Technology

Apr 15, 2024NewsroomSpyware / Mobile Security Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying features,” the BlackBerry Threat Research and Intelligence Team said
0 Comments
Elon Musk’s artificial intelligence (AI) firm xAI has unveiled a new AI model dubbed Grok 1.5 Vision. This large language model (LLM) is an enhanced version of the recently released Grok 1.5 model. With this upgrade, the AI model is now equipped with computer vision, making it capable of accepting visual media as input. It
0 Comments
Apr 12, 2024The Hacker NewsDevSecOps / Identity Management Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access.
0 Comments
Apr 13, 2024NewsroomCyber influence / Warfare The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir ‘Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, the
0 Comments
Google knows everything! Whether it’s your favourite place, your favourite music, or anything else, Google gives you accurate results whenever you search on its platform. This is primarily because Google saves all these activities in your Google account. The company uses this data to provide a personalised experience based on your search history. However, if
0 Comments
Apr 13, 2024NewsroomCryptocurrency / Regulatory Compliance A former security engineer has been sentenced to three years in prison in the U.S. for charges relating to hacking two decentralized cryptocurrency exchanges in July 2022 and stealing over $12.3 million. Shakeeb Ahmed, the defendant in question, pled guilty to one count of computer fraud in December 2023
0 Comments
OnePlus devices will reportedly go off store shelves across the Southern and Western regions of India as per a new directive by the South Indian Organised Retailers Association (ORA). As per a report, the mobile retailers association that commands a large number of stores announced this development in a letter, which has yet to be
0 Comments
A story broke in Newsweek magazine April 10th claiming that a study in a high prestige medical journal of the American Medical Association, JAMA Psychiatry, revealed that teenagers who spend a lot of time playing video games and who use their computers heavily are more likely to have a psychotic episode. In the study Newsweek was reporting on, seven researchers in
0 Comments
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. “While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant,” Deep Instinct security researcher Simon
0 Comments
Apple has announced that it will open up its repair process to allow independent repair providers and customers to install genuine used iPhone parts to fix their own smartphones. The company offers a self-repair program in several regions which will let customers use older components for repairs. The process of ordering repair parts will also
0 Comments
Apr 11, 2024NewsroomEndpoint Security / Ransomware A threat actor tracked as TA547 has targeted dozens of German organizations with an information stealer called Rhadamanthys as part of an invoice-themed phishing campaign. “This is the first time researchers observed TA547 use Rhadamanthys, an information stealer that is used by multiple cybercriminal threat actors,” Proofpoint said. “Additionally,
0 Comments
Apr 11, 2024NewsroomSpyware / Cyber Espionage Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are
0 Comments
Mistral released its latest artificial intelligence (AI) model, 8X22B, on Wednesday. The mixture-of-expert AI model follows the 8X7B model released in December 2023 and offers a larger parameter size. The company known for its fully open-source AI models released the latest model unconventionally, without any announcement posts or blog posts accompanying it. While there are
0 Comments