Middle East, and Africa) with SugarGh0st malware since at least August 2023. “SneakyChef uses lures that are scanned documents of government agencies, most of which
Technology
Tata Consultancy Services (TCS), the multinational IT service provider, announced signing a new deal with US-based Xerox on Friday. This deal expands the strategic partnership between the two companies and will let TCS build a cloud-native and generative artificial intelligence (AI) led digital platform for Xerox. The Mumbai-based IT giant will also create a cloud-first
Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to drop a backdoor called Oyster (aka Broomstick and CleanUpLoader). That’s according to findings from Rapid7, which identified lookalike websites hosting the malicious payloads that users are redirected to after searching for them
OnePlus recently launched its first WearOS-powered smartwatch, the OnePlus Watch 2, but it already seems to be cooking up another one as per a new leak. In February, OnePlus launched its Watch 2, which was powered by two processors and two operating systems, both of which switched seamlessly and delivered better battery life as described
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.5), the “UEFIcanhazbufferoverflow” vulnerability has been described as a case of a buffer overflow stemming from the use
Apple has allegedly been targeted in a data breach that resulted in a hacker stealing the source code of its internal tools. A threat actor group that goes by the name ‘IntelBroker’ has assumed responsibility for the theft of the source code for three internal tools commonly used by the tech giant. IntelBroker has reportedly
Jun 20, 2024The Hacker NewsEndpoint Protection / Data Security Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but lack integration. Top Cybersecurity Challenges: Discuss the main challenges MSPs face, including integration issues, limited visibility across systems,
Motorola Razr 50 Ultra is expected to come in new colourways, according to a tipster on social media. The smartphone is set to launch in China, alongside the standard Motorola Razr 50, on June 25, the company confirmed in a Weibo post a few days ago. However, it is expected to make its global debut
Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken’s Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it
Nvidia became the world’s most valuable company on Tuesday, dethroning tech heavyweight Microsoft as its high-end processors play a central role in a scramble to dominate artificial intelligence technology. Shares of the chipmaker climbed 3.5 percent to $135.58, lifting its market capitalization to $3.335 trillion (roughly Rs. 2,78,15,901 crore), just days after overtaking iPhone maker
Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does
Apple Vision Pro 2 – the rumoured successor to the Cupertino-based tech giant’s first-ever mixed-reality headset – may not see the light of day at all, according to a report. This development is reportedly due to poor sales of the AR/VR headset which costs $3,499 (roughly Rs. 2,90,000) for the base 256GB storage model. However,
Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the European Union to scan users’ private messages for detection child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned Meredith Whittaker, president of the Signal Foundation, which maintains the privacy-focused messaging service of the same name. “Mandating mass scanning of
Netflix added Grand Theft Auto: The Trilogy – The Definitive Edition to its game subscription service in December. Now, the rebooted trilogy of classic GTA titles from Rockstar Games has reportedly crossed 30 million downloads on Netflix Games. The trilogy, which bundles together the remastered versions of Grand Theft Auto III, Grand Theft Auto: Vice
Seventy percent of enterprises are prioritizing investment in SaaS security by establishing dedicated teams to secure SaaS applications, as part of a growing trend of maturity in this field of cybersecurity, according to a new survey released this month by the Cloud Security Alliance (CSA). Despite economic instability and major job cuts in 2023, organizations
Oppo A3 Pro is expected to launch in India soon. The Indian variant of the handset is said to vastly differ from the phone’s Chinese counterpart. Apart from different specifications, the design of the handset is also said to offer changes. A new report has hinted at the price range of the handset in India
Jun 17, 2024NewsroomRouter Security / Vulnerability ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors to bypass authentication. Tracked as CVE-2024-3080, the vulnerability carries a CVSS score of 9.8 out of a maximum of 10.0. “Certain ASUS router models have authentication bypass vulnerability,
Shutterstock ImageAI, a generative artificial intelligence (AI) platform that allows users to generate images from text prompts, was announced last week. Shutterstock, the stock photos, videos, and music repository, and the data and AI firm Databricks collaborated to build the text-to-image AI platform. The company claims the platform is aimed at enterprises and adheres to
Jun 17, 2024NewsroomCyber Espionage / Vulnerability A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located in East Asia for a period of about three years, with the adversary establishing persistence using legacy F5 BIG-IP appliances and using it as an internal command-and-control (C&C) for defense
Samsung Galaxy Watch 7 series could be announced at the next Galaxy Unpacked event, which is rumoured to be hosted on July 10. Alongside the Watch 7 series, the South Korean tech giant could also unveil the Galaxy Watch Ultra at the event. Reports have suggested that the company is working on a more premium
- « Previous Page
- 1
- …
- 42
- 43
- 44
- 45
- 46
- …
- 269
- Next Page »