Tag Archive for: leaks

Three Exciting Pixel 8 Pro Leaks That Will Change The World


Google has set the scene for its “Made By Google” event on October 4th, and the Pixel 8 and Pixel 8 Pro are set to take center stage. The Pixel 8 Pro especially will break new ground in hardware and software. Looking through the leaks, details, and information available, here are three experiences that will have a significant impact on the smartphone world.

First up is the Tensor G3 system on chip. Rather than go for the off-the-shelf premium chipset from Qualcomm in 2021, Google set out to design its own chipset for the Pixel 6. The Tensor G1 didn’t quite match the raw power of the then-current SnapDragon 888. It was designed around artificial intelligence and machine learning, which provided more software benefits that positively impacted the user experience.

The camera software’s post-processing was one area, but you also had faster on-device translation and transcription as other visible advantages. Last year’s Tensor G2 built on these, and you can expect the Tensor G3 to carry on down this path, allowing the Pixel 8 and Pixel 8 Pro to excel in these areas.

As to the performance gap to the Snapdragon chipsets, the Tensor G3 is set to match the current Snapdragon 8 Gen 2, although the Gen 3 is expected to launch early next year.

Then, you have the investment put into the camera, both in software and hardware.

For the latter, Google is set to use the new Samsung Isocell GN2 image sensor on both the Pixel 8 Pro and the Pixel 8. This is a step up from the previous GN1 sensor, allowing the new handset to sample 50 megapixels while capturing 35 percent more light. It also supports recording video at 8K resolution and 30 frames per second. Still, we are waiting to see if Google will unleash that level of performance – it will be incredibly intensive on power usage and require careful thermal management.

The software is also seeing new features in the updated Camera app. Google’s Camera app is only available (officially) on Pixel devices, and version 9 will only run on Android 14; you can be sure this app harnesses both the new optical hardware and the AI and ML capabilities of the Tensor G3.

Previous Pixels…

Source…

Airbus Launches Investigation After Hacker Leaks Data


Airbus has launched an investigation after a hacker leaked information allegedly stolen from the French aerospace giant’s systems. 

Cybercrime intelligence firm Hudson Rock reported on Tuesday that a hacker who uses the online moniker ‘USDoD’ claimed earlier this month on a cybercrime forum that they had hacked Airbus.

The same hacker previously claimed to have breached the FBI’s InfraGard database, which stores information on 80,000 people, including business leaders, IT professionals, and military, law enforcement, and government officials. 

The hacker, who recently announced joining an emerging ransomware group, apparently obtained the personal information of 3,200 people associated with Airbus vendors, including  Rockwell Collins and Thales. The compromised data includes names, job titles, addresses, email addresses, and phone numbers. 

The attacker said they had gained access to Airbus systems using a compromised account belonging to an employee at a Turkish airline. Airbus confirmed to Hudson Rock that this was indeed the attack vector.

The cybersecurity firm’s investigation showed that the hacker obtained the targeted airline employee’s credentials for Airbus systems with the aid of malware. 

Information-stealing malware collects vast amounts of credentials from infected computers, and the malware operators then sell those credentials to others. In this case, Hudson Rock determined that the employee likely got their device infected with RedLine malware after downloading a pirated version of .NET. 

Advertisement. Scroll to continue reading.

“Credentials obtained from info-stealer infections, which have become the primary initial attack vector in recent years, provide threat actors with easy entry points into companies, facilitating data breaches and ransomware attacks,” Hudson Rock said.

The security firm regularly analyzes data obtained by such info-stealers, which have also been observed stealing hacker forum credentials

In a statement provided to SecurityWeek, an Airbus spokesperson said, “Airbus has launched an investigation into a cyber event during which an IT account associated with an Airbus customer has been attacked. This account was…

Source…

data breaches and leaks, new hacks & more


Jak Connor | Aug 12, 2023 3:15 AM CDT

A Microsoft cloud breach that resulted in China state-backed hackers breaking into U.S. government emails has led the Cyber Security Review Board to launch an investigation.

Microsoft vulnerability causes government emails to be hacked, officials launch investigation 48

The Cyber Security Review Board (CSRB) announced on Friday that its investigation will look into cloud-based identity and authentication infrastructure, which will lead to a wider review of all potential and current problems.

This investigation was launched following U.S. government official email accounts being infiltrated by China state-backed hackers that gained access to U.S. Commerce Secretary Gina Raimondo’s inbox, several other officials at the U.S. State Department, and officials at a few different government agencies.

Continue reading: Microsoft vulnerability causes government emails to be hacked, officials launch investigation (full post)

Jak Connor | Aug 1, 2023 3:34 AM CDT

US officials have claimed they have discovered what they suspect is Chinese malware designed to perform a specific task.

US military detects hidden Chinese malware on multiple systems that has an unusual intent 21451

A new report from The New York Times has revealed that US officials have found Chinese malware across several military systems and that this malware isn’t like the typical Chinese malware as it has a specific purpose – to disrupt. According to the report from the NYT, the malware isn’t designed for surveillance, which is the typical form of malware that’s discovered on US military and government systems.

Experts claim the recently discovered malware is simply to disrupt US military and civilian operations, and according to National Security Agency deputy director George Barnes, “China is steadfast and determined to penetrate our governments, our companies, our critical infrastructure.” Notably, Rob Joyce, the director of cybersecurity at the NSA, said last month that the capabilities of the malware are “really disturbing” as it’s able to shut off water and power and disable communications for both military bases and civilians.

Continue reading: US military detects hidden Chinese malware on multiple systems that has an unusual intent (full post)

Kosta Andreadis | Jul 11, 2023 1:28 AM CDT

It’s a common belief that DRM in PC game releases, specifically the popular Denuvo Anti-Tamper…

Source…

Hacks And Data Leaks – Cyber Defense Magazine


How to protect businesses from cyberattacks

By Sergey Ozhegov, CEO, SearchInform

Hacks and data leaks: how to protect businesses from cyberattacks

Hardly a week goes by without a hack or data breach incident occurrence. Quite often, large organizations, such as banks, state bodies and corporations become attacked, despite the fact that they are well-sponsored and their employees are usually quite well informed in the information security related issues. Thus, even large enterprises are often incapable of protection against cyber threats. So, the questions arises – what should executives of SMEs, which information security budget is much smaller do? The SearchInform CEO shares advice on how to strengthen an organization’s information security protection.

SMEs are in the focus

Owners of small businesses quite often don’t take cyber security issues seriously, because they believe that intruders aren’t interested in their companies due to their small size. Such approach leads to serious consequences, as it turns small businesses into perfect and vulnerable target.

One of the core risk is critical data leak. Such data includes, but isn’t limited to:

  • Client database
  • Critical data on some business processes
  • Commercial data on business deals etc.

Businesses should also take data privacy laws seriously. There is a global trend of adoption of various acts, aimed at regulation of data-related processes. The new regulations, coming into force worldwide motivate companies to implement specific protective software. The consequences of such norms ignorance become more and more serious. For instance, in case a company doesn’t comply with a regulator’s requirements, it has to pay fines, which, in turn, are also permanently increased.

The main problem is that implementation of information security measures requires significant financial expenditures and takes time. Nevertheless, law requirements and data leak risks must not be ignored anyway. That is why it is strictly important to address risks properly and deal at least with main vulnerabilities and security “holes”.

First of all, let’s identify where to expect threats to occur.

Who poses a threat to your organization’s…

Source…