ScarCruft Hackers Exploit Ably Service for Stealthy Wiretapping Attacks

Jun 21, 2023Ravie LakshmananCyber Threat / Privacy The North Korean threat actor known as ScarCruft has been observed using an information-stealing malware with previous undocumented wiretapping features as well as a backdoor developed using Golang that exploits the Ably real-time messaging service. “The threat actor sent their commands through the Golang backdoor that is using…

Nokia enhances its AirScale baseband portfolio

Nokia has announced the launch of new products aimed at enhancing its AirScale baseband portfolio. These products, which include next-generation baseband capacity cards named Levante and Lodos – as well as an ultra-performance baseband control card called Ponente – leverage Nokia’s ReefShark System-on-Chip (SoC) technology to deliver industry-leading performance, connectivity, and processing. Tommi Uitto, President…

Nokia enhances its AirScale baseband portfolio

Nokia has announced the launch of new products aimed at enhancing its AirScale baseband portfolio. These products, which include next-generation baseband capacity cards named Levante and Lodos – as well as an ultra-performance baseband control card called Ponente – leverage Nokia’s ReefShark System-on-Chip (SoC) technology to deliver industry-leading performance, connectivity, and processing. Tommi Uitto, President…

Nokia enhances its AirScale baseband portfolio

Nokia has announced the launch of new products aimed at enhancing its AirScale baseband portfolio. These products, which include next-generation baseband capacity cards named Levante and Lodos – as well as an ultra-performance baseband control card called Ponente – leverage Nokia’s ReefShark System-on-Chip (SoC) technology to deliver industry-leading performance, connectivity, and processing. Tommi Uitto, President…

Embracing Change Enablement in the Age of Digital Twins and the Metaverse  

AEC (architectural, engineering, and construction) firms and the infrastructure sector are at an inflection point. With the unprecedented demand to address aging infrastructure and new infrastructure investments to drive social and economic benefits worldwide, combined with a growing shortage of talent and skilled labor, AEC firms across the infrastructure lifecycle must do more with less.…

This Android app with over 50,000 installs steals your files and microphone recordings — what to do

An Android app downloaded onto more than 50,000 devices has been found to be harboring data-stealing malware. Security researchers at ESET discovered that the iRecorder – Screen Recorder app available on Google Play had malicious functionality that let it extract data from a user’s Android device. This data could include microphone recordings and files with…

DMV-focused exploit leaves data of 6M U.S. residents exposed

A vulnerability in the MOVEit file transfer software has led to the infiltration of the personal records of millions of Americans across several states, according to Tech Radar. The exploit has targeted the Department of Motor Vehicles (DMV) in Louisiana and Oregon. MOVEit software is used globally by several organizations, including many government agencies, and…