Apple has announced that it will open up its repair process to allow independent repair providers and customers to install genuine used iPhone parts to fix their own smartphones. The company offers a self-repair program in several regions which will let customers use older components for repairs. The process of ordering repair parts will also
Technology
Apr 11, 2024NewsroomEndpoint Security / Ransomware A threat actor tracked as TA547 has targeted dozens of German organizations with an information stealer called Rhadamanthys as part of an invoice-themed phishing campaign. “This is the first time researchers observed TA547 use Rhadamanthys, an information stealer that is used by multiple cybercriminal threat actors,” Proofpoint said. “Additionally,
Leica Leitz Phone 3 was launched on Thursday as the successor to the Leica Leitz Phone 2, which was unveiled in November 2022. The latest handset is powered by Qualcomm’s Snapdragon 8 Gen 2 SoC but retains other key features of the preceding phone which was equipped with a Snapdragon 8 Gen 1 chipset, a
Apr 11, 2024NewsroomSpyware / Cyber Espionage Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are
Mistral released its latest artificial intelligence (AI) model, 8X22B, on Wednesday. The mixture-of-expert AI model follows the 8X7B model released in December 2023 and offers a larger parameter size. The company known for its fully open-source AI models released the latest model unconventionally, without any announcement posts or blog posts accompanying it. While there are
Apr 10, 2024NewsroomMobile Security / Spyware An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware distributed via dedicated websites and Google Play Store. Slovak cybersecurity firm said the activity, ongoing since November 2021, is not linked to any known threat
Apple Watch Series 10 will be launched later this year with an upgraded display that delivers improved battery life, according to a report. According to South Korean publication The Elec, the iPhone maker is reportedly changing the way the OLED screen on the Apple Watch Series 10 will be manufactures, which could in turn improve
Apr 10, 2024NewsroomHardware Security / Linux Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory. The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at
Apple has assembled $14 billion (roughly Rs. 1,16,442 crore) worth of iPhones in India in fiscal 2024, Bloomberg News reported on Wednesday. Apple now makes as much as 14 percent or about 1 in 7 of its marquee devices from India, the report said, citing people familiar with the matter. Foxconn assembled nearly 67 percent
Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report
Google is reportedly working on a new warning message for Google Messages that can prevent users from falling for a phishing scam or unknowingly installing malware on their devices. This feature will be triggered whenever the user clicks on a link sent by a number not saved in the Contacts. The new warning message is
Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a stealer that targets crypto wallets. The email messages come with Scalable Vector Graphics (SVG) file attachments that, when clicked,
Meta is gearing up to launch the next generation of its artificial intelligence (AI) models, Llama 3, in the summer and it is said to bring new capabilities to its chatbots. Now, a new report suggests that the tech giant could launch two of its smaller AI models as soon as next week, much earlier
Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The sandbox, according to V8 Security technical lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within the host process.” The search behemoth
Nothing Ear and Nothing Ear A will be launched by the company next month, the UK startup led by OnePlus Co-Founder Carl Pei announced on Friday. The firm’s third generation of truly wireless stereo (TWS) audio products was previously expected to make its debut as the Nothing Ear 3, but the company announced that it
Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems. “The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious file download posing as an invoice,” Trustwave SpiderLabs researcher Karla
Apple has reportedly entered a deal with the stock photos and videos library Shutterstock to use the data to train its artificial intelligence (AI) models. The report also confirms the speculations that the tech giant is likely in the advanced stages of developing its in-house foundation model. Even as earlier reports have mentioned that the
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese hacking crew called UNC3886, whose
Redmi Turbo 3 is confirmed to launch in China in the near future, and the company’s first smartphone in the ‘Turbo’ lineup has now been spotted in leaked images. Tipster Fixed Focus Digital (translated from Chinese) shared a hands-on image of the purported Redmi Turbo 3 as well as two renders showing the rear panel
Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET,” Resecurity said in a technical report published this week. “It employs the
- « Previous Page
- 1
- …
- 56
- 57
- 58
- 59
- 60
- …
- 269
- Next Page »