Jul 23, 2024NewsroomICS Malware / Critical Infrastructure Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it
0 Comments
Meta has filed a patent application for a new technology that could allow the Facebook parent company to allow equip its wearable mixed reality headsets with functionality inspired by a specific Apple Vision Pro feature. Apple’s first spatial computer is equipped with an external display that can display an indicator of what the wearer is
0 Comments
Jul 23, 2024NewsroomCyber Espionage / Chinese Hackers Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools. The campaign is a sign that the group “also engages in internal espionage,” Symantec’s Threat Hunter Team, part
0 Comments
OnePlus seems to have cooked up another interesting smartwatch with the launch of its new Watch 2R model. As the last character of the product name aptly describes, the OnePlus Watch 2R is an affordable version of the Watch 2. This is similar to the OnePlus 12R, a smartphone which offers similar performance as the
0 Comments
The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced “technology suite” that runs the whole cybercrime supply chain spectrum to spearhead its operations. Infoblox
0 Comments
JBL Live Beam 3 truly wireless stereo (TWS) earphones arrived in India last month. The flagship TWS by the company also marked the first time it launched an earphone with an integrated display in the country. While the JBL Tour Pro 2, the first-ever JBL TWS with a display, was introduced in several international markets
0 Comments
Jul 22, 2024NewsroomCloud Security / Phishing Attack A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises for their flexibility, cost effectiveness, and ease
0 Comments