Technology

Jun 01, 2023Ravie LakshmananCyber Threat / Malware Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that’s employed by the North Korean state-sponsored actor known as ScarCruft. “RokRAT is a sophisticated remote access trojan (RAT) that has been observed as a critical component within the attack chain, enabling the threat actors
0 Comments
May 31, 2023Ravie LakshmananServer Security / Cryptocurrency A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency miner and facilitate lateral movement. The findings come from the SANS Internet Storm Center (ISC), which detected a spike in HTTP requests for “/nifi” on May 19, 2023.
0 Comments
Julian Hamood, President and founder of Trusted Tech Team, a leading provider of Microsoft licensing and cloud-based solutions launched in 2017, is celebrating the company’s ongoing meteoric growth by relocating to a 32,000+ sq. ft. office space to accommodate more in-house experts. Based in Orange County, CA, Trusted Tech Team recently announced that it surpassed
0 Comments
May 31, 2023Ravie LakshmananCyber Threat / Malware The threat actors behind RomCom RAT are leveraging a network of fake websites advertising rogue versions of popular software at least since July 2022 to infiltrate targets. Cybersecurity firm Trend Micro is tracking the activity cluster under the name Void Rabisu, which is also known as Tropical Scorpius
0 Comments
May 30, 2023Ravie LakshmananZero Day / Vulnerability Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code execution, the Zero Day Initiative (ZDI) said in a report published last week. The vulnerabilities were demonstrated by three different teams from Qrious Secure, STAR Labs, and DEVCORE
0 Comments
May 30, 2023Ravie LakshmananMobile Security / Android A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of a sophisticated malware campaign. The malware is distributed via social media and messaging platforms under the guise of legitimate applications like Opera Mini, OpenAI ChatGOT, and Premium versions
0 Comments
May 29, 2023Ravie LakshmananAuthentication / Mobile Security Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user authentication and seize control of the devices. The approach, dubbed BrutePrint, bypasses limits put in place to counter failed biometric authentication attempts by weaponizing two zero-day vulnerabilities in the
0 Comments
Honor 90 and Honor 90 Pro were recently launched by the company in China. The handsets are equipped with 6.7-inch 120Hz OLED displays and are powered with Qualcomm’s Snapdragon processors. They are equipped with a 200-megapixel primary camera, a 12-megapixel ultra-wide angle camera, and a 50-megapixel selfie camera. Both phones run on Android 13-based MagicOS
0 Comments
Motorola Razr 40 is tipped to launch on June 1 alongside the Motorola Razr 40 Ultra. Ahead of its debut, the Razr series smartphone has been spotted on the benchmarking platform Geekbench and China’s Compulsory Certification (3C) website, giving us a look at some of its key specifications. The Geekbench listing points to a Snapdragon
0 Comments
May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of the application development framework Expo.io. The shortcoming, assigned the CVE identifier CVE-2023-28131, has a severity rating of 9.6 on the CVSS scoring system. API security firm Salt Labs said the issue rendered services using
0 Comments