TIDAL is one of the first major music streaming services to launch this feature

0
[ad_1]

TIDAL is making it much easier to share music with your friends. The streaming service sneakily pushed out an update that makes it possible to share universal links with people who use different music streaming services.

A new update released on March 26 introduces this specific feature that’s been confirmed to work with multiple music streaming services, including Apple Music and Spotify (via Reddit). Here is an excerpt from the changelog:

Unfortunately, TIDAL doesn’t mention what streaming services are compatible with its universal links, but it does promise to add more in the coming weeks. This is specifically the case for music streaming platforms that aren’t that popular, so if you’re using Apple Music, Spotify or YouTube Music, you shouldn’t have any issues.

As one of the Redditors points out, you might have to restart the app after updating to the latest version in order for the ability to share universal links to show up. TIDAL is the first and only major streaming service to offer this customer-oriented feature, so let’s hope that the others will follow soon.

[ad_2]
Source link

Google Revealed Kernel Address Sanitizer To Harden Android Firmware

0
[ad_1]

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature.

However, it has a big attack surface with over 2.5 billion active Android devices all over the world.

It also poses challenges when it comes to prompt vulnerability patching due to its fragmented ecosystem that consists of different hardware vendors and delayed software updates.

Malware distribution, surveillance, and unauthorized financial gain, or any other malicious purpose are some examples of how cybercriminals take advantage of these loopholes in security.

Recently, Google unveiled the Kernel Address Sanitizer (KASan) to strengthen the Android firmware and beyond.

Android Firmware And Beyond

KASan (Kernel Address Sanitizer) has broad applicability across firmware targets. Incorporating KASan-enabled builds into testing and fuzzing can proactively identify memory corruption vulnerabilities and stability issues before deployment on user devices.

Document

Download Free CISO’s Guide to Avoiding the Next Breach

Are you from The Team of SOC, Network Security, or Security Manager or CSO? Download Perimeter’s Guide to how cloud-based, converged network security improves security and reduces TCO.

  • Understand the importance of a zero trust strategy
  • Complete Network security Checklist
  • See why relying on a legacy VPN is no longer a viable security strategy
  • Get suggestions on how to present the move to a cloud-based network security solution
  • Explore the advantages of converged network security over legacy approaches
  • Discover the tools and technologies that maximize network security

Adapt to the changing threat landscape effortlessly with Perimeter 81’s cloud-based, unified network security platform.

Google has already leveraged KASan on firmware targets, leading to the discovery and remediation of over 40 memory safety bugs, some critically severe, through proactive vulnerability detection.

Address Sanitizer (ASan) is a compiler instrumentation tool that identifies invalid memory access bugs like out-of-bounds, use-after-free, and double-free errors during runtime. 

For user-space targets, enabling ASan is straightforward with the -fsanitize=address option. However, for bare-metal code built with none system targets like arm-none-eabi, there’s no default runtime support. 

The -fsanitize=kernel-address option exposes an interface to provide custom KASan runtime implementations, like the Linux kernel’s routines.

KASan’s core idea is to instrument memory access operations like loads, stores, and memory copy functions to verify the validity of destination/source regions. 

It only allows access to valid regions tracked in a shadow memory area, where each byte represents the state (allocated, freed, accessible bytes) of a fixed-size memory region. 

Upon detecting an invalid access, KASan reports the violation.

Enabling KASan for bare-metal targets requires implementing instrumentation routines to check region validity during memory operations, report violations, and manage shadow memory to track the state of covered regions.

Here below we have mentioned all the sequential steps:-

  • KASan shadow memory
  • Implement a KASan runtime
  • Memory access check
  • Shadow memory management
  • Covering global variables
  • Memory copy functions
  • Avoiding false positives for noreturn functions
  • Hook heap memory allocation routines

For the usage of KASan on bare-metal code, one should employ -fsanitize=kernel-address option of the compiler and -asan-mapping-offset to indicate the location of shadow memory, -asan-stack/globals=1 to cover stack/global variables and -asan-instrumentation-with-call-threshold=0 for outlining checks against code bloat.

