Technology

OnePlus Pad Go is expected to launch soon with upgrades over the MediaTek Dimensity 9000 SoC-powered OnePlus Pad, which was released in February. The Shenzhen-based electronics manufacturing company was previously tipped to have been working on their second tablet. Now a tipster has hinted at the launch timeline of the tablet. The OnePlus tablet is said
0 Comments
Jul 21, 2023THNVulnerability / Botnet Several distributed denial-of-service (DDoS) botnets have been observed exploiting a critical flaw in Zyxel devices that came to light in April 2023 to gain remote control of vulnerable systems. “Through the capture of exploit traffic, the attacker’s IP address was identified, and it was determined that the attacks were occurring
0 Comments
Jul 20, 2023THNHardware Security / SysAdmin Two more security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software that, if successfully exploited, could allow threat actors to remotely commandeer vulnerable servers and deploy malware. “These new vulnerabilities range in severity from High to Critical, including unauthenticated remote code execution and unauthorized device
0 Comments
Jul 20, 2023THNMalware / Cyber Threat Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that targets vulnerable Redis instances for follow-on exploitation. “P2PInfect exploits Redis servers running on both Linux and Windows Operating Systems making it more scalable and potent than other worms,” Palo Alto Networks Unit 42 researchers William
0 Comments
Attack surfaces are growing faster than security teams can keep up. To stay ahead, you need to know what’s exposed and where attackers are most likely to strike. With cloud migration dramatically increasing the number of internal and external targets, prioritizing threats and managing your attack surface from an attacker’s perspective has never been more
0 Comments
Jul 19, 2023THNCyber Espionage / Spyware The U.S. government on Tuesday added two foreign commercial spyware vendors, Cytrox and Intellexa, to an economic blocklist for weaponizing cyber exploits to gain unauthorized access to devices and “threatening the privacy and security of individuals and organizations worldwide.” This includes the companies’ corporate holdings in Hungary (Cytrox Holdings
0 Comments
Jul 18, 2023THNMalware / Cyber Attack An unidentified threat actor compromised an application used by multiple entities in Pakistan to deliver ShadowPad, a successor to the PlugX backdoor that’s commonly associated with Chinese hacking crews. Targets included a Pakistan government entity, a public sector bank, and a telecommunications provider, according to Trend Micro. The infections
0 Comments