Tista Karmakar, Author at The Tech Outlook https://www.thetechoutlook.com/author/tista/ Daily Tech News, Interviews, Reviews and Updates Sun, 19 May 2024 03:58:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.thetechoutlook.com/wp-content/uploads/2019/09/cropped-favicon-1-150x150.png Tista Karmakar, Author at The Tech Outlook https://www.thetechoutlook.com/author/tista/ 32 32 The UN in India website has become more user-friendly with an improved makeover https://www.thetechoutlook.com/new-release/software-apps/the-un-in-india-website-has-become-more-user-friendly-with-an-improved-makeover/ https://www.thetechoutlook.com/new-release/software-apps/the-un-in-india-website-has-become-more-user-friendly-with-an-improved-makeover/#respond Thu, 04 Aug 2022 21:08:19 +0000 https://www.thetechoutlook.com/?p=66555 The UN in India website has become more user-friendly with an improved makeover

United Nations in India announced on their Twitter handle that they have undergone a digital makeover with “a new & improved website for the UN in India-fir for the 21st century.” The UN has supported India’s Sustainable Development Agenda of ‘Leave No One Behind’ for 2030 adopted by 193 Member States at the UN General […]

The post The UN in India website has become more user-friendly with an improved makeover appeared first on The Tech Outlook.

]]>
The UN in India website has become more user-friendly with an improved makeover

United Nations in India announced on their Twitter handle that they have undergone a digital makeover with “a new & improved website for the UN in India-fir for the 21st century.” The UN has supported India’s Sustainable Development Agenda of ‘Leave No One Behind’ for 2030 adopted by 193 Member States at the UN General Assembly Summit in September 2015. The development will include all people with a focus on economic growth for equal societies.

The website illustrates 17 resolutions taken by the Indian government for a better nation, such as No Poverty, Zero Hunger, Good Health And Well-Being, Quality Education, Gender Equality, Clean Water And Sanitation, Affordable And Clean Energy, Decent Work And Economic Growth, Industry-Innovation and Infrastructure, Reduced Inequalities, Sustainable Cities And Communities, Responsible Consumption And Production, Climate Action, Life Below Water, Life On Land, Peace-Justice And Strong Institution, and Partnerships For The Goals.

According to the website, almost 270 million people have been lifted out of multi-dimensional poverty in India while approximately 84.44% of people were provided with employment, and almost 91.38% of beneficiaries received social protection benefits under the Pradhan Mantri Matru Vandana Yojana. The UN will help India by providing technical and financial support in order to ensure that the upcoming Census will be of high quality. The UN assisted India in creating E-learning modules, and public awareness regarding the importance of education, and training manuals. The UN has committed $120 million to India supporting the Census.

The UN has also given details about its implementing partners and investing partners on the website. The website states that India will be working more towards food security, providing optimum nutrition to all, clean water, sanitation, free health, gender equality, youth development, building clean energy, urbanization, creation of more job markets, and upskilling individuals.

The website has also provided with the facility of UN India Digital Library to learn about the India UN programs in detail and the Indian Model of Sustainable Development Goals. The website will also be publishing stories both in Hindi and English language. The website is easy to access and provides details effectively via its Story and Publication.

The post The UN in India website has become more user-friendly with an improved makeover appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/new-release/software-apps/the-un-in-india-website-has-become-more-user-friendly-with-an-improved-makeover/feed/ 0
An anonymous source leaked 4TB of data from Israeli intelligence company Cellebrite https://www.thetechoutlook.com/news/security/an-anonymous-source-leaked-4tb-of-data-from-israeli-intelligence-company-cellebrite/ https://www.thetechoutlook.com/news/security/an-anonymous-source-leaked-4tb-of-data-from-israeli-intelligence-company-cellebrite/#respond Thu, 04 Aug 2022 17:36:13 +0000 https://www.thetechoutlook.com/?p=66535 An anonymous source leaked 4TB of data from Israeli intelligence company Cellebrite

An anonymous source leaked 4TB of proprietary data from Cellebrite an Israeli digital intelligence company. Cellebrite provides cybersecurity tools for federal, state, and local law enforcement as well as for companies and enterprises. The company provides services to collect, review, analyze, and manage digital data. Cellebrite Universal Forensic Extraction Device, a product of Cellebrite used […]

The post An anonymous source leaked 4TB of data from Israeli intelligence company Cellebrite appeared first on The Tech Outlook.

