CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer

Jan 10, 2025Ravie LakshmananCryptomining / Malware Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding to distribute a cryptocurrency miner that’s disguised as an employee CRM application as part of a supposed recruitment process. “The attack begins with a phishing email impersonating CrowdStrike recruitment, directing recipients to a malicious website,” […]

Continue Reading

Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks. These devices often lack robust […]

Continue Reading

Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

Jan 10, 2025Ravie LakshmananCybersecurity / Android Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution. The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14. “Out-of-bounds write in libsaped.so prior to SMR Dec-2024 […]

Continue Reading

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024. “The group used lure documents themed around the 2024 Taiwanese presidential candidate Terry Gou, the Vietnamese National […]

Continue Reading

Parasite Manipulates Plant Cells to Attract Insects for Its Transmission

A bacterial parasite has been observed to influence plant cell behaviour in a way that enhances its own transmission through sap-feeding insects. This adaptation alters plant responses. It was observed that it attracts female insects to males already present, which promotes the parasite’s survival. The discovery highlights a unique interaction among plants, bacteria, and insects, […]

Continue Reading

Photosynthetic Machinery from Plants Operates Within Hamster Cells

A breakthrough experiment has showcased the ability of chloroplasts, essential for photosynthesis in plants, to function inside animal cells. Red algal chloroplasts were introduced into cells derived from Chinese hamster ovaries (Cricetulus griseus), where they remained active for 48 hours, converting light into energy. This achievement represents a step forward in efforts to recreate the […]

Continue Reading

Oppo Reno 13 Pro 5G Review: Style and Substance

The Reno has been the premium series from the Oppo Reno 13 Pro 5G daylight camera samples from primary camera. (Tap to open) The handset captures some sharp images in broad daylight with the primary sensor. The photos offered decent contrast and dynamic range. However, you will notice slightly warmer colour tones with the primary […]

Continue Reading

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

Jan 09, 2025Ravie LakshmananVulnerability / Endpoint Security Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database […]

Continue Reading