In addition, strategies such as leveraging Rust (a memory-safe language) are being advanced in order to proactively guard against memory vulnerabilities in the Android system.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

The WhatsApp call screen is getting a fresh look

0
[ad_1]

WhatsApp consistently introduces new features to the application, ranging from allowing users to upload one-minute-long statuses to pinning multiple messages. Just a week after revising the WhatsApp navigation bar, a revamped video and audio call screen interface is now available to some beta users.

WhatsApp Beta users can now experience a new view of the Call Screen

According to a report by WABetaInfo, the Meta-owned platform has introduced an enhanced call screen interface in WhatsApp beta for Android update 2.24.7.19. The new look is sleeker and more icon-driven compared to its previous counterpart, which was more basic but functional.

The Minimize button replaces the back button, located at the top left corner. This allows the call to be easily minimized and resumed by simply clicking it. Earlier, the lack of clear contrasts confused users who mistook the back button for the end call button. Additionally, the rebuilt interface enhances the user interaction process by enabling the addition of new members through the add participant button at the top right corner.

Some of the UI navigation elements have been updated

Another WhatsApp feature reporting publication, TheSpAndroid, has highlighted the new look of the bottom bars.

Following the images, it is evident that the new interface likely utilizes a constraint layout to achieve flexible positioning of the buttons. The new format buttons feature boasts consistent background colors for easy distinguishing from their surroundings. For instance, the buttons from the old version had a common background of grey color.

As depicted, there are three-dot menu settings that replace the arrow. The menu will likely serve the same purpose of expanding functionalities. TheSpAndroid reports that the three-dot menu is currently non-functional, indicating that the setting is still in development.

The given interface appears when a user initiates the switch between audio and video calls. Presently, this tweaked screen is undergoing testing on the latest WhatsApp beta version. The exact timeline for its official release remains unknown.

If you are eager to test these new features and provide feedback, you can join the beta program through the Google Play Store. Unfortunately, the beta program is currently at full capacity. You may need to wait a bit longer to gain early access to the latest WhatsApp updates.


[ad_2]
Source link

Google Password Manager will soon let you import passwords right from your phone

0
[ad_1]
Google’s making our lives a little easier in the password management game. If you’re like me, juggling dozens of logins gets messy, and if you have opted to use Google’s own password manager (the one you find in Chrome) in favor of third party ones, you’ll find that it is not as feature-rich as one would hope.
There are several reasons why I prefer to use Google Password Manager. For one, it is free, which is always a plus. Secondly, I find that it works well when you stay within Google’s ecosystem. For example, password autofill on my desktop Chrome browser and apps on my Google Pixel device is pretty much seamless. However, things can get a little dicey if you want to go a little more in-depth and import passwords from a CSV file. While this works very well on desktop, it hasn’t really been an option on mobile…until now.
Google Password Manager on Android devices is part of Google Play Services. As spotted by AssembleDebug back in February, a change was already taking shape there of a half-working option that had been added to import a CSV file from your phone’s storage.

Now, with Play Services v24.12, which is still in beta, this option is now there without the need to enable any experimental flags. We’ve always had the option to export our credentials as a CSV file, but it was just not possible to do it the other way around, unless you used the Chrome desktop browser.

Image Credit: AssembleDebug

The process looks super straightforward, as you can see in the screenshots above. One thing that’s a bit of a mystery is what exactly gets imported, although it appears that duplicates do get skipped. Since this is still in beta, there’s of course a chance that this will be further tweaked and streamlined as we get closer to a widespread release, which is likely around the corner.


[ad_2]
Source link

Utilizing LNK & HTA File

0
[ad_1]

The notorious WarzoneRAT malware has made a comeback, despite the FBI’s recent efforts to dismantle its operations.