]]>
An anonymous source leaked 4TB of data from Israeli intelligence company Cellebrite

An anonymous source leaked 4TB of proprietary data from Cellebrite an Israeli digital intelligence company. Cellebrite provides cybersecurity tools for federal, state, and local law enforcement as well as for companies and enterprises. The company provides services to collect, review, analyze, and manage digital data.

Cellebrite Universal Forensic Extraction Device, a product of Cellebrite used by law enforcement agencies shares its code with Cellebrite Mobilogy. The anonymous source has leaked data of both Cellebrite Mobilogy and the Cellebrite Team Foundation Server. Around 3.6 TB of data has been compromised and leaked from Cellebrite Mobilogy which is mainly used for device diagnostics, content transfer, backup, and restoration. The data is being made available to journalists and researchers.

Another cyber attack targeted Cellebrite Team Foundation Server’s backup files leaking 430 GB of data. Team Foundation Server provides a collaborative environment and it has been replaced by Azure DevOps Server used to share code, track work, and ship software that uses integrated software delivery tools hosted on the platform. This data has also been made available to journalists and researchers only.

However, the anonymous source hasn’t been recognized yet and any other hacker group didn’t claim responsibility for the recent cyber attack on Cellebrite. The methods of hacking haven’t been revealed either. Although Cellebrite has been the target of several cyber attacks since 2017. In January 2017 anonymous hacker allegedly leaked 900 GB of stolen data from Cellebrite and the data contained information regarding the political situations of various countries. According to an FBI investigation in February 2017, a hacker released a large amount of cache of Cellebrite’s most sensitive data, and that involved Cellebrite hacking into older iPhones, Androids, and Blackberry smartphones. Even Callebrite has been termed as a ‘hacking firm’ previously claiming to use phone hacking technology similar to NSO Group.

Although the recent hacking event of Cellebrite has been posted by a Twitter account named Soufiane Tahiri.

The post An anonymous source leaked 4TB of data from Israeli intelligence company Cellebrite appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/news/security/an-anonymous-source-leaked-4tb-of-data-from-israeli-intelligence-company-cellebrite/feed/ 0
Tech Support Scammers now use cloaking method to attack victims https://www.thetechoutlook.com/news/security/tech-support-scammers-now-use-cloaking-method-to-attack-victims/ https://www.thetechoutlook.com/news/security/tech-support-scammers-now-use-cloaking-method-to-attack-victims/#respond Thu, 04 Aug 2022 16:31:33 +0000 https://www.thetechoutlook.com/?p=66516 The security firm says new malvertising targets, victims, using their browsing behavior

Cybersecurity firm Malwarebytes Threat Intelligence warned about a malvertising campaign that exploits Google Ad to redirect potential victims into a Windows Support Scam site where Windows Support Alert is used to get the victim’s telephone number. The attackers are observed to display fake alerts from Windows Defender to request potential victims to contact Microsoft Support […]

The post Tech Support Scammers now use cloaking method to attack victims appeared first on The Tech Outlook.

]]>
The security firm says new malvertising targets, victims, using their browsing behavior

Cybersecurity firm Malwarebytes Threat Intelligence warned about a malvertising campaign that exploits Google Ad to redirect potential victims into a Windows Support Scam site where Windows Support Alert is used to get the victim’s telephone number. The attackers are observed to display fake alerts from Windows Defender to request potential victims to contact Microsoft Support agents.

According to Malwarebytes the threat actor speculates the victim’s browsing behavior of searching any website and that is by using the website’s name rather than its URL on the address bar. The threat actor then displayed ad contents resembling the victim’s searched contents. However, when the victim clicks on the ad it redirects to a malicious website. The threat actors have managed to avoid web crawlers, bots, and VPN users and quickly gain access to the victim’s IP address. The threat actor has been observed to show legitimate content to Google while displaying different content to potential victims in this way they evade detection. The threat actor first confirms that the potential victim is actually a human and not a Google bot only then do they redirect them to the tech support scam page.

