New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Dec 13, 2024Ravie LakshmananLinux / Threat Analysis Cybersecurity researchers have uncovered a new Linux rootkit called…

Microsoft’s AI-Powered Recall Feature Still Saves Snapshots of Sensitive Information: Report

Microsoft finally rolled out its artificial intelligence (AI)-powered Recall feature with the Windows 11 Insider Preview…

SaaS Budget Planning Guide for IT Professionals

SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With…

iPhone 17 Series Rumoured to Get Pixel-Like Rear Camera Design

iPhone 17 series launch may still be some time away, but that hasn’t stopped Apple enthusiasts and…

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

Dec 12, 2024Ravie LakshmananVulnerability / Device Security Details have emerged about a now-patched security vulnerability in…

Blaupunkt BTW300 Moksha+ With Up to 50 Hours Total Playback Launched in India: Price, Features

Blaupunkt BTW300 Moksha+ have been unveiled in India. These TWS earphones are claimed to offer a…

Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States

Dec 12, 2024Ravie LakshmananMobile Security / Cyber Espionage The Russia-linked state-sponsored threat actor tracked as Gamaredon…

Google announces Android XR platform, will launch first on Samsung’s Project Moohan device

Google said that it is launching a new Android-based XR platform on Thursday to accommodate AI…

Apple Announces App Store Awards 2024 Winners; Top Apps Include Kino and Lightroom

Apple has announced the results of its App Store Awards for 2024, revealing the winners and…

Credentials and API Keys Leaking Online

Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that thousands of servers hosting…