Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The sandbox, according to V8 Security technical lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within the host process.” The search behemoth
Technology
Nothing Ear and Nothing Ear A will be launched by the company next month, the UK startup led by OnePlus Co-Founder Carl Pei announced on Friday. The firm’s third generation of truly wireless stereo (TWS) audio products was previously expected to make its debut as the Nothing Ear 3, but the company announced that it
Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems. “The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious file download posing as an invoice,” Trustwave SpiderLabs researcher Karla
Apple has reportedly entered a deal with the stock photos and videos library Shutterstock to use the data to train its artificial intelligence (AI) models. The report also confirms the speculations that the tech giant is likely in the advanced stages of developing its in-house foundation model. Even as earlier reports have mentioned that the
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese hacking crew called UNC3886, whose
Redmi Turbo 3 is confirmed to launch in China in the near future, and the company’s first smartphone in the ‘Turbo’ lineup has now been spotted in leaked images. Tipster Fixed Focus Digital (translated from Chinese) shared a hands-on image of the purported Redmi Turbo 3 as well as two renders showing the rear panel
Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET,” Resecurity said in a technical report published this week. “It employs the
Instagram is one of the few social media platforms that are now engraved into our lifestyles. Whether sharing your vacation photos on Story, watching reels, or keeping a tab on your friends, Instagram is one platform to get all these. However, having so much screen time on the platform can be overwhelming for many. This
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top
Samsung Galaxy Watch FE will be launched soon, according to a report. The South Korean tech conglomerate could soon introduce a ‘Fan Edition’ (FE) version of its Galaxy Watch smartwatch, which runs on Google’s Wear OS operating system. It is expected to arrive at a lower price than the company’s recent smartwatch models, and its
Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The attack leverages CVE-2024-20720 (CVSS score: 9.1), which has been described by Adobe as a case of “improper neutralization of special elements” that could pave the way for arbitrary code
Apple urged a U.S. appeals court on Friday to overturn a U.S. trade tribunal’s decision to ban imports of some Apple Watches in a patent dispute with medical-monitoring technology company Masimo. Apple told the U.S. Court of Appeals for the Federal Circuit that the U.S. International Trade Commission’s decision was based on a “series of
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious
Vivo T3x 5G and iQoo Z9x 5G could soon be launched in India, as both smartphones were recently spotted on the Bureau of Indian Standards (BIS) certification listing, as per a report. The smartphones are the sub-models of the Vivo T3 and iQoo Z9 series, respectively. The iQoo Z9x was also reportedly spotted on the
Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the
PlayStation 5 Slim — or PS 5 Slim — went on sale in India on Friday, and customers can now purchase the gaming console online or via retail stores. In order to boost sales of the device, the company has partnered with hyperlocal delivery platform Blinkit to deliver the slimmed down version of its flagship
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan,
Nothing Ear 3 are expected to be announced soon. While Nothing is yet to announce the product, recent teasers from the company have suggested that the third generation Nothing Ear’s are likely to launch next. So far, Nothing has shared cryptic teasers with animal emojis and mascots. Now, the UK-based OEM has revealed a date
Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows – CVE-2024-21894 (CVSS score: 8.2) – A heap overflow vulnerability in the IPSec component of Ivanti
Apple’s iPhone 16 series of smartphones — comprising the iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max — is expected to arrive later this year with a few noteworthy additions such as a capture button to quickly take photos and videos. The non-Pro models are also expected to feature the
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 219
- Next Page »