Technology

Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT) called Warzone RAT. The domains – www.warzone[.]ws and three others – were “used to sell computer malware used by cybercriminals to secretly access and steal data from
0 Comments
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a fast-paced development process while staying up-to-date with the latest security patches. However, in practice, developers often face a large amount of security work without clear
0 Comments
WhatsApp, the popular messaging platform Meta owns, has rolled out a new feature allowing users to block spam directly from their lock screens. This update aims to combat the rising prevalence of spam messages and give users greater control over their messaging experience. Spam messages have long been a concern for messaging networks such as
0 Comments
Frame AI Glasses, a new artificial intelligence (AI)-powered wearable gadget, has been unveiled by Brilliant Labs. The device competes with similar wearable AI products such as Humane’s AI Pin and the Rabbit R1. The AI glasses by the company visually appear like standard prescription glasses but are equipped with a micro-OLED display and multimodal AI
0 Comments
Apple has been making preparations to open the gates of iOS to allow third-party app marketplaces and apps on its platform in the European Union (EU). It recently rolled out the iOS 17.4 betas versions of the upcoming update that added support for alternative marketplaces. Now, the iPhone maker has released updates for App Store
0 Comments
Feb 09, 2024NewsroomMobile Security / Cyber Threat Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. “Typical MoqHao requires users to install and launch the app to get their desired purpose, but this new variant requires no execution,” McAfee Labs said
0 Comments
HMD Global recently refreshed its online presence by dropping the Nokia branding from all spheres. Nokia.com is now redirected to HMD.com, and the X (formerly Twitter) handle of @nokiamobile has changed to @HMDglobal. The Finnish company was already expected to launch its products, including smartphones. This major transition led many to believe we would see
0 Comments
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some critical infrastructure networks in the country for at least five years. Targets of the threat actor include communications, energy, transportation, and water and wastewater systems sectors in the U.S. and Guam. “Volt Typhoon’s choice of
0 Comments
Feb 07, 2024NewsroomDevice Security / Vulnerability The maintainers of shim have released version 15.8 to address six security flaws, including a critical bug that could pave the way for remote code execution under specific circumstances. Tracked as CVE-2023-40547 (CVSS score: 9.8), the vulnerability could be exploited to achieve a Secure Boot bypass. Bill Demirkapi of
0 Comments
Apple‘s long-rumoured transition to microLED display technology for its Apple Watch series may not happen anytime soon. A new report by a Korean publication suggests that the Apple Watch Ultra with microLED display will arrive in 2027 at the earliest. Previous reports pointed to a 2025 release. Supply chain issues are reportedly causing the delay.
0 Comments
The threat actors behind the KV-botnet made “behavioral changes” to the malicious network as U.S. law enforcement began issuing commands to neutralize the activity. KV-botnet is the name given to a network of compromised small office and home office (SOHO) routers and firewall devices across the world, with one specific cluster acting as a covert
0 Comments
Feb 06, 2024NewsroomVulnerability / Cloud Security Three new security vulnerabilities have been discovered in Azure HDInsight’s Apache Hadoop, Kafka, and Spark services that could be exploited to achieve privilege escalation and a regular expression denial-of-service (ReDoS) condition. “The new vulnerabilities affect any authenticated user of Azure HDInsight services such as Apache Ambari and Apache Oozie,”
0 Comments
Apple has begun inviting applications for its annual Swift Student Challenge, a global competition for students who aspire to become developers. The competition requires participants to showcase their coding skills and creativity through its app playgrounds. Every year, the Cupertino-based tech giant recognises 350 winners among the participants. This year, Apple will also pick 50
0 Comments