The threat actor is observed to perform two redirect operations, first is called a cloaking domain where the threat actor inspects whether to redirect to a legitimate web page or to the scam page. Only after confirming the victim’s status do they redirect to the malicious tech support scam page. Threat actors use the iframe which occupies 100% width and height of the page and displays the security alert from Windows Defender and it hides the suspicious URLs so that the victims only see .com domains. The victim is then connected to overseas tech support centers where the scammer requests the victim to download remote access tools like TeamViewer so that they can access the victims’ devices.

In view of this Microsoft Support scam recently Microsoft issued a statement to aware users of the recent advent of tech support scams. They said, “Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into necessary technical support services to supposedly fix device or software problems that don’t exist. At best, the scammers are trying to get you to pay them to “fix” a nonexistent problem with your device or software. At worst, they’re trying to steal your personal or financial information; and if you allow them to remote into your computer to perform this “fix,” they will often install malware, ransomware, or other unwanted programs that can steal your information or damage your data or device.” Microsoft has also provided detailed instructions on how tech support scams work and how to protect against them. The tech giant has clearly mentioned, “Microsoft does not send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to provide technical support to fix your computer. If you didn’t ask us to, we won’t call you to offer support.” They have also instructed the users to run a Windows Update to be secured.

The post Tech Support Scammers now use cloaking method to attack victims appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/news/security/tech-support-scammers-now-use-cloaking-method-to-attack-victims/feed/ 0
German Chambers of Industry and Commerce shut down all its websites after a ‘severe’ cyberattack https://www.thetechoutlook.com/news/security/german-chambers-of-industry-and-commerce-shut-down-all-its-websites-after-a-severe-cyberattack/ https://www.thetechoutlook.com/news/security/german-chambers-of-industry-and-commerce-shut-down-all-its-websites-after-a-severe-cyberattack/#respond Thu, 04 Aug 2022 16:28:31 +0000 https://www.thetechoutlook.com/?p=66506 German Chambers of Industry and Commerce shut down all its websites after a 'severe' cyberattack

The Association of German Chambers of Industry and Commerce (DIHK) is a German guild that has been forcefully shutting down its IT systems and digital services like telephones, and email servers because of a cyberattack. DIHK represents 79 chambers under German law and provides political influence to trade unions. DIHK comprises over three million members […]

The post German Chambers of Industry and Commerce shut down all its websites after a ‘severe’ cyberattack appeared first on The Tech Outlook.

]]>
German Chambers of Industry and Commerce shut down all its websites after a 'severe' cyberattack

The Association of German Chambers of Industry and Commerce (DIHK) is a German guild that has been forcefully shutting down its IT systems and digital services like telephones, and email servers because of a cyberattack. DIHK represents 79 chambers under German law and provides political influence to trade unions. DIHK comprises over three million members involved in the business from small shops to big enterprises. So, the organization deals with several legal representatives, economic development, consultation, foreign trade, training services, and providing general support to its members.

According to the German tech news portal Heise.de the attack is investigated to be a ransomware attack with no regional focus. It has been observed to attack individual divisions in North Rhine-Westphalia, Lower Saxony, Bavaria, and Mecklenburg-Western Pomerania. The  Köln’s Chamber of Industry confirmed the attack and immediately limited access to the phone lines and its websites went offline to reduce the malware spread.

However, following the attack DIHK site shut its sites down as a precautionary measure to hinder the ransomware-led malware to infect other devices until its IT team develops a solution. The General Manager of DIHK Michael Bergman informed the public via a Linkedin post that they are taking all precautionary measures to find a solution to this “severe” cyberattack, however, they are unable to predict how long will it take for its website to resume activities again.

The post German Chambers of Industry and Commerce shut down all its websites after a ‘severe’ cyberattack appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/news/security/german-chambers-of-industry-and-commerce-shut-down-all-its-websites-after-a-severe-cyberattack/feed/ 0
Internet Explorer can still be awakened on the Windows 11 OS https://www.thetechoutlook.com/new-release/software-apps/internet-explorer-can-still-be-awakened-on-the-windows-11-os/ https://www.thetechoutlook.com/new-release/software-apps/internet-explorer-can-still-be-awakened-on-the-windows-11-os/#respond Wed, 03 Aug 2022 13:51:48 +0000 https://www.thetechoutlook.com/?p=66315 Internet Explorer can still be awakened on the Windows 11 OS

A Twitter account named Tom Warren has shed light on Microsoft’s hidden virtue awakening Internet Explorer in its Windows 11 Operating System. Microsoft announced that it would cease support for Internet Explorer on June 15, 2022, words spread like rapid fire, and Internet Explorer was announced officially dead on June 26. The whole world hosted […]

The post Internet Explorer can still be awakened on the Windows 11 OS appeared first on The Tech Outlook.

