Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks

Google and iVerify analysis reveals a powerful exploit kit originally used by Russian state actors that is now appearing in broader criminal campaigns.

The post Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

How to clean up your digital footprint – and why it matters more than you think

When someone Googles you, what will they find? Don’t let embarrassing old social media posts define your online presence. Learn how to control the narrative.

Latest news – ​Read More

Bluetooth is working on wireless audio tech I once thought was impossible – what to know

The Bluetooth Special Interest Group says it’s working on standard protocols for lossless and spatial audio.

Latest news – ​Read More

TCL X11L review: One of the best out-of-the-box TVs that’s entered our testing lab

With a new SDQ-Mini LED panel, TCL’s X11L produces a picture on-par with some of the best OLED models from Sony and LG.

Latest news – ​Read More

iPhone 17e vs. iPhone 17: I compared the two models to decide which has the better value

Apple’s new iPhone 17e is shaping up to be a great midrange device, but how does it stack up against the base iPhone 17?

Latest news – ​Read More

Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury

Institutional DeFi helps corporations improve treasury liquidity, speed cross-border settlements, and manage capital using secure permissioned blockchain protocols.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims’ cloud environments.

darkreading – ​Read More

Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware

A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

How to Avoid Confidentiality Gaps in Early-Stage Startups

Startups often expose sensitive data during pitches and hiring. Learn when to use NDAs and simple workflows to close confidentiality gaps.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

I tried Tecno’s modular phone concept at MWC – and it quickly got weird

Tecno’s magnetic modular phone introduces some cool concepts, but the execution didn’t wow me.

Latest news – ​Read More