Xiaomi 13T and Xiaomi 13T Pro with Leica-tuned triple rear cameras and MediaTek Dimensity SoCs were launched in global markets last year. Now, Xiaomi is said to be working on the Xiaomi 14T and Xiaomi 14T Pro. The source code reportedly found in the HyperOS code indicates the possible specifications and codenames of the Xiaomi
Technology
Apr 15, 2024NewsroomSpyware / Mobile Security Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying features,” the BlackBerry Threat Research and Intelligence Team said
Elon Musk’s artificial intelligence (AI) firm xAI has unveiled a new AI model dubbed Grok 1.5 Vision. This large language model (LLM) is an enhanced version of the recently released Grok 1.5 model. With this upgrade, the AI model is now equipped with computer vision, making it capable of accepting visual media as input. It
Apr 12, 2024The Hacker NewsDevSecOps / Identity Management Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access.
Amazon Mega Electronics Days Sale is now live on the e-commerce platform and customers can avail of massive discounts on several electronics products. During the ongoing sale, buyers can avail of discounts of up to 80 percent on several products. Meanwhile, if you have an SBI credit card, ICICI Bank credit card HDFC credit or
Apr 13, 2024NewsroomCyber influence / Warfare The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir ‘Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, the
Google knows everything! Whether it’s your favourite place, your favourite music, or anything else, Google gives you accurate results whenever you search on its platform. This is primarily because Google saves all these activities in your Google account. The company uses this data to provide a personalised experience based on your search history. However, if
Apr 13, 2024NewsroomCryptocurrency / Regulatory Compliance A former security engineer has been sentenced to three years in prison in the U.S. for charges relating to hacking two decentralized cryptocurrency exchanges in July 2022 and stealing over $12.3 million. Shakeeb Ahmed, the defendant in question, pled guilty to one count of computer fraud in December 2023
Google Pixel 8a — the successor to last year’s Pixel 7a — will reportedly be launched at Google I/O 2024. Ahead of the arrival of the purported smartphone that is said to arrive as an affordable version of the Pixel 8, Android Headlines has published 360-degree images of all four colour options of the upcoming
Apr 13, 2024Newsroom Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks PAN-OS software dating back to March 26, 2024, nearly three weeks before it came to light yesterday. The network security company’s Unit 42 division is tracking the activity under the name Operation MidnightEclipse, attributing it as the work
Fortnite video game maker Epic Games has urged a federal judge in California to force Google to open up its Play Store to greater competition after a jury found the U.S. tech giant had abused its power as a gatekeeper for apps on the Android mobile platform. Epic made its proposal in a court filing
“Test files” associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part of the XZ Utils data compression
OnePlus devices will reportedly go off store shelves across the Southern and Western regions of India as per a new directive by the South Indian Organised Retailers Association (ORA). As per a report, the mobile retailers association that commands a large number of stores announced this development in a letter, which has yet to be
A story broke in Newsweek magazine April 10th claiming that a study in a high prestige medical journal of the American Medical Association, JAMA Psychiatry, revealed that teenagers who spend a lot of time playing video games and who use their computers heavily are more likely to have a psychotic episode. In the study Newsweek was reporting on, seven researchers in
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. “While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant,” Deep Instinct security researcher Simon
Apple has announced that it will open up its repair process to allow independent repair providers and customers to install genuine used iPhone parts to fix their own smartphones. The company offers a self-repair program in several regions which will let customers use older components for repairs. The process of ordering repair parts will also
Apr 11, 2024NewsroomEndpoint Security / Ransomware A threat actor tracked as TA547 has targeted dozens of German organizations with an information stealer called Rhadamanthys as part of an invoice-themed phishing campaign. “This is the first time researchers observed TA547 use Rhadamanthys, an information stealer that is used by multiple cybercriminal threat actors,” Proofpoint said. “Additionally,
Leica Leitz Phone 3 was launched on Thursday as the successor to the Leica Leitz Phone 2, which was unveiled in November 2022. The latest handset is powered by Qualcomm’s Snapdragon 8 Gen 2 SoC but retains other key features of the preceding phone which was equipped with a Snapdragon 8 Gen 1 chipset, a
Apr 11, 2024NewsroomSpyware / Cyber Espionage Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are
Mistral released its latest artificial intelligence (AI) model, 8X22B, on Wednesday. The mixture-of-expert AI model follows the 8X7B model released in December 2023 and offers a larger parameter size. The company known for its fully open-source AI models released the latest model unconventionally, without any announcement posts or blog posts accompanying it. While there are
- « Previous Page
- 1
- …
- 44
- 45
- 46
- 47
- 48
- …
- 257
- Next Page »