Apr 10, 2024NewsroomMobile Security / Spyware An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware distributed via dedicated websites and Google Play Store. Slovak cybersecurity firm said the activity, ongoing since November 2021, is not linked to any known threat
Technology
Apple Watch Series 10 will be launched later this year with an upgraded display that delivers improved battery life, according to a report. According to South Korean publication The Elec, the iPhone maker is reportedly changing the way the OLED screen on the Apple Watch Series 10 will be manufactures, which could in turn improve
Apr 10, 2024NewsroomHardware Security / Linux Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory. The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at
Apple has assembled $14 billion (roughly Rs. 1,16,442 crore) worth of iPhones in India in fiscal 2024, Bloomberg News reported on Wednesday. Apple now makes as much as 14 percent or about 1 in 7 of its marquee devices from India, the report said, citing people familiar with the matter. Foxconn assembled nearly 67 percent
Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report
Google is reportedly working on a new warning message for Google Messages that can prevent users from falling for a phishing scam or unknowingly installing malware on their devices. This feature will be triggered whenever the user clicks on a link sent by a number not saved in the Contacts. The new warning message is
Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets. The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked,
Meta is gearing up to launch the next generation of its artificial intelligence (AI) models, Llama 3, in the summer and it is said to bring new capabilities to its chatbots. Now, a new report suggests that the tech giant could launch two of its smaller AI models as soon as next week, much earlier
Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The sandbox, according to V8 Security technical lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within the host process.” The search behemoth
Nothing Ear and Nothing Ear A will be launched by the company next month, the UK startup led by OnePlus Co-Founder Carl Pei announced on Friday. The firm’s third generation of truly wireless stereo (TWS) audio products was previously expected to make its debut as the Nothing Ear 3, but the company announced that it
Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems. “The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious file download posing as an invoice,” Trustwave SpiderLabs researcher Karla
Apple has reportedly entered a deal with the stock photos and videos library Shutterstock to use the data to train its artificial intelligence (AI) models. The report also confirms the speculations that the tech giant is likely in the advanced stages of developing its in-house foundation model. Even as earlier reports have mentioned that the
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese hacking crew called UNC3886, whose
Redmi Turbo 3 is confirmed to launch in China in the near future, and the company’s first smartphone in the ‘Turbo’ lineup has now been spotted in leaked images. Tipster Fixed Focus Digital (translated from Chinese) shared a hands-on image of the purported Redmi Turbo 3 as well as two renders showing the rear panel
Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET,” Resecurity said in a technical report published this week. “It employs the
Instagram is one of the few social media platforms that are now engraved into our lifestyles. Whether sharing your vacation photos on Story, watching reels, or keeping a tab on your friends, Instagram is one platform to get all these. However, having so much screen time on the platform can be overwhelming for many. This
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top
Samsung Galaxy Watch FE will be launched soon, according to a report. The South Korean tech conglomerate could soon introduce a ‘Fan Edition’ (FE) version of its Galaxy Watch smartwatch, which runs on Google’s Wear OS operating system. It is expected to arrive at a lower price than the company’s recent smartwatch models, and its
Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The attack leverages CVE-2024-20720 (CVSS score: 9.1), which has been described by Adobe as a case of “improper neutralization of special elements” that could pave the way for arbitrary code
Apple urged a U.S. appeals court on Friday to overturn a U.S. trade tribunal’s decision to ban imports of some Apple Watches in a patent dispute with medical-monitoring technology company Masimo. Apple told the U.S. Court of Appeals for the Federal Circuit that the U.S. International Trade Commission’s decision was based on a “series of
- « Previous Page
- 1
- …
- 45
- 46
- 47
- 48
- 49
- …
- 257
- Next Page »