CandidTodayTech's profile picture. We make tech simpler for people; Follow us on Google News: https://news.google.com/publications/CAAqBwgKMOTcpQswvOe9Aw?hl=en-IN&gl=IN&ceid=IN:en

Candid.Technology

@CandidTodayTech

We make tech simpler for people; Follow us on Google News: https://news.google.com/publications/CAAqBwgKMOTcpQswvOe9Aw?hl=en-IN&gl=IN&ceid=IN:en

Sophisticated Android spyware KoSpy, linked to North Korean hacking group ScarCruft (APT37), has targeted users in South Korea, Japan, India, Russia, and the Middle East since March 2022. Read more here: candid.technology/dprk-kospy-spy… #KoSpy #NorthKorea #InfoSec


Google tightens Chrome extension affiliate advertising policies following controversy over PayPal's Honey extension, which allegedly manipulated affiliate links to collect commissions from already-paid influencer promotions. candid.technology/google-chrome-… #HoneyScam #ChromeExtension


Apple releases critical security update for iPhones and iPads to patch zero-day vulnerability CVE-2025-24201 in WebKit, which powers Safari and all iOS browsers, amid reports of sophisticated active exploitation. candid.technology/apple-patches-… #ZeroDay #Apple #iPad


Indian government successfully rescues 283 nationals who were deceived by false job offers in Southeast Asia and forced into cybercrime operations, coordinating their evacuation from Thailand. Read more here: candid.technology/283-indians-re… #Scam #Phishing


North Korea's Lazarus Group infiltrates npm with six malicious packages including is-buffer-validator and react-event-dependency, designed to compromise developer environments, steal credentials, and extract cryptocurrency. candid.technology/lazarus-group-… #LazarusGroup #NPM

candid.technology

Lazarus Group targets npm ecosystem with 6 malicious packages

North Korea's Lazarus Group infiltrates npm with six malicious packages including is-buffer-validator and react-event-dependency.


Delhi Police arrests four scammers who extorted Rs 44.50 lakh from a victim by impersonating CBI officials in a sophisticated digital arrest scheme targeting unsuspecting citizens. More details here: candid.technology/delhi-police-a… #DigitalArrests #InfoSec


Major brands including JioHotstar, Louis Vuitton, and Tata Solar fight legal battles against fraudulent websites impersonating their brands, which deceive consumers, compromise data security, and damage corporate reputations. candid.technology/jiohotstar-lv-… #InfoSec #JioHotstar


Microsoft's TTD framework contains four critical CPU instruction emulation flaws that could compromise security, produce unreliable debugging results, and mislead forensic investigations when analysing Windows applications. candid.technology/critical-flaws… #TTD #InfoSec #Microsoft

candid.technology

Four bugs expose critical flaws in Microsoft's TTD

Microsoft's Time Travel Debugging framework contains four critical CPU instruction emulation flaws that could compromise security.


Cybercriminals create fake DeepSeek websites like deepseek-pc-ai[.]com to trick users into downloading malware disguised as an official AI client, exploiting the fact that no legitimate DeepSeek desktop application actually exists. candid.technology/cybercriminals… #DeepSeek #Malware

candid.technology

Cybercriminals use fake DeepSeek sites to hijack Windows PCs

Cybercriminals create fake DeepSeek websites like deepseek-pc-ai[.]com to trick users into downloading malware disguised as an official AI client.


Google's AI faced 258 reports of extremist content and 86 CSAM reports in 10 months, while major tech platforms show inadequate measures against harmful AI-generated content. More details here: candid.technology/gemini-flagged… #CSAM #Gemini #AI


Loading...

Something went wrong.


Something went wrong.