]]>
Internet Explorer can still be awakened on the Windows 11 OS

A Twitter account named Tom Warren has shed light on Microsoft’s hidden virtue awakening Internet Explorer in its Windows 11 Operating System. Microsoft announced that it would cease support for Internet Explorer on June 15, 2022, words spread like rapid fire, and Internet Explorer was announced officially dead on June 26. The whole world hosted its funeral and Twitter broke into memes with the trending hashtag InternetExplorerShutDown.

No one would have expected the undead to be awakened and now after a month, the verified Twitter handle of Tom Warren explains how Microsoft is still running Internet Explorer and preventing anyone from accessing it. According to reports Microsoft has disabled Internet Explorer in Windows 11 to create the first version of Windows Operating System without an IE. The Windows 11 Operating System is designed in such a way that if anyone tries to access the IE, the Windows will launch Microsoft Edge instead of that.

However, the Senior Editor at The Verge, Tom Warren demonstrate the ways Internet Explorer can run on Windows 11 and it is because of the “ancient” coding in parts of the Operating System. One can search Internet Options in the Start Menu and launcg Control Panel to select Programs tab. Upon selecting the tab anyone can click on “manage add-ons” and then click “Learn more about toolbars and extensions.” This will launch the Internet Explorer into the system and will help to bypass commands forcing into Microsoft Edge. Even on Windows 11 where IE isn’t suppose to be running will run like every Operating System’s nightmere as observed.

The post Internet Explorer can still be awakened on the Windows 11 OS appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/new-release/software-apps/internet-explorer-can-still-be-awakened-on-the-windows-11-os/feed/ 0
Chinese Foreign Ministry published a statement claiming that the U.S. has broken one-China sovereignty by interfering https://www.thetechoutlook.com/current-affairs/politics/chinese-foreign-ministry-published-a-statement-claiming-that-the-u-s-has-broken-one-china-sovereignty-by-interfering/ https://www.thetechoutlook.com/current-affairs/politics/chinese-foreign-ministry-published-a-statement-claiming-that-the-u-s-has-broken-one-china-sovereignty-by-interfering/#respond Wed, 03 Aug 2022 12:03:10 +0000 https://www.thetechoutlook.com/?p=66288 Chinese Foreign Ministry published a statement claiming that the U.S. has broken one-China sovereignty by interfering

The U.S. House Speaker Nancy Pelosi’s visit to Taiwan has sparked controversies and criticism from the territory of mainland China. Chinese Foreign Ministry spokesperson said today that Pelosi visiting Taiwan is not about democracy rather it is an issue about China’s sovereignty and territorial integrity. The Ministry of Foreign Affairs of the People’s Republic of […]

The post Chinese Foreign Ministry published a statement claiming that the U.S. has broken one-China sovereignty by interfering appeared first on The Tech Outlook.

]]>
Chinese Foreign Ministry published a statement claiming that the U.S. has broken one-China sovereignty by interfering

The U.S. House Speaker Nancy Pelosi’s visit to Taiwan has sparked controversies and criticism from the territory of mainland China. Chinese Foreign Ministry spokesperson said today that Pelosi visiting Taiwan is not about democracy rather it is an issue about China’s sovereignty and territorial integrity. The Ministry of Foreign Affairs of the People’s Republic of China has issued a statement today where they claimed that the Speaker of the U.S. House of Representative Nancy Pelosi has violated the one-China principle and the provisions regarding the China-U.S. joint communiqués after visiting the Taiwan region.

