TECH NEWS
Our tech and technology news page provides the latest updates and insights on the world of technology, from the latest gadgets and software to industry trends and breakthroughs. Whether you’re a tech enthusiast or just interested in the latest tech developments, our page covers a wide range of topics to keep you informed. Stay up-to-date with the latest tech news and get a glimpse into the future of technology through our page.
-
Hackers Target Auction House Network for $120,000
A significant breach has rattled the cybersecurity realm, as hackers demand a staggering $120,000 in exchange for access to a major auction house’s compromised network. This revelation comes on the heels of a diligent investigation by Flare, a respected threat intelligence company. The breach was brought to light when researchers stumbled upon an alarming advertisement on a hacker forum, offering…
Read More » -
OnePlus Ace 2 Pro Launches with 24GB RAM and 150W Charging
The latest offering from OnePlus, the Ace 2 Pro, has been unveiled, capturing attention with its impressive features and cutting-edge technology. This device stands out by boldly shattering conventional memory standards for high-end smartphones, boasting a staggering 24GB of RAM. Setting itself apart from the competition, the Ace 2 Pro incorporates a new display technology that enables it to function…
Read More » -
iFixit Now Offers Pixel 7a Components Alongside Repair Guides
iFixit has recently expanded its catalog to encompass authentic Pixel 7a components for repair, which made its debut in May. Accompanying Pixel 7a components are meticulous, step-by-step guides that facilitate the replacement process. The front glass digitizer screen of the Pixel 7a, boasting a generous 6.1-inch 1080 x 2400 OLED display, replete with an under-display fingerprint scanner, is available at…
Read More » -
Leaked Photos of Tecno Phantom V Flip Circular Outer Display
The forthcoming Tecno Phantom V Flip stands poised as the next inclusion within Tecno’s array of foldable phones, building upon the accomplishments achieved by its antecedent, the Phantom V Fold, recognized for its cost-effectiveness. Recent premature disclosures of the Phantom V Flip, shared through the channels of @PassionateGeekz and Newzonly, extend a partial glimpse into the architectural blueprint of the…
Read More » -
BitForge Vulnerabilities Expose Cryptocurrency Wallets to Theft
A series of critical BitForge vulnerabilities, collectively known as ‘BitForge,’ has been uncovered in widely used cryptographic protocols including GG-18, GG-20, and Lindell 17. These vulnerabilities have a significant impact on popular cryptocurrency wallet providers such as Coinbase, ZenGo, and Binance. BitForge Vulnerabilities The discovery of these vulnerabilities was made by the Fireblocks Cryptography Research Team in May 2023. The…
Read More » -
Merlin Toolkit Exploited in Targeted Attacks on State Entities
Ukrainian authorities have issued a stern caution regarding a series of assaults directed at governmental bodies through the utilization of the ‘Merlin’ open-source post-exploitation toolkit. ‘Merlin’, crafted in the Go programming language, stands as a versatile toolkit accessible on GitHub, meticulously designed for red team operations within the realm of cybersecurity. The toolkit, ‘Merlin’, encompasses a repertoire of functionalities encompassing…
Read More » -
Exploring Apple’s Unreleased iPhone Models
The excitement and buzz around Apple’s unreleased iPhone models upcoming and iPhone 15 announcement is palpable in the tech community. Apple is known for its constant innovation, and it got us interested to know the details of what it has in store. The recent discovery of a hidden iPhone model hidden in tvOS 17 beta code has sparked discussions and…
Read More » -
Clop Ransomware Gang Adopts Torrents for Data Leaks
Clop Ransomware Gang adopts torrents for data leaks. Recently, the Clop ransomware team took a bold and clever approach to exploiting a less-than-ever vulnerability in the widely used file transfer software called MOVEit Transfer This new strategy enables them to steal sensitive information from approximately 600 global organizations undetected. The consequences were severe, leaving victims unaware of the breach until…
Read More » -
SEC Enforces 4-Day Cyberattack Disclosure Deadline
The U.S. Securities and Exchange Commission (SEC) has introduced groundbreaking regulations necessitating publicly traded corporations to divulge cyberattacks within four business days once they ascertain that these incidents are of material significance. Material incidents denote those that carry substantial weight in the decision-making process of a public company’s shareholders concerning their investments. Foreign private issuers are not exempt from these…
Read More » -
Malware Jeopardizes 400000 Corporate Credentials
In today’s digital age, cybercriminals continually develop sophisticated methods to compromise sensitive data. Information-stealing malware has become a significant concern for businesses, with over 400,000 corporate credentials falling into the hands of malicious actors. The analysis of 20 million malware logs from the dark web and Telegram channels sheds light on the severity of the problem. To safeguard your business,…
Read More »