May 20, 2024NewsroomCyber Attack / Threat Intelligence An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind destructive wiping attacks targeting Albania and Israel under the personas Homeland Justice and Karma, respectively. Cybersecurity firm Check Point is tracking the activity under the moniker Void Manticore, which is
0 Comments
The Redmi Buds 5A were unveiled in India alongside the Redmi Pad SE in April this year at Xiaomi’s ‘Smarter Living & More’ launch event. The audio wearable comes with active noise cancellation (ANC) and Google Fast Pair support, as well as an IPX4 rating and a companion app. These true wireless earphones (TWS) are
0 Comments
May 20, 2024NewsroomMalvertising / Cryptocurrency A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro. “The presence of multiple malware
0 Comments
May 19, 2024NewsroomBanking Troja / Email Security The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The large-scale phishing attacks, likely facilitated by other cybercriminals via a malware-as-a-service (MaaS) model, target over 1,500 banks across the world, spanning more
0 Comments
Assassin’s Creed Shadows, the next instalment in Ubisoft’s stealth/action-RPG franchise, will be released November 15 across PC, PS5, Xbox Series S/X and Amazon Luna. Previously known as Assassin’s Creed Codename Red, the upcoming title will explore the long-requested setting of Feudal Japan through the eyes of two playable protagonists with distinct playstyles and abilities. Assassin’s
0 Comments
Security researchers have disclosed almost a dozen security flaws impacting the GE HealthCare Vivid Ultrasound product family that could be exploited by malicious actors to tamper with patient data and even install ransomware under certain circumstances. “The impacts enabled by these flaws are manifold: from the implant of ransomware on the ultrasound machine to the
0 Comments