Feb 16, 2024NewsroomRansomware / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities (KEV) catalog, following reports that it’s being likely exploited in Akira ransomware attacks. The vulnerability in question is
Technology
Apple has applied for the patent of a new sensor for its Apple Watch that could allow it to track the sweat measurement of a user. The company has been trying to expand the health and fitness tracking features on its smartwatches. Previous reports have suggested that the next-generation smartwatch from the firm — the
A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again underscoring the challenge of securing software supply chains. Eclypsiusm, which acquired firmware version 9.1.18.2-24467.1 as part of the process, said the base operating system used by the Utah-based software company for the device is CentOS 6.4. “Pulse
Apple plans to equip the iPhone 16 series of smartphones with upgraded hardware that could improve their AI performance, according to a report. The successors to the company’s 2023 iPhone 15 lineup could be equipped with an enhanced processor, in time for iOS 18. Previous reports have suggested that Apple is working on several new
Feb 15, 2024NewsroomMalware / Cyber Espionage The Russia-linked threat actor known as Turla has been observed using a new backdoor called TinyTurla-NG as part of a three-month-long campaign targeting Polish non-governmental organizations in December 2023. “TinyTurla-NG, just like TinyTurla, is a small ‘last chance’ backdoor that is left behind to be used when all other
Xiaomi 14 Ultra may be unveiled on February 25 during the global launch of the Xiaomi 14 and Xiaomi 14 Pro. The purported top-of-the-line handset has surfaced online multiple times over the past few weeks. The company has not yet confirmed the model but several leaks and reports have suggested details about the phone. Some
Feb 14, 2024NewsroomSoftware Security / Vulnerability Cybersecurity researchers have found that it’s possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems running Ubuntu operating system. “While ‘command-not-found’ serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by
Google is introducing a new security feature for Android smartphones designed to keep users safe from malicious links while using apps on their handsets. The ‘Android Safe Browsing‘ feature supports third-party apps and will alert users when they access harmful links or websites, according to Android expert Mishaal Rahman. The feature has been spotted on
Feb 14, 2024NewsroomArtificial Intelligence / Cyber Attack Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and large language models (LLMs) to complement their ongoing cyber attack operations. The findings come from a report published by Microsoft in collaboration with OpenAI, both of which said they disrupted efforts
Apple Vision Pro was launched earlier this month on February 2 in the US with support for over 600 dedicated applications. It is the first mixed-reality headset from the Cupertino-based tech giant. The spatial computer is equipped with the company’s EyeSight display technology and has three layers to show a 3D version of the user’s eyes with a
Feb 13, 2024NewsroomCyber Threat / Malware The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of “devolution.” “Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced
Apple Inc.’s iMessage and Microsoft Corp.’s Bing search engine, Edge web browser and Advertising service will avoid strict new European Union rules reining in Big Tech platforms. A probe concluded that the services don’t hold a dominant enough position to be regulated under the EU’s Digital Markets Act, the European Commission announced on Tuesday. Apple
Feb 13, 2024NewsroomCryptocurrency / Rootkit The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. “This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence that
Samsung Galaxy F15 5G could be inching towards launch in India. Samsung is yet to announce an official launch date for the new F-series handset, however, the smartphone’s support page has gone live on the company’s India website with model number SM-E156B/DS. It was recently spotted on some certification platforms with a similar model number.
Feb 12, 2024The Hacker NewsCyber Threat / Password Security When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it’s important to remember that MFA isn’t foolproof. It can be bypassed,
Artificial intelligence (AI) is likely to play an important role on Valentine’s Day, according to a report released by security software firm McAfee. The firm conducted a survey which revealed that one in four adult respondents (26 percent) plan to use generative AI tools to write a love letter for their partner or potential love
Feb 12, 2024NewsroomVulnerability / Data Recovery Cybersecurity researchers have uncovered an “implementation vulnerability” that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). “Through a comprehensive analysis
iOS 18 could arrive later this year with a massive visual overhaul to the user interface (UI), according to a report. The next major operating system update for iPhone and iPad is expected to arrive in the second half of 2024 along with new AI features that are baked into the system and the company’s
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person “conspiring to participate in or attempting to
Apple plans to settle a lawsuit that accused tech startup Rivos of stealing its trade secrets related to computer-chip technology, according to a joint court filing on Friday in California federal court. The companies told the US District Court for the Northern District of California that they had “signed an agreement that potentially settles the
- « Previous Page
- 1
- …
- 56
- 57
- 58
- 59
- 60
- …
- 258
- Next Page »