Initially detected in 2018, WarzoneRAT was disrupted by the FBI in mid-February when they seized the malware’s infrastructure and arrested two individuals linked to the cybercrime scheme.

However, ThreatMon’s recent advertisement for WarZoneRAT v3, with its enhanced features, indicates that the threat actors are far from giving up.

Cybersecurity experts at Cyble Research & Intelligence Labs (CRIL) have uncovered a new campaign that leverages tax-themed spam emails to spread the WarzoneRAT (Avemaria) malware, a Remote Administration Tool (RAT) known for its remote control capabilities and ability to execute malicious actions under the command of a remote server.

Infection Tactics: The LNK and HTA Files

The infection begins when unsuspecting users open an email with the subject “taxorganizer2023” and execute an attached archive file.

Document

Download Free CISO’s Guide to Avoiding the Next Breach

Are you from The Team of SOC, Network Security, or Security Manager or CSO? Download Perimeter’s Guide to how cloud-based, converged network security improves security and reduces TCO.

  • Understand the importance of a zero trust strategy
  • Complete Network security Checklist
  • See why relying on a legacy VPN is no longer a viable security strategy
  • Get suggestions on how to present the move to a cloud-based network security solution
  • Explore the advantages of converged network security over legacy approaches
  • Discover the tools and technologies that maximize network security

Adapt to the changing threat landscape effortlessly with Perimeter 81’s cloud-based, unified network security platform.

This file contains a deceptive shortcut file, “taxorganizer2023.png.lnk,” which appears to be an image but is, in fact, a malicious LNK file.

When executed, it triggers a PowerShell command to download and extract a ZIP file, leading to the execution of an HTA file.

This HTA file then retrieves a PowerShell script in memory, which downloads a VBScript file from a remote server, ultimately deploying the WarzoneRAT malware.

Overall infection chain
Overall infection chain

Another infection method involves a ZIP archive named “MY TAX ORGANIZER.zip,” which contains a legitimate EXE file, a malicious DLL, and a PDF file.

Running the EXE file triggers the DLL sideloading technique, loading the malicious DLL identified as WarzoneRAT.![DLL Sideloading Method](Figure 17 – DLL sideloading method)

DLL sideloading method
DLL sideloading method

Technical Analysis: Unpacking the Malware

The technical analysis of the campaign reveals a complex infection chain.

The LNK file downloads a PNG file, which is a ZIP file, and extracts its contents.

The subsequent execution of the HTA file leads to a series of scripts that perform various actions, including generating random equations for stealth, checking for antivirus processes, and creating directories and files for persistence.

Content of HTA file before & after removing Junk codes
Content of HTA file before & after removing Junk codes

Final Payload: The Dangers of WarzoneRAT

The final payload, WarzoneRAT (Avemaria), is a highly capable RAT that allows remote access and control over the victim’s computer.

It can exfiltrate data, escalate privileges, manipulate the desktop remotely, harvest credentials, and perform keylogging, among other intrusive activities.

Hardcoded strings of Avemaria
Hardcoded strings of Avemaria

The recent campaign highlights the persistent threat posed by cybercriminals who exploit the trust of users with themed spam emails.

The sophisticated techniques used in this campaign, such as reflective loading and DLL sideloading, underscore the importance of vigilance and robust cybersecurity measures.

As the WarzoneRAT malware continues to evolve and resurface, it is a stark reminder of the ongoing battle between cybercriminals and cybersecurity defenders.

Users are urged to exercise caution when opening email attachments, even those that appear to be related to timely and relevant topics like tax organization.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

Unlocking Local Content and Resources

0
[ad_1]

Modern advancements have tilted the world into a tightly-knit web. Accessing localized content and resources can be hard due to geographic restrictions or censorship. However, the utilization of ISP proxies offers a promising solution. ISPs deploy these proxies. They sit between users and the internet, enabling access to region-locked content and resources.

