Ransomware attacks have only increased in sophistication and capabilities over the past year. From new evasion and anti-analysis techniques to stealthier variants coded in new languages, ransomware groups have adapted their tactics to effectively bypass common defense strategies. Cyble, a renowned cyber threat intelligence company recognized for its research and findings, recently released its Q3
Technology
Google Pixel 8 series, which includes Pixel 8 and Pixel 8 Pro, was launched earlier this month on October 4. The smartphones from the tech giant are powered by a Tensor G3 chip and run on Android 14 out-of-the-box. The Pro variant has recently secured the top rank in the DxOMark display test ranking. It
Oct 14, 2023NewsroomAuthentication / Endpoint Security Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows 11 in the future, as it pivots to alternative methods for authentication and bolster security. “The focus is on strengthening the Kerberos authentication protocol, which has been the default since 2000, and reducing reliance on
Samsung Galaxy M44 was listed on the Geekbench certification site in July this year. Now, months later, the purported smartphone has appeared on another certification listing, confirming the moniker. The upcoming model from the South Korean tech giant is expected to launch soon as the successor to Galaxy M34. On Geekbench, it was listed with
Oct 13, 2023NewsroomEndpoint Security / Cyber Attack European Union military personnel and political leaders working on gender equality initiatives have emerged as the target of a new campaign that delivers an updated version of RomCom RAT called PEAPOD. Cybersecurity firm Trend Micro attributed the attacks to a threat actor it tracks under the name Void
MediaTek releases a new flagship smartphone chipset every year and the Dimensity 9300 is expected to break cover soon. The upcoming MediaTek Dimensity 9300 is expected to debut as an upgrade over the Dimensity 9200 SoC that powers handsets like Oppo Find N3 Flip, and Vivo X90 series. The Taiwanese semiconductor company is yet to
Oct 13, 2023NewsroomAPT / Malware The advanced persistent threat (APT) actor known as ToddyCat has been linked to a new set of malicious tools that are designed for data exfiltration, offering a deeper insight into the hacking crew’s tactics and capabilities. The findings come from Kaspersky, which first shed light on the adversary last year,
Amazon’s Great Indian Festival kicked off on October 7 for its Prime users in India. The sale was open to other users a day later. Coincidentally it started at the same time as Flipkart’s Big Billion Days sale. During the sale, a wide range of products including electronic items, home appliances, fashion products, furniture and
A malicious package hosted on the NuGet package manager for the .NET Framework has been found to deliver a remote access trojan called SeroXen RAT. The package, named Pathoschild.Stardew.Mod.Build.Config and published by a user named Disti, is a typosquat of a legitimate package called Pathoschild.Stardew.ModBuildConfig, software supply chain security firm Phylum said in a report
OnePlus is all set to make its mark in the foldable handset market with the debut of OnePlus Open. After the smartphone has been teased in several reports, the company has finally announced the launch date. The OnePlus Open will be launched in the Indian market next week in Mumbai. Before revealing the launch date,
Oct 12, 2023Newsroom The threat actors behind ShellBot are leveraging IP addresses transformed into its hexadecimal notation to infiltrate poorly managed Linux SSH servers and deploy the DDoS malware. “The overall flow remains the same, but the download URL used by the threat actor to install ShellBot has changed from a regular IP address to
Samsung Galaxy S24 series comprising —Galaxy S24, Galaxy S24+, and Galaxy S24 Ultra models— is expected to go official early next year. The US variant of the Galaxy S24 Ultra has now been allegedly spotted on the Geekbench benchmarking site with model number SM-S928U. The listing suggests the yet-to-be-announced Qualcomm Snapdragon 8 Gen 3 SoC
Oct 11, 2023NewsroomVulnerability / Exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-21608 (CVSS score: 7.8), the vulnerability has been described as a use-after-free bug that can be exploited to
The Amazon Great Indian Festival sale, which began October 7 for Prime members, is offering discounts across a range of different products and electronic devices. Aside from offers on smartphones and laptops, the sale brings deals on tablets as well. With a rise in online content streaming and on-the-go work and study, interest in tablets
Oct 11, 2023NewsroomWebsite Security / Hacking More than 17,000 WordPress websites have been compromised in the month of September 2023 with malware known as Balada Injector, nearly twice the number of detections in August. Of these, 9,000 of the websites are said to have been infiltrated using a recently disclosed security flaw in the tagDiv
Google has announced that it has begun prompting users to set up passkeys on their devices, months after the company added support for the secure login mechanism across its services. The switch to passkeys is part of a larger trend of moving away from passwords that tend to be insecure, to passkeys — a ‘passwordless’
Oct 10, 2023NewsroomServer Security / Vulnerability Amazon Web Services (AWS), Cloudflare, and Google on Tuesday said they took steps to mitigate record-breaking distributed denial-of-service (DDoS) attacks that relied on a novel technique called HTTP/2 Rapid Reset. The layer 7 attacks were detected in late August 2023, the companies said in a coordinated disclosure. The cumulative
Interest in mobile gaming in India spiked after the success of PUBG, Call of Duty Mobile, and Fortnite among other games on the platform. Now, users do not have to spend too much for high-end gaming devices like Asus ROG or Red Magic to play mobile games. Just like gaming PCs and laptops, smartphone brands like
Oct 10, 2023NewsroomCyber Attack / Malware A previously undocumented threat actor of unknown provenance has been linked to a number of attacks targeting organizations in the manufacturing, IT, and biomedical sectors in Taiwan. The Symantec Threat Hunter Team, part of Broadcom, attributed the attacks to an advanced persistent threat (APT) it tracks under the name
Oct 10, 2023The Hacker NewsCybersecurity / Online Security Certain online risks to children are on the rise, according to a recent report from Thorn, a technology nonprofit whose mission is to build technology to defend children from sexual abuse. Research shared in the Emerging Online Trends in Child Sexual Abuse 2023 report, indicates that minors
- « Previous Page
- 1
- …
- 75
- 76
- 77
- 78
- 79
- …
- 258
- Next Page »