Technology

Amazfit Cheetah and Cheetah Pro have been launched as the company’s latest smartwatches for the runners. The wearables are equipped with AI-powered Zepp Coach that is said to offer personalised training plans along with progress tracking. The watch also features precise navigation and offline maps, and lets users save location points as well. Both the
0 Comments
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of browser fingerprinting? You should! It’s an online user identification technique that collects information about a visitor’s web browser and its configuration preferences to associate individual browsing sessions with a single website visitor. With browser fingerprinting,
0 Comments
Jun 22, 2023Ravie LakshmananCyber Attack / Phishing A new phishing campaign codenamed MULTI#STORM has set its sights on India and the U.S. by leveraging JavaScript files to deliver remote access trojans on compromised systems. “The attack chain ends with the victim machine infected with multiple unique RAT (remote access trojan) malware instances, such as Warzone
0 Comments
Jun 22, 2023The Hacker News Losing sleep over Generative-AI apps? You’re not alone or wrong. According to the Astrix Security Research Group, mid size organizations already have, on average, 54 Generative-AI integrations to core systems like Slack, GitHub and Google Workspace and this number is only expected to grow. Continue reading to understand the potential
0 Comments
Jun 21, 2023Ravie LakshmananCyber Threat / Privacy The North Korean threat actor known as ScarCruft has been observed using an information-stealing malware with previous undocumented wiretapping features as well as a backdoor developed using Golang that exploits the Ably real-time messaging service. “The threat actor sent their commands through the Golang backdoor that is using
0 Comments
Jun 21, 2023Ravie LakshmananMobile Security / Spyware More details have emerged about the spyware implant that’s delivered to iOS devices as part of a campaign called Operation Triangulation. Kaspersky, which discovered the operation after becoming one of the targets at the start of the year, said the malware has a lifespan of 30 days, after
0 Comments
Jun 20, 2023Ravie LakshmananOperational Technology Three security vulnerabilities have been disclosed in operational technology (OT) products from Wago and Schneider Electric. The flaws, per Forescout, are part of a broader set of shortcomings collectively called OT:ICEFALL, which now comprises a total of 61 issues spanning 13 different vendors. “OT:ICEFALL demonstrates the need for tighter scrutiny
0 Comments
Honor 90 Lite was launched in Europe by the Chinese smartphone manufacturer on Tuesday. The handset is powered by MediaTek’s octa-core Dimensity 6020 SoC paired with 8GB of RAM and 256GB inbuilt storage. The Honor 90 Lite features a 6.7-inch LTPS LCD display. The handset comes preloaded with Android 13 out-of-the-box. The handset features a
0 Comments
Jun 20, 2023Ravie LakshmananVulnerability / Data Security Zyxel has rolled out security updates to address a critical security flaw in its network-attached storage (NAS) devices that could result in the execution of arbitrary commands on affected systems. Tracked as CVE-2023-27992 (CVSS score: 9.8), the issue has been described as a pre-authentication command injection vulnerability. “The
0 Comments
OnePlus will reportedly unveil the next generation of its numbered series of smartphones, the OnePlus 12, later this year in China. While little is known about OnePlus’ next flagship, the purported smartphone’s display specifications have emerged along with details on the OnePlus Ace 2 Pro, which could debut in China soon. The phones’ specifications have
0 Comments
A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and over 70 web browser extensions. First advertised on April 25, 2023, for $150 per month, the malware also targets cryptocurrency wallets, Steam, and Telegram, and employs extensive mechanisms to resist analysis. “The code is heavily
0 Comments
Jun 19, 2023Ravie LakshmananEndpoint Security / Hacking Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. “As of now, these samples are still largely undetected and very little information is available about any of them,” Bitdefender researchers Andrei Lapusneanu and Bogdan Botezatu
0 Comments
Jun 15, 2023Ravie Lakshmanan A suspected China-nexus threat actor dubbed UNC4841 has been linked to the exploitation of a recently patched zero-day flaw in Barracuda Email Security Gateway (ESG) appliances since October 2022. “UNC4841 is an espionage actor behind this wide-ranging campaign in support of the People’s Republic of China,” Google-owned Mandiant said in a
0 Comments