Tecno Spark 10 4G has been unveiled in the Philippines as the latest model in the company’s Spark 10 lineup. The latest Tecno handset comes with dual rear cameras, headlined by a 50-megapixel primary sensor. The Tecno Spark 10 4G has a 6.6-inch HD+ LCD display with a 90Hz refresh rate and packs a 5,000mAh
Technology
Apr 25, 2023Ravie LakshmananNetwork Security / DDoS Details have emerged about a high-severity security vulnerability impacting Service Location Protocol (SLP) that could be weaponized to launch volumetric denial-of-service attacks against targets. “Attackers exploiting this vulnerability could leverage vulnerable instances to launch massive Denial-of-Service (DoS) amplification attacks with a factor as high as 2200 times, potentially
Poco F5 is expected to launch in India soon. The phone was recently spotted on several certification sites, hinting at its imminent launch. The Poco F5, expected to succeed the Poco F4, which launched in June 2022 in India, is expected to debut as a rebranded Redmi Note 12 Turbo. The Redmi phone launched in
Apr 25, 2023The Hacker NewsVulnerability Management Managing vulnerabilities in the constantly evolving technological landscape is a difficult task. Although vulnerabilities emerge regularly, not all vulnerabilities present the same level of risk. Traditional metrics such as CVSS score or the number of vulnerabilities are insufficient for effective vulnerability management as they lack business context, prioritization, and
Vivo’s X90 series of camera-focussed premium smartphones are all set to be launched on April 26. The handsets according to a recent report will go on sale on Flipkart as a microsite for the same has already gone live on the retailer’s website. The flagship phones have already been launched in Vivo’s home market, China,
Apr 24, 2023Ravie LakshmananCyber Espionage The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering intelligence in Central Asia, fresh findings from Kaspersky reveal. “Tomiris’s endgame consistently appears to be the regular theft of internal documents,” security researchers Pierre Delcher and Ivan Kwiatkowski said in an analysis published today. “The
Oppo A98 5G has been part of leaks and rumours for quite a few months now. Now, alleged render and specifications of the Oppo smartphone have surfaced online. It is shown with a centrally-aligned hole-punch cutout and a 64-megapixel triple camera setup at the rear. The Oppo A98 5G is said to be powered by a
Apr 24, 2023The Hacker NewsSaaS Security A recent review by Wing Security, a SaaS security company that analyzed the data of over 500 companies, revealed some worrisome information. According to this review, 84% of the companies had employees using an average of 3.5 SaaS applications that were breached in the previous 3 months. While this
Realme 11 series is confirmed to debut in May. However, the company has not given a launch date for the upcoming series. Realme is expected to launch multiple phones in the lineup. The Realme 11 Pro+ 5G will likely sit at the top of the upcoming Realme 11 series. The company is expected to pack
Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native and Kubernetes Security Predictions 2023. These predictions underscore the rapidly evolving landscape of Kubernetes and cloud security, emphasizing the need for organizations to stay informed and adopt comprehensive security solutions to protect their digital assets. In response, Uptycs, the first unified
Xiaomi 13 Ultra was launched in China earlier this week as Xiaomi’s top-of-the-line flagship for the year. This handset features similar specifications to the Xiaomi 13 Pro that recently made its debut in India, with a few notable upgrades in the camera department. The smartphone is equipped with a 50-megapixel 1-inch primary camera sensor tuned by
Apr 21, 2023Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched zero-day flaw in Google Cloud Platform (GCP) that could have enabled threat actors to conceal an unremovable, malicious application inside a victim’s Google account. Dubbed GhostToken by Israeli cybersecurity startup Astrix Security, the shortcoming impacts all Google accounts, including enterprise-focused
Asus ROG Phone 7 series was launched earlier this month and the company is reportedly planning to launch another two smartphones dubbed ROG Phone 7D and ROG Phone 7D Ultimate, later this year. Though the smartphone maker hasn’t revealed any details of these handsets, a reliable tipster has leaked the launch timeline and other key
Apr 22, 2023Ravie LakshmananPatch Management / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The three vulnerabilities are as follows – CVE-2023-28432 (CVSS score – 7.5) – MinIO Information Disclosure Vulnerability CVE-2023-27350 (CVSS score –
Google is expected to launch a few smartphones soon. Among the highly anticipated devices, are the Pixel Fold and Pixel 7a handsets. While Pixel Fold is scheduled to be the tech giant’s first foldable smartphone, the Pixel 7a is expected to succeed the Pixel 6a and extend the Pixel 7 series that launched last year.
Apr 22, 2023Ravie LakshmananSupply Chain / Cyber Threat Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application. The new findings, which come courtesy of
Xiaomi Mix Fold 3, the successor to the Mix Fold 2, has been in rumours for some time now. The Chinese smartphone manufacturer is yet to reveal any details on the same, but recent reports and leaks have been giving insight on the expected specifications of the smartphone. The foldable is expected to launch sometime
Apr 21, 2023Ravie LakshmananKubernetes / Cryptocurrency A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors and run cryptocurrency miners. “The attackers also deployed DaemonSets to take over and hijack resources of the K8s clusters they attack,” cloud security firm Aqua said in a report
Samsung Galaxy Tab S9 series is expected to make its debut soon. The series is expected to be unveiled at an upcoming Galaxy Unpacked event in the second half of the year. The series is most likely to include the base Galaxy Tab S9, the Galaxy Tab S9+, and the Galaxy Tab S9 Ultra tablets.
The supply chain attack targeting 3CX was the result of a prior supply chain compromise associated with a different company, demonstrating a new level of sophistication with North Korean threat actors. Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a “software
- « Previous Page
- 1
- …
- 56
- 57
- 58
- 59
- 60
- …
- 215
- Next Page »