This article explores high-quality ISP proxy packages with IPs from various countries. It explains their transformative power and shows how they bypass barriers to information and enhance user experiences. ISP proxies can unlock streaming services and allow access to educational materials. They have huge potential. They can make online content access fairer. Join us as we delve into ISP proxies and their impact on internet access.

The Limitations of Traditional Proxies

Think of a proxy server as a go-between your device and the internet. It allows you to browse anonymously and shields your identity. With it, you can also access restricted content. It works by primarily masking your IP address, providing privacy, and bypassing censorship or access restrictions.

However, traditional datacenter proxies pose significant limitations since websites are good at spotting and blocking them. This is because they have recognizable patterns and often seem suspicious. So, if you rely on such proxies, you may be unable to access some content or resources. This limitation comes from the widespread use of datacenter IPs by many users, which makes them easy to identify and prone to blocking.

Also, datacenter proxies lack the geographical diversity of residential proxies. They are also less reliable. This further limits their effectiveness in accessing region-restricted content or evading detection. Also, their static nature makes them easy to blacklist. This reduces their usefulness for bypassing restrictions or staying anonymous online.

Therefore, traditional proxies offer some benefits in comparison. But, their limits show the need for more advanced solutions. In a more connected and monitored online world, there is a need for these.

Introducing ISP Proxies: A Unique Solution

Introducing ISP proxies provides a unique solution. They solve the limits of traditional proxies and are different from datacenter proxies. Individual Internet Service Providers (ISPs) provide them, linking them to real residential IP addresses. This difference is fundamental. It allows ISP proxies to offer a hybrid solution. It combines the anonymity of home proxies with the speed and reliability of datacenter proxies.

ISP proxies use residential IP addresses from ISPs. They offer users the authenticity and legitimacy that traditional proxies often lack. Websites are less likely to detect and block ISP proxies since they come from real residential locations and mimic real user behaviour.

Also, ISP proxies offer users faster connections and more reliability. They’re better than residential proxies because they use the infrastructure of established ISPs. This mix makes ISP proxies attractive. They are for users who want to access region-restricted content and avoid detection. They are also for users who want to stay anonymous online while having the benefits of reliable, high-speed internet access.

Benefits of ISP Proxies

ISP proxies offer several notable benefits that distinguish them from traditional proxies. Let’s go over some of them.

  • Enhanced Anonymity and Security

ISP proxies have a few key advantages. One of them is that they can provide better anonymity and security. ISP proxies use actual residential IP addresses. They are like real user connections. This stealthy approach makes it hard for websites to identify and block them. As a result, users get more privacy. They also get more security when browsing the internet. This makes it less likely that bad actors will track or target them.

  • Increased Trust With Websites

Websites tend to trust traffic from ISP proxies more than traditional ones. This is because ISP proxies mimic the behaviour of real users. They are less likely to get flagged as suspicious. As a result, users can do tasks like social media management or web scraping with more confidence. Websites blocking their traffic or implementing tight security measures against them is less likely.

  • Access to Truly Local Content

Many websites restrict access to content based on the user’s location. ISP proxies solve this by letting users select an IP address from several places around the world. This lets users access truly local content, which they couldn’t otherwise access.

These proxies help users with streaming region-locked content. They also help with accessing geo-restricted services and browsing localized websites. They let users overcome geographical barriers and have a more tailored online experience.

Conclusion

ISP proxies offer enhanced anonymity, increased trust in websites, access to local content, reliable performance, and compatibility with various applications. With their ability to provide real residential IP addresses, ISP proxies present a valuable solution for users seeking improved online privacy and access to region-restricted content.

  1. Tools for Testing Your Proxy Servers
  2. Proxy or VPN for Netflix – Which is Best?
  3. Can You Secure Your Smartphone with a Proxy?
  4. Almost Every Major Free VPN Service is a Glorified Data Farm
  5. What is Dark Web, Search Engines, What Not to Do on Dark Web

[ad_2]
Source link

Here’s more information about Xiaomi’s very first flip phone

0
[ad_1]

A well-known tipster has just released more information about Xiaomi’s very first phone flip phone. That device is expected to launch this year. In fact, some rumors indicated it’s coming in the first half of the year.

