Month: March 2022

Brazil’s Supreme Court revoked on Sunday an order suspending the use of messaging app Telegram in the country after the company complied with court requests to block accounts that allegedly spread disinformation, according to a statement on the court’s website. On Friday, Supreme Court Justice Alexandre de Moraes ordered the suspension, saying Telegram had repeatedly
0 Comments
Did you miss a session at the Data Summit? Watch On-Demand Here. By Bradley L. Gerstman, cofounder of Gotham Government Relations and Gerstman Schwartz LLP. In its most distilled form, a board of directors is described as “a group of people who manage or direct a company or organization.” For both for-profit and non-profit institutions,
0 Comments
A newly disclosed security vulnerability in the Kubernetes container engine CRI-O called cr8escape could be exploited by an attacker to break out of containers and obtain root access to the host. “Invocation of CVE-2022-0811 can allow an attacker to perform a variety of actions on objectives, including execution of malware, exfiltration of data, and lateral
0 Comments
Motorola Edge 30 specifications have surfaced online. The purported successor of Motorola Edge 20 was spotted on benchmarking website Geekbench. The Geekbench listing has revealed the phone’s score in single-core and multi-core test along with some specifications about the handset. The listing has revealed key features of the device including the OS version, processor, RAM,
0 Comments
The Security Service of Ukraine (SBU) said it has detained a “hacker” who offered technical assistance to the invading Russian troops by providing mobile communication services inside the Ukrainian territory. The anonymous suspect is said to have broadcasted text messages to Ukrainian officials, including security officers and civil servants, proposing that they surrender and take
0 Comments
Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers. “By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds
0 Comments