According to the statement, it has trembled the foundation of China-U.S. relations and disputed Chinese sovereignty and territorial integrity as it will provoke the separatist forces to initiate ‘Taiwan Independence’ which is strongly opposed by China. As Taiwan is an “inalienable part of China’s territory,” and is represented by the Government of the People’s Republic of China as a whole Chinese nation. The statement has also claimed that this has been recognized by the United Nations General assembly Resolution 2758 of 1971 and 181 countries who have tied diplomatic relations with China on the basis of their one-China principle.

According to the statement in 1979, the United States also made a commitment while signing diplomatic relations as a part of the China-U.S. Joint Communiqué which states, “The United States of America recognizes the Government of the People’s Republic of China as the sole legal Government of China. Within this context, the people of the United States will maintain cultural, commercial, and other unofficial relations with the people of Taiwan.” According to the commitment the U.S. is obliged to maintain the one-China policy and should abstain from having any official exchanges with China’s Taiwan region.

The statement also claimed that China has opposed the U.S. Congressmembers from visiting China all along and the U.S. executives will also stop such activities as per the commitment.

The post Chinese Foreign Ministry published a statement claiming that the U.S. has broken one-China sovereignty by interfering appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/current-affairs/politics/chinese-foreign-ministry-published-a-statement-claiming-that-the-u-s-has-broken-one-china-sovereignty-by-interfering/feed/ 0
Ultrahuman Ring is the first ever real-time metabolic tracker available in India https://www.thetechoutlook.com/new-release/gadgets-release/ultrahuman-ring-is-the-first-ever-real-time-metabolic-tracker-available-in-india/ https://www.thetechoutlook.com/new-release/gadgets-release/ultrahuman-ring-is-the-first-ever-real-time-metabolic-tracker-available-in-india/#respond Wed, 03 Aug 2022 11:38:20 +0000 https://www.thetechoutlook.com/?p=66265 Ultrahuman Ring is the first ever real-time metabolic tracker available in India

The Ultrahuman Ring is India’s first metabolism tracker wearable developed by a Banraluru-based start-up company with the same name Ultrahuman. The tech-based startup company has revolutionized technology in their latest innovative wearable that is designed to provide real-time metabolic biomarkers data. The Ultrahuman ring will measure movement, sleep, and body’s energy dynamics in real-time for […]

The post Ultrahuman Ring is the first ever real-time metabolic tracker available in India appeared first on The Tech Outlook.

]]>
Ultrahuman Ring is the first ever real-time metabolic tracker available in India

The Ultrahuman Ring is India’s first metabolism tracker wearable developed by a Banraluru-based start-up company with the same name Ultrahuman.

The tech-based startup company has revolutionized technology in their latest innovative wearable that is designed to provide real-time metabolic biomarkers data. The Ultrahuman ring will measure movement, sleep, and body’s energy dynamics in real-time for delivering biomarkers data. The ring will also be providing you with recuperation advice to help live a healthier life.

The Ultrahuman Ring works like magic with no screen or unnecessary vibrations or constant pop-up notifications instead it lets the wearer check the associated app to measure data regarding the metabolism. The Ring can be charged once to wear for successive 5 days as it holds a strong battery life. It can endure tough weather situations, be it rain or heat.

Ultrahuman’s co-founder Mohit Kumar and CEO Vatsal Singhai say that the product can work alone or in combination with Ultrahuman M1, the advanced glucose monitoring platform. They further add that they understand biomarkers have the capacity to provide optimum data about someone’s health and the company has built its product keeping that in mind. The ring will also be giving the wearer insight into the impact of glucose metabolism from sleep deprivation. The real-time biomarkers are helpful in producing data in regards to the activity the wearer is involved in. The Ultrahuman Ring is available at only INR 18,999 such a cheap cost for maximum health.

