Skip to main content

Posts

Showing posts from September, 2020

Sonos sues Google for infringing 5 more non-wire A.K.A Wireless audio patents

 Sonos has filed another patent lawsuit against Google, alleging that giant search infringes five wireless patents across the Nest and Chromecast product line. The move comes on the eve of Google's hardware hardware event on September 30, with the announcement of the Chromecast and Nest smart speaker and new Pixel phones. Sonos filed its first patent lawsuit against Google in January in a California court and the International Trade Commission; The state lawsuit was suspended while the ITC reached a decision on whether to block Google products that allegedly violated market rules. The new lawsuit was filed only in a federal court in the Western District of Texas - a recent patent for a patent case - and it represents an aggressive approach from Sonos. "We think it's important to show the depth and breadth of Google's copy," said Eddie Lazarus, a law officer at Sonos. "We showed them the 100 patent charts which we said were infringing, all to no avail." G...

Researchers Uncover Cyber Espionage Operation Aimed At Indian Army (INDIA)

   Cybersecurity investigators have found new evidence of an ongoing cyberespionage campaign against Indian defense units and military personnel at least since 2019 with the aim of stealing sensitive information. Named the "Operation SideCopy" of the Indian company Quick Heal, the attack was aimed at the main threat team (APT) that managed to stay under the radar by "copying" the tactics of other threatening actors like SideWinder. Exploiting the Microsoft Equation Editor error The start of the campaign is an embedded email attachment - either with a ZIP file containing an LNK file or a Microsoft Word document - that triggers a series of infections through a series of steps to download the final payment. In addition to identifying three different chains of infection, it is noteworthy that one of them used a template injection with a Microsoft Equation Editor error (CVE-2017-11882), a 20-year-old memory corruption problem at Microsoft Office, which, when used succes...

LIVE Webinar on Zerologon Vulnerability Is Going To Take Place: Technical Analysis and Detection

  I'm sure most of you have now heard of a high-risk Windows server - called Zerologon - that would allow hackers to take over business networks completely. For those of you who don't know, in short, all supported versions of Windows Server applications are at risk of a serious patent infringement that resides in the Netlogon Remote Control Protocol for Domain Controllers. In other words, the primary vulnerability (CVE-2020-1472) can be exploited by the attacker to stop Active Directory services, and ultimately, the Windows domain without the need for authentication. What’s worse is that the exploitation of evidence of this error was released to the public last week, and soon after that, the attackers began exploiting vulnerabilities through programs that were not included in the wild. As explained in our compilation based on technical analysis published by Cynet's security analysts, the main problem is Microsoft's implementation of AES-CFB8, where it failed to use the ...

The Network Perimeter: This Time, It’s Personal For All Of Us.

 Botnets and IoT devices create an ideal storm for IT workers fighting for the safety of WFH staff. From a historical perspective, the state of cybersecurity will not take the high payoff away from the COVID-19 epidemic. However, one is deeply affected by the other, and only time will tell what the full collapse will be. The first six months of 2020 have seen significant progress in the world of cyber threats, and it is important for future security strategies to look at what has already happened. Most importantly, the Homework Authority (WFH) has made great strides in corporate networks almost overnight, with cyber rivals starting to exploit them for their own benefit. This has led to an increase in exploitative efforts against routers-grade routers and internet-of-things (IoT). In the first half of this year, exploitative efforts against several consumer-level routers and IoT devices were at the top of the list of acquisition of internal security systems (IPS). And then there wer...

Best Website Analytics Tools for 2021

 When it comes to web analytics tools, most marketers quickly think of Google Analytics — and Google Analytics only. While Google Analytics is a powerful analytics platform and a free tool, it is not the only analytics platform on the market, and there are many other tools that are compatible and expand what GA can do. Below, I look at some of the best website analytics tools that can replace or enhance your search results with Google Analytics. 1. Tile leader We have created Leadfeeder so that marketers and sales teams can clearly see who is visiting their websites, even if site visitors never fill out a contact form or send an email. At the highest level, it works by identifying the companies that visit your site, and then getting the contact information from individual visitors to that particular company. You will also be able to clearly see which web pages your leaders are looking forward to, which will enable you or your marketing team to reach out to you through a laser-focu...

Netwalker Goes After College of Nurses' Data in Ontario

T he cybercrime Netwalker team is guilty of extracting information from the Ontario Nursing College on ransomware attacks. A screenshot of information allegedly removed by the school has been posted on the Netwalker site, where the name of the school has been added to the number of injured people in the group. In a heated statement released yesterday, the school saw that it was affected by network security but did not indicate what had happened. The proclamation reads: "The College of the Nurses of Ontario (CNO) is currently pursuing normal operations following a network security incident. With the never-ending release of this episode on September 8, CNO found a way to prevent this incident and took over network protection. in a far-reaching legal examination. " As a result of this episode, the various administrations provided by the CNO are not easily accessible, including the public Register Find a Nurse, the Nursing Rehabilitation Center and the entrance gate. The CNO sai...