A tipster just shared more information about Xiaomi’s first flip phone

That being said, the details we’ll talk about here have been shared by Digital Chat Station. He says that the phone’s main display will have very narrow bezels around it. The cover display, on the other hand, will be rather spacey and will have two cutouts for the two cameras.

The tipster added that the prototype model of the device has a battery capacity of 4,800mAh/4,900mAh. 67W wired charging is expected, and the charger will be included in the box.

What’s interesting is that Xiaomi seemingly plans to use the Snapdragon 8 Gen 3 chip inside this phone. That is also something that the tipster mentioned. We were expecting the Snapdragon 8 Gen 2, or a MediaTek chip, but Xiaomi is going all out.

The device will be very powerful, and include the Snapdragon 8 Gen 3 SoC

It seems like the company wants to position its first flip phone rather high on the food chain. It will stand right beside the upcoming book-style foldable from the company, the Xiaomi MIX Fold 4.

Speaking of names, the company’s very first flip phone could be called the Xiaomi MIX Flip. It would make sense, as the book-style foldable is the Xiaomi MIX Fold. The company could, of course, mix things up, we’ll have to wait and see.

Now, the Xiaomi MIX Fold 3 launched back in August last year. The Xiaomi MIX Flip could arrive alongside the fourth-gen model this year, around August. Alternatively, it could launch sooner than that, in the first half of the year, as some rumors suggested. We can only guess at this point.


[ad_2]
Source link

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

0
[ad_1]

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed “Operation FlightNight” targeting Indian government entities and energy companies. 

The attackers, likely state-sponsored, leveraged a modified version of the open-source information stealer HackBrowserData to steal sensitive data.

EclecticIQ identified that the attackers used Slack channels, a popular communication platform, as exfiltration points. 

These channels were named “FlightNight,” giving the operation its name.

Data Breach:

The attackers successfully infiltrated multiple government agencies responsible for communication, IT, and national defense.

Document

Download Free CISO’s Guide to Avoiding the Next Breach

Are you from The Team of SOC, Network Security, or Security Manager or CSO? Download Perimeter’s Guide to how cloud-based, converged network security improves security and reduces TCO.

  • Understand the importance of a zero trust strategy
  • Complete Network security Checklist
  • See why relying on a legacy VPN is no longer a viable security strategy
  • Get suggestions on how to present the move to a cloud-based network security solution
  • Explore the advantages of converged network security over legacy approaches
  • Discover the tools and technologies that maximize network security

Adapt to the changing threat landscape effortlessly with Perimeter 81’s cloud-based, unified network security platform.

Additionally, private energy companies were compromised, with details about financial documents, employee information, and even oil and gas drilling activities stolen. 

A staggering 8.81 GB of data was exfiltrated, potentially aiding future intrusions.

The attackers used a trick to get victims to install malware. 

They sent emails disguised as invitations from the Indian Air Force. 

These emails contained an ISO file, which appeared to be a harmless archive. 

However, when the victim opened the ISO file, it actually launched a shortcut file (LNK) disguised as a PDF document

Clicking the LNK file unknowingly activated the malware.

The malware then exfiltrated confidential documents, private emails, and cached web browser data. 

Malware infection chain in Operation FlightNight.attacker. 
Indian Air Force invitation decoy side with information stealer payload. 

The Malware’s Work:

The stolen data included documents, emails, and browsing history.  

Instead of sending the stolen data directly to the attackers, the malware uploaded it to channels on a communication platform called Slack. 

To make it appear like normal activity on the network and to help the attackers avoid detection.

Overlaps between new and earlier malware campaign.

The attackers modified an existing tool called HackBrowserData to add new features like document theft and communication through Slack.  

Analysis of the code confirmed these modifications. 

