Tag: technews
-
Meta’s next Quest Pro might be a team-up with LG
by
in ShortsMeta’s next Quest Pro might be a team-up with LG A Korean news report suggests that Meta will partner with LG to release a successor to its Quest Pro virtual reality headset in 2025. It will reportedly be priced at around $2,000 and use LG displays. The report also says the new high-end headset will…
-
Malicious npm Packages Aim to Target Developers for Source Code Theft
by
in ShortsMalicious npm Packages Aim to Target Developers for Source Code Theft An unknown threat actor has developed a way to make malicious npm packages that let them steal source code and configuration files from victim machines, a sign of how threats lurk consistently in open-source repositories. Since then, they have continuously published malicious packages. The…
-
How to Prevent ChatGPT From Stealing Your Content & Traffic
by
in ShortsHow to Prevent ChatGPT From Stealing Your Content & Traffic Worried that ChatGPT is going to start scraping your content? You should be. It’s possible that they’ll try to scrape your website too. Here’s how to protect your brand against this potential invasion: First, you need to know how to identify requests from chatgpt plugins.…
-
China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users
by
in ShortsChina-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users Verge and Signal Plus Messenger may be in for some trouble. Researchers have discovered malicious Android apps that mimic the popular messenger applications Signal and Telegram. They’ve also been infecting devices with malware designed to deliver the BadBazaar spyware. The earlier campaign, active since at least…
-
MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature
by
in ShortsMMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature A previously unknown Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late June 2023 to remotely commandeer their devices and perform financial fraud. Once installed, the app leans heavily on the Android accessibility service and MediaProjection API, both…
-
Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security
by
in ShortsHackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security New findings show that malicious actors could leverage a sneaky malware detection technique and bypass endpoint security solutions by manipulating the Windows Container Isolation Framework. The Windows Container Integrity Manager driver helps to manage file system separation between Windows containers and their hosts. Microsoft’s…
-
Earth Estries’ Espionage Campaign Targets Governments and Tech Titans Across Continents
by
in ShortsEarth Estries’ Espionage Campaign Targets Governments and Tech Titans Across Continents Active since at least 2020, Earth Estries has been observed employing an arsenal of backdoors and hacking tools. It also shares tactical overlaps with another nation-state group, Famous Sparrow, which was first exposed by ESET in 2021 as exploiting ProxyLogon flaws in Microsoft Exchange…
-
Numbers Don’t Lie: Exposing the Harsh Truths of Cyberattacks in New Report
by
in ShortsNumbers Don’t Lie: Exposing the Harsh Truths of Cyberattacks in New Report In this report, BlackBerry Threat Intelligence Team analyzes the impact of malware-based attacks from December 2022 to February 2023 and identifies the most-attacked industries. They also recommend that organizations focus their defenses based on contextualized cyber threat intelligence (CTI).For the latest information on…
-
North Korean Hackers Deploy New Malicious Python Packages in PyPI Repository
by
in ShortsNorth Korean Hackers Deploy New Malicious Python Packages in PyPI Repository Three more rogue Python packages have been discovered in the PyPI repository, further evidence that North Korean state-sponsored threat actors use the Python Package Index (PyPI) repository as a distribution point for their malware. VMConnect, a collection of Python packages that mimic popular open-source…
-
SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations
by
in ShortsSapphireStealer Malware: A Gateway to Espionage and Ransomware Operations An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities to enhance its capabilities and spawn their own bespoke variants. Talos has also detected the malware downloader being used to deliver remote administration tools like DCRat, njRAT, DarkComet, and Agent Tesla. Several…