Jun 26, 2023Ravie LakshmananCryptocurrency / Endpoint Security An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor called JokerSpy. Elastic Security Labs, which is monitoring the intrusion set under the name REF9134, said the attack led to the installation of Swiftbelt, a
Technology
Most of the flagship smartphones currently available in the market feature up to 16GB of RAM. This might soon change as there have been rumours floating around the Internet stating that upcoming handsets could offer up to 24GB of RAM. China’s BBK electronics-owned firms OnePlus, Oppo, and Realme seem to be heading towards the launch
Jun 23, 2023Ravie LakshmananThreat Intel / Endpoint Security The U.S. National Security Agency (NSA) on Thursday released guidance to help organizations detect and prevent infections of a Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus. To that end, the agency is recommending that “infrastructure owners take action by hardening user executable policies and monitoring the
YouTube is internally testing a product for playing online games, the Wall Street Journal reported on Friday citing an email sent to employees at parent company Google. The company invited its employees to begin testing the new YouTube product called ‘Playables’, the report said, adding that games available for testing included titles such as arcade
Jun 24, 2023Ravie LakshmananCyber Crime / Cryptocurrency A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S. Joseph James O’Connor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New York, a little over a
WhatsApp is making it easier for users to reject unwanted calls. The instant messaging app from Meta now allows to users to silence spam calls from unknown contacts. These calls can also be from numbers not saved in your contact list. The feature was announced earlier last week, and is available on the stable versions
Jun 24, 2023Ravie LakshmananThreat Intel / Zero Day The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and
Samsung has reportedly started working on the next iteration of its high-end phones i.e., the Galaxy S24 series. The phones’ expected specifications and rumours have already started doing rounds on the internet. In the latest development, the codenames of the handsets. in the series have emerged online. Samsung uses codenames for its high-end smartphones. This
Jun 23, 2023Ravie LakshmananMalware / Cyber Threat A new strain of JavaScript dropper has been observed delivering next-stage payloads like Bumblebee and IcedID. Cybersecurity firm Deep Instinct is tracking the malware as PindOS, which contains the name in its “User-Agent” string. Both Bumblebee and IcedID serve as loaders, acting as a vector for other malware
The Vivo X90s is launching next week and ahead of its debut, a third-party retailer has leaked the storage options for the upcoming phone. The VivoX90s will reportedly be launched in three RAM and storage configurations. It is tipped to come with UFS 4.0 storage. Along with the memory details, the leak has also revealed
Jun 23, 2023Ravie LakshmananSocial Engineering / Phishing A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO) industry with persistent attacks that leverage advanced social engineering ploys to gain initial access. “The attack style defining Muddled Libra appeared on the cybersecurity radar in late 2022 with the release of the 0ktapus
Amazfit Cheetah and Cheetah Pro have been launched as the company’s latest smartwatches for the runners. The wearables are equipped with AI-powered Zepp Coach that is said to offer personalised training plans along with progress tracking. The watch also features precise navigation and offline maps, and lets users save location points as well. Both the
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of browser fingerprinting? You should! It’s an online user identification technique that collects information about a visitor’s web browser and its configuration preferences to associate individual browsing sessions with a single website visitor. With browser fingerprinting,
Samsung’s Galaxy Z Fold 5 may not be getting too many design changes as per the latest leaks. Most of the upgrades with Samsung’s Galaxy Z lineup this year, seem to be reserved for its smaller and more accessible Galaxy Z Flip 5 foldable. The smaller flipping foldable is expected to get a larger and
Jun 22, 2023Ravie LakshmananCyber Attack / Phishing A new phishing campaign codenamed MULTI#STORM has set its sights on India and the U.S. by leveraging JavaScript files to deliver remote access trojans on compromised systems. “The attack chain ends with the victim machine infected with multiple unique RAT (remote access trojan) malware instances, such as Warzone
Reliance Jio, Mukesh Ambani’s telecom firm, is set to launch a JioPhone 5G device later this year. While not much is confirmed about the phone, newly leaked live images of the purported handset have revealed new details about the design of the upcoming JioPhone 5G. According to alleged hands-on images tweeted by a tipster, the
Jun 22, 2023The Hacker News Losing sleep over Generative-AI apps? You’re not alone or wrong. According to the Astrix Security Research Group, mid size organizations already have, on average, 54 Generative-AI integrations to core systems like Slack, GitHub and Google Workspace and this number is only expected to grow. Continue reading to understand the potential
Vivo Y36 has been launched in India on Thursday, June 20. The new Vivo Y series handset comes in two colour options with a 2.5D curved glass body. The mid-range offering runs on Snapdragon 680 SoC, coupled with 8GB of RAM. With the extended RAM feature, the Vivo Y36 can separate some portion of the
Jun 21, 2023Ravie LakshmananCyber Threat / Privacy The North Korean threat actor known as ScarCruft has been observed using an information-stealing malware with previous undocumented wiretapping features as well as a backdoor developed using Golang that exploits the Ably real-time messaging service. “The threat actor sent their commands through the Golang backdoor that is using
Redmi K60 Ultra has reportedly been spotted on the 3C Certification site, revealing the expected charging capacity of the handset. The phone is listed on the 3C certifications website with model number 23078RKD5C. It is speculated to support 5G network connectivity. The smartphone is likely to join the last year’s Redmi K60 series lineup soon.
- « Previous Page
- 1
- …
- 87
- 88
- 89
- 90
- 91
- …
- 258
- Next Page »