Technology

Nov 01, 2024Ravie LakshmananThreat Intelligence / Network Security Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork-1658, stating the password spray operations are used to steal credentials from multiple
0 Comments
Nov 01, 2024The Hacker NewsSaaS Security / Insider Threat With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams.
0 Comments
Apple Inc. agreed to buy software maker Pixelmator, adding a popular high-end photo-editing app to its lineup. Pixelmator announced the acquisition on its blog Friday, saying its Lithuania-based team would be joining Apple. The 17-year-old company — founded by brothers Saulius Dailide and Aidas Dailide — makes apps for the Mac, iPad and iPhone. The
0 Comments
Nov 01, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have flagged a “massive” campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket
0 Comments
U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel’s participation in the sporting event. The activity has been pinned on an entity that’s known as Emennet Pasargad, which the agencies
0 Comments
OpenAI CEO Sam Altman and several other company executives hosted an ask-me-anything (AMA) session on Thursday. The session was hosted on the social networking platform Reddit and users were told to ask questions about the AI firm’s products such as ChatGPT or general queries about artificial intelligence (AI) and artificial general intelligence (AGI). During the
0 Comments
Nov 01, 2024The Hacker NewsSaaS Security / Identity Security Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to
0 Comments
Oct 31, 2024Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. “While the iOS implant delivery method closely mirrors that of the macOS version, the
0 Comments
Oct 30, 2024Ravie Lakshmanan Browser Security / Vulnerability A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs
0 Comments
Honor Magic 7 and Honor Magic 7 Pro were launched in China on Thursday. The smartphones are powered by Qualcomm’s newest octa-core Snapdragon 8 Elite chipsets paired with up to 16GB of RAM. They feature triple rear camera units including telephoto shooters and carry 50-megapixel front cameras. The handsets come with IP68 and IP69 ratings
0 Comments
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as
0 Comments
YouTube is reportedly testing a new homepage without view count and upload date information. When the claim surfaced online, users expressed their dissatisfaction with the alleged update. Some appreciated the removal of the view count alongside the thumbnails but most people claimed that removing the upload date information would be a disservice, especially in terms
0 Comments
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.” Rather than following every lead, Holmes focuses on the details that are
0 Comments
Oct 29, 2024Ravie LakshmananAI Security / Vulnerability A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part
0 Comments