The malware also used a specific naming scheme for temporary files and targeted certain file types like documents and databases to steal data faster.

Finding The Victims:

The malware made a big mistake by storing the keys needed to access and control the Slack channels directly in its code. 

EclecticIQ researchers found these keys and used them to access the Slack channels where the stolen data was uploaded.  

These channels contained information for the researchers:

  • A list of victims – who was targeted by the attack.
  • File paths – exactly where the stolen data came from on the victim’s computer.
  • Timestamps – when the data was stolen.
  • Download URLs – unique links that allow anyone with the link to download the stolen data!

Another mistake was testing the connectivity over Slack workspaces.

This helped researchers understand even more about the attacker’s setup, including details about the Slack team and the bots used to communicate.

Recommendation/Mitigation

  • Disable the “remember me” feature in web browser and turn off automatic username completion.
  • Two-factor authentication (2FA)  adds an extra layer of security by requiring a second verification code in addition to password when logging in.
  • Be cautious with ISO files
  • Command-line auditing can help track suspicious activity related to LNK files, which can launch malware.
  • Watch for unusual amounts of data being sent to unknown Slack channels.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

Two OPPO phones are the first to support 5.5G networks

0
[ad_1]

Two OPPO phones are the very first devices in the world to support 5.5G networks. China Mobile announced the commercial launch of 5G-Advanced aka 5.5G aka 5GA network. Following that, OPPO’s Chief Product Officer confirmed something interesting.

The OPPO Find X7 Ultra now has support for 5.5G networks, the vanilla model too

Pete Lau serves as OPPO’s CPO, in case you were wondering. He went to social media and shared an image of the OPPO Find X7 Ultra. The thing is, the device in the picture is running 5GA, as shown above, its signal strength.

OPPO Find X7 Ultra 5 5G

The vanilla OPPO Find X7 will be able to do the same thing, by the way. It is worth noting as the two phones do note use the same chip. The ‘Ultra’ model is equipped with the Snapdragon 8 Gen 3, while the vanilla variant runs the MediaTek Dimensity 9300 processor.

The list of devices that will support 5.5G networks is expected to grow towards the end of the year. In fact, over 20 devices are expected to support it in a year’s time. That’s not a lot in a year, true, but it’s progress.

China Mobile plans to roll out 5.5G to cover over 300 cities by the end of 2024

China Mobile said that it plans to roll out the new network to cover over 300 cities by the end of 2024. The first 100 are aimed at the massive metropolitan areas of Beijing, Shanghai, and Guangzhou, as expected.

With that being said, what’s so great about the 5G-Advanced networks? Well, it can be up to 300% faster, and hit speeds of up to 10Gbps down and 1Gbps up. That’s a marketing name for 3GPP Release 18, as GSM Arena reports.

It will take some time for 5.5G to reach other countries, China is the first to get there, it seems. We don’t have any specifics for other regions at the moment.


[ad_2]
Source link

Google Chat update adds a new tab and refreshed UI

0
[ad_1]

After gaining voice message support earlier this week, Google Chat is now getting another update that brings a couple of interesting changes. For starters, the purpose of the update is to improve the Files tab in Google Chat spaces to make file management easier for users.

In that regard, Google has added an updated tab called Shared, as well as a refreshed user interface. On top of that, Google Chat is getting new features like a sort drop-down menu, support for shared links and media files.

Thanks to the new sort drop-down menu, users will now be able to narrow down the list of documents displayed based on category (file, link, media) or date shared.

Google Chat users who update to the latest version will see a new arrangement of tabs such as: Chat, Shared and Tasks. Three other sections are hidden behind that Shared tab: Files, Links and Media.

According to Google, the new features for Chat users will be rolled out starting April 17 (March 27 for the Rapid Release domains). Of course, it will take up to 15 days for everything to be visible.

As far as availability goes, all Google Workspace customers, Workspace Individual subscribers, and users with personal Google accounts will benefit from the new features and improvements.

[ad_2]
Source link