Technology

Nov 11, 2023NewsroomThreat Intelligence / Cybercrime A sub-cluster within the infamous Lazarus Group has established new infrastructure that impersonates skills assessment portals as part of its social engineering campaigns. Microsoft attributed the activity to a threat actor it calls Sapphire Sleet, describing it as a “shift in the persistent actor’s tactics.” Sapphire Sleet, also called
0 Comments
Honor X50i+ has been launched in China. The phone joins the Honor X50i lineup. which was launched earlier this year in April. The Honor X50i was powered by a MediaTek Dimensity 6020 SoC and packed a 4,500mAh battery with 35W wired fast charging support. The newly-launched Honor X50i+ comes with similar battery and charging specifications
0 Comments
Nov 10, 2023NewsroomCyber Warfare / Network Security The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022. The findings come from Google’s Mandiant, which described the hack as a “multi-event cyber attack” leveraging a novel technique for impacting industrial control systems (ICS).
0 Comments
OnePlus 12 is expected to arrive soon in the market and succeed the current flagship model, OnePlus 11. The company has already confirmed some key specifications of the upcoming model. Design renders and other details were previously leaked by tipsters and now OnePlus has confirmed several important camera details of the smartphone. The OnePlus 12
0 Comments
Nov 09, 2023NewsroomEndpoint Security / Malware A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. “This incident is a part of a larger malvertising campaign that targets other utilities like Notepad++, Citrix, and
0 Comments
Nov 08, 2023NewsroomPrivacy / Data Security Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called “Protect IP Address in Calls” that masks users’ IP addresses to other parties by relaying the calls through its servers. “Calls are end-to-end encrypted, so even if a call is relayed through WhatsApp servers,
0 Comments
Nov 08, 2023NewsroomCloud Security / Cryptocurrency Cybersecurity researchers have developed what’s the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges. Cybersecurity company SafeBreach said it discovered three different methods to run the miner, including one that can be executed on a victim’s environment without attracting any
0 Comments
Nov 07, 2023NewsroomEndpoint Security / Malware The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain dubbed ObjCShellz. Jamf Threat Labs, which disclosed details of the malware, said it’s used as part of the RustBucket malware campaign, which came to light earlier this year. “Based on previous attacks
0 Comments
Nov 07, 2023NewsroomEndpoint Security / Malware A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection. “The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools
0 Comments
The Amazon Great Indian Festival sale, which kicked off October 7 for Amazon Prime members, is now into its final phase. The sale brings deep discounts and offers on a wide variety of products, including smartphones, tablets, laptops, gaming consoles, PC peripherals and more. The Amazon sale, which has now been going on for a
0 Comments
Nov 06, 2023NewsroomData Security / Malvertising An updated version of an information stealer malware known as Jupyter has resurfaced with “simple yet impactful changes” that aim to stealthily establish a persistent foothold on compromised systems. “The team has discovered new waves of Jupyter Infostealer attacks which leverage PowerShell command modifications and signatures of private keys
0 Comments