Nov 16, 2023NewsroomVulnerability / Email Security A zero-day flaw in the Zimbra Collaboration email software was exploited by four different groups in real-world attacks to pilfer email data, user credentials, and authentication tokens. “Most of this activity occurred after the initial fix became public on GitHub,” Google Threat Analysis Group (TAG) said in a report
Technology
The Qi2 (pronounced ‘Chi Two’) charging standard was announced earlier this year by the Wireless Power Consortium (WPC). It succeeds the Qi wireless charging standard, is similar to Apple’s MagSafe technology, which debuted with the iPhone 12 and makes use of a comparable coil for wireless charging and magnet systems. The WPC claimed that the
Nov 15, 2023NewsroomRansomware / Vulnerability Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache ActiveMQ to achieve arbitrary code execution in memory. Tracked as CVE-2023-46604 (CVSS score: 10.0), the vulnerability is a remote code execution bug that could permit a threat actor to run arbitrary shell commands. It was
OnePlus Ace 3 is expected to debut soon as a follow-up to OnePlus Ace 2. We’ve seen a fair share of leaks regarding the handset in recent months. Most recently, a Chinese tipster has dished out some more key specifications of the upcoming OnePlus phone. The OnePlus Ace 3 is said to come with a
Nov 15, 2023NewsroomCyber Crime / Network Security The U.S. government on Tuesday announced the takedown of the IPStorm botnet proxy network and its infrastructure, as the Russian and Moldovan national behind the operation pleaded guilty. “The botnet infrastructure had infected Windows systems then further expanded to infect Linux, Mac, and Android devices, victimizing computers and
Redmi K70 could be inching towards its launch as its renders have surfaced online providing the first apparent glimpse at the design. The leaked renders suggest a white colour option for the smartphone and it is seen with a hole punch cutout on the display. The screen appears to have slightly thick bezels as well.
Nov 15, 2023NewsroomNetwork Securit / Vulnerability VMware is warning of a critical and unpatched security flaw in Cloud Director that could be exploited by a malicious actor to get around authentication protections. Tracked as CVE-2023-34060 (CVSS score: 9.8), the vulnerability impacts instances that have been upgraded to version 10.5 from an older version. “On an
Nothing Chats, a new app introduced by the UK-based tech company today, will now blur the lines between iMessage and Android SMS with a blue bubble for text messages. Nothing has shared that it has added iMessage compatibility to Nothing Phone 2, letting the users of the smartphone to send messages that will be displayed
Nov 14, 2023The Hacker NewsPen Testing / Vulnerability Management In 2023, the global average cost of a data breach reached $4.45 million. Beyond the immediate financial loss, there are long-term consequences like diminished customer trust, weakened brand value, and derailed business operations. In a world where the frequency and cost of data breaches are skyrocketing,
Vivo introduced the Vivo X100 and Vivo X100 Pro on Monday, November 13 in China with the brand new MediaTek Dimensity 9300 chipset. Now, the Chinese smartphone company is speculated to add a Vivo X100 Pro+ model to the lineup soon. The upcoming handset could run on Qualcomm’s Snapdragon 8 Gen 3 SoC. Last year,
Nov 13, 2023The Hacker News Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach, Asana, Monday, and Box empower marketing teams, agencies, freelancers, and subject matter experts to collaborate seamlessly on campaigns and marketing initiatives. These apps serve as the digital command centers for
Samsung’s next Galaxy Unpacked event is expected to take place early next year with the focus no doubt being on the brand’s new flagship Galaxy S series smartphone — Galaxy S24 Ultra. We’ve already seen a variety of different leaks about the upcoming flagship smartphone. Most recently, new renders offering a glimpse into the possible
Nov 13, 2023NewsroomCyber Threat / Malware The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the now-dismantled Hive operation to kick-start its own efforts in the threat landscape. “It appears that the leadership of the Hive group made the strategic decision to cease their operations
Honor Magic 6 series is expected to launch soon. The lineup is likely to include a base and a Pro model. It is said to succeed the Honor Magic 5 series that was unveiled at the MWC 2023 event in Barcelona, Spain, earlier this year in February. The company has already confirmed a few key
Nov 10, 2023NewsroomPrivacy / Cyber Espionage Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole attack designed to deliver a previously undocumented Android spyware dubbed Kamran. The campaign, ESET has discovered, leverages Hunza News (urdu.hunzanews[.]net), which, when opened on a mobile
Samsung was the first major OEM to bring foldable smartphones to the market. The South Korean brand that has released five iterations of the Galaxy Z Fold flagships, currently dominates the foldable market. A new media report says Samsung is shifting its focus to unveil foldables with affordable price tags starting next year. Meanwhile, Huawei
Nov 10, 2023NewsroomCyber Attack / Cyber Threat A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October 2023 amid a surge in Iranian cyber activity since the onset of the Israel-Hamas war. The attacks have been attributed by CrowdStrike to a threat actor it tracks
Infinix Smart 8 was launched in Nigeria on Thursday, November 9. This model succeeds the Infinix Smart 7, which was unveiled in February this year with a Unisoc SC9863A1 SoC and a 6,000mAh battery. Ahead of its launch, the Smart 7 was spotted on several certification sites that suggested several key specifications. Now, the smartphone
Nov 10, 2023NewsroomCyber Attack / Threat Intelligence Cybersecurity researchers have discovered a stealthy backdoor named Effluence that’s deployed following the successful exploitation of a recently disclosed security flaw in Atlassian Confluence Data Center and Server. “The malware acts as a persistent backdoor and is not remediated by applying patches to Confluence,” Aon’s Stroz Friedberg Incident
Amazon currently runs Fire OS, an Android fork, on its Fire TVs and tablets. Fire OS devices support most Android apps as the operating system is based on Android Open Source Project. The e-commerce juggernaut, however, could be planning to move away from Google’s OS. According to a new report, Amazon plans to replace the
- « Previous Page
- 1
- …
- 79
- 80
- 81
- 82
- 83
- …
- 268
- Next Page »