Tag Archive for: review

Week 36 in review: Oppo A38 announced, Moto G54 goes official, more iPhone 15 rumors


The first week of September brought more to the rumor mill for the usual suspects. The iPhone 15 series will offer camera upgrades across the board with the 15 and 15 Plus getting all-new 48MP Sony sensors with a stacked design and an f/1.6 aperture. The second shooter on the back will be the same old 12MP, f/2.4 ultrawide. We prepared a more detailed what to expect article which you can check out here.

The 15 Pro will retain the 48MP main shooter from its predecessor but it’s rumored to be joined by an improved 13MP f/2.4 ultrawide lens. The 15 Pro Max will get the biggest update with a new 12.7MP periscope lens (1/1.9″ sensor; f/2.8 aperture) with 5x optical zoom. We also got to see dummy units for all four of the iPhone 15 series devices confirming Dynamic Islands on the non-Pros and the new Action Buttons on the Pro models.

Google showcased the Pixel 8 Pro in full glory on its own website in detailed render form. The flagship Pixel will be available in Licorice, Porcelain and Sky colors and we got more confirmation of the previously leaked design. Google is also rumored to release Android 14 at the Pixel 8 launch event on October 4.

Samsung announced Thom Browne Editions of its Galaxy Z Fold5 and Watch6. The Samsung Galaxy S24 is rumored to get a titanium frame, upgraded 200MP main and 50MP telephoto cameras and a Snapdragon 8 Gen 3 chip.

Oppo launched its A38 midranger with a Helio G85 chipset, 50MP main cam, 90Hz IPS LCD and a 5,000 mAh battery with 33W fast charging. The device comes in Black and Gold colors but we still don’t have any pricing and availability details.

Motorola launched the G54 with two version – one for China and a slightly different model for India. Both Motos feature 6.5” IPS LCDs (120Hz), MediaTek’s Dimensity 7020 chipset and 50MP main cams. The Indian model brings a larger 6,000 mAh battery with 33W charging while the Chinese version relies on a 5,000 mAh cell with 15W charging.

Xiaomi will launch its 13T lineup on September 26 and we got confirmation both the 13T and 13T Pro will receive 4 Android updates and 5 years of security patches. Motorola will announce its Edge 40 Neo on September 14.

Here are all the…

Source…

Week in review: 11 search engines for cybersecurity research, PoC for RCE in Juniper firewall released


Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies.

What makes a good ASM solution stand out
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete.

What does optimal software security analysis look like?
In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security.

PoC for no-auth RCE on Juniper firewalls released
Researchers have released additional details about the recently patched four vulnerabilities affecting Juniper Networks’ SRX firewalls and EX switches that could allow remote code execution (RCE), as well as a proof-of-concept (PoC) exploit.

Easy-to-exploit Skype vulnerability reveals users’ IP address
A vulnerability in Skype mobile apps can be exploited by attackers to discover a user’s IP address – a piece of information that may endanger individuals whose physical security depends on their general location remaining secret.

Qakbot botnet disrupted, malware removed from 700,000+ victim computers
The Qakbot botnet has been crippled by the US Department of Justice (DOJ): 52 of its servers have been seized and the popular malware loader has been removed from over 700,000 victim computers around the world.

The removal of Qakbot from infected computers is just the first step
The Qakbot botnet has been disrupted by an international law enforcement operation that culminated last weekend, when infected computers started getting untethered from it by specially crafted FBI software.

Cisco VPNs with no MFA enabled hit by ransomware groups
Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching…

Source…

Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE


Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Week in review

Network detection and response in the modern era
In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to improve threat detection and streamline incident response.

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure
North Korean state-sponsored hackers Lazarus Group have been exploiting a ManageEngine ServiceDesk vulnerability (CVE-2022-47966) to target internet backbone infrastructure and healthcare institutions in Europe and the US.

Maintaining consistent security in diverse cloud infrastructures
In this Help Net Security interview, Kennedy Torkura, CTO at Mitigant, discusses the complexity of maintaining clear visibility into cloud environments, why it poses such a challenge for CISOs, and how they can prepare to address potential issues.

Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected environments, examining the broadening attack surface and the nuanced complexities this evolution imposes.

AI and the evolution of surveillance systems
In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations can prevent their systems from perpetuating biases or violating individual rights.

IEEE 802.11az provides security enhancements, solves longstanding problems
In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard will enable accuracy to less than 0.1 meters, which is a significant improvement from the current Wi-Fi location accuracy of 1-2 meters.

8 open-source OSINT tools you should try
Open-Source Intelligence (OSINT) refers to…

Source…

Week in review: VPNs vulnerable to TunnelCrack attacks, Cybertech Africa 2023


Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Deception technology and breach anticipation strategies
In this Help Net Security interview, Xavier Bellekens, CEO of Lupovis, explains how the implementation of deception-as-a-service offers an extra layer of defense, aiding both the CISO and their team with early warning indicators of potential breaches.

Balancing telecom security, law enforcement, and customer trust
In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom industry’s future.

How CISOs break down complex security challenges
In this Help Net Security interview, Kevin Paige, CISO at Uptycs, provides insights into how he navigates the complex cybersecurity landscape, striking a balance between technical expertise, effective communication, risk management, and adaptive leadership.

The road ahead for ecommerce fraud prevention
In this Help Net Security interview, Eduardo Mônaco, CEO at ClearSale, explains the complexities of ecommerce fraud, discussing the evolution of fraudster tactics, the effectiveness of social footprint analysis in confirming identity, the balance between fraud prevention and customer experience, and techniques to address more advanced fraud types.

Reinventing OT security for dynamic landscapes
From understanding the challenges of disparate OT protocols and the increasing convergence with IT to grappling with the monumental role of human error, our latest interview with Rohit Bohara, CTO at asvin, delves deep into the landscape of OT security.

Major vulnerabilities discovered in data center solutions
Researchers have discovered serious security vulnerabilities in two widely used data center solutions: CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s iBoot Power Distribution Unit (PDU).

Macs are getting compromised to act as proxy exit nodes
AdLoad, well-known malware that has been targeting systems running macOS for over half a decade, has…

Source…