The post Ultrahuman Ring is the first ever real-time metabolic tracker available in India appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/new-release/gadgets-release/ultrahuman-ring-is-the-first-ever-real-time-metabolic-tracker-available-in-india/feed/ 0
US House Speaker Nancy Pelosi remarked China’s criticism of her is actually deep-rooted patriarchy https://www.thetechoutlook.com/current-affairs/politics/us-house-speaker-nancy-pelosi-remarked-chinas-criticism-of-her-is-actually-deep-rooted-patriarchy/ https://www.thetechoutlook.com/current-affairs/politics/us-house-speaker-nancy-pelosi-remarked-chinas-criticism-of-her-is-actually-deep-rooted-patriarchy/#respond Wed, 03 Aug 2022 09:50:08 +0000 https://www.thetechoutlook.com/?p=66253 US House Speaker Nancy Pelosi remarked China's criticism of her is actually deep-rooted patriarchy

U.S. House Speaker Nancy Pelosi said that Chinese authorities are enraged about her visiting Taiwan not because she is the highest ranking US official but because she is a woman. Nancy Pelosi further added that several other US senators visited Taiwan recently including the chair of the foreign relations committee Democrat Bob Menendez but they […]

The post US House Speaker Nancy Pelosi remarked China’s criticism of her is actually deep-rooted patriarchy appeared first on The Tech Outlook.

]]>
US House Speaker Nancy Pelosi remarked China's criticism of her is actually deep-rooted patriarchy

U.S. House Speaker Nancy Pelosi said that Chinese authorities are enraged about her visiting Taiwan not because she is the highest ranking US official but because she is a woman. Nancy Pelosi further added that several other US senators visited Taiwan recently including the chair of the foreign relations committee Democrat Bob Menendez but they were not criticized by the Chinese authorities even for once.

Prior to the US House Speaker visiting Taiwan Chinese President Xi Jinping warned US President Joe Biden that “whoever plays with fire will get burned,” on the recent Taiwan issue. China claims the self-ruling nation Taiwan to be a part of it and a breakaway state which will eventually be annexed to China, however, Taiwan’s citizens see their nation as a separate country. Also, China’s Foreign Ministry further added that the People’s Liberation Army would not stand “idly” if Nancy Pelosi visits Taiwan.

However, Nancy Pelosi said amid the constant criticism that meeting with Taiwan’s President Tsai Ing-wen was a proud moment for women’s leadership. Pelosi said, “It’s a great pride for us today, the first woman speaker in the House meeting the first woman president of Taiwan. We have some enthusiasm for that.”

Reportedly Taiwan’s elected female politicians develop a sharp contrast with China’s patriarchal ruling Communist Party where seven men are elected as members of the Chinese Standing Committee. China’s only woman politician Sun Chunlan is a 25-member Politburo will be retiring this year in 2022.

Whereas Taiwan’s top tire leaders are women in politics who refuse to be noted by the term “female politicians.” According to the Women’s Economic Empowerment Summit in 2019 Taiwan’s President Tsai Ing-wen said, “I will not stop until the term ‘female president’ is a thing of the past” while acknowledging his position as a duty toward the nation.

Nancy Pelosi also stated that her visit has enriched her with the knowledge of who can visit the nation island and she would appreciate it if China won’t stand in the way of Taiwan visiting other nations and certain meetings.

The post US House Speaker Nancy Pelosi remarked China’s criticism of her is actually deep-rooted patriarchy appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/current-affairs/politics/us-house-speaker-nancy-pelosi-remarked-chinas-criticism-of-her-is-actually-deep-rooted-patriarchy/feed/ 0
Uber Technologies sold 7.8% stake in Zomato for $392 million https://www.thetechoutlook.com/current-affairs/business/uber-technologies-sold-7-8-stake-in-zomato-for-392-million/ https://www.thetechoutlook.com/current-affairs/business/uber-technologies-sold-7-8-stake-in-zomato-for-392-million/#respond Wed, 03 Aug 2022 08:53:34 +0000 https://www.thetechoutlook.com/?p=66243 Uber Technologies sold 7.8% stake in Zomato for $392 million

Uber Technologies has sold 7.8% of its equity in Indian food delivery firm Zomato Ltd for $392 million via a block trade, a privately negotiated securities transaction, on the local exchanges. Reports say that the deal between Uber and Zomato was executed at 50.44 rupees per share after Zomato shares fell by 9.6% to 50.25 […]

The post Uber Technologies sold 7.8% stake in Zomato for $392 million appeared first on The Tech Outlook.

]]>
Uber Technologies sold 7.8% stake in Zomato for $392 million

Uber Technologies has sold 7.8% of its equity in Indian food delivery firm Zomato Ltd for $392 million via a block trade, a privately negotiated securities transaction, on the local exