Technology

Feb 10, 2023Ravie LakshmananSupply Chain / Software Security Four different rogue packages in the Python Package Index (PyPI) have been found to carry out a number of malicious actions, including dropping malware, deleting the netstat utility, and manipulating the SSH authorized_keys file. The packages in question are aptx, bingchilling2, httops, and tkint3rs, all of which
0 Comments
Nokia G22, an upcoming smartphone from the Nokia G-series, has recently appeared on benchmarking website Geekbench, hinting at some of its key specifications. As per the listing, the smartphone could run on Stock Android based on Android 12 out-of-the-box. The Nokia G22 has been spotted to come with an octa-core 1.8GHz Unisoc T606 SoC. It
0 Comments
Feb 10, 2023Ravie LakshmananData Breach / Source Code Popular social news aggregation platform Reddit has disclosed that it was the victim of a security incident that enabled unidentified threat actors to gain unauthorized access to internal documents, code, and some unspecified business systems. The company blamed it on a “sophisticated and highly-targeted phishing attack” that
0 Comments
Feb 09, 2023Ravie LakshmananNetwork Security / IoT Security A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different vendors that could pose a significant attack surface for threat actors looking to exploit operational technology (OT) environments. “Threat actors can exploit vulnerabilities in Wireless IIoT devices
0 Comments
Feb 08, 2023Ravie LakshmananVulnerability Management Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System (DMS) offerings from four vendors LogicalDOC, Mayan, ONLYOFFICE, and OpenKM. Cybersecurity firm Rapid7 said the eight vulnerabilities offer a mechanism through which “an attacker can convince a human operator to save a malicious document on
0 Comments
Feb 08, 2023Ravie LakshmananEncryption / IoT Security The U.S. National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms known as Ascon will be standardized for lightweight cryptography applications. “The chosen algorithms are designed to protect information created and transmitted by the Internet of Things (IoT), including
0 Comments
iPhone 14 Pro — Apple’s flagship smartphone launched in 2022 — is reportedly faster in both single core and multi core performance than the recently launched Samsung Galaxy S23 Ultra, recent benchmarks of both phones have revealed. The Galaxy S23 Ultra is one of the most premium smartphones that is equipped with a custom version
0 Comments
Feb 08, 2023Ravie LakshmananThreat Intelligence / Cyber War The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in the country that deploy a legitimate remote access software named Remcos. The mass phishing campaign has been attributed to a threat actor it tracks as UAC-0050, with
0 Comments
Feb 07, 2023Ravie LakshmananEncryption / Privacy A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named Exclu used by organized crime groups. Eurojust, in a press statement, said the February 3 exercise resulted in the arrests of 45 individuals across Belgium and the Netherlands, some
0 Comments
Feb 06, 2023Ravie LakshmananHacktivist / Cyber Attack An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in early January 2023. Microsoft, which disclosed details of the incident, is tracking the activity cluster under its chemical element-themed moniker NEPTUNIUM, which is an Iran-based
0 Comments
Feb 06, 2023Ravie LakshmananCyber Attack / Endpoint Security E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix disclosed late last month. The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware.
0 Comments
Feb 03, 2023Ravie LakshmananCyber Espionage / Cyber Threat The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data. “The campaign abuses legitimate but compromised email accounts to send stolen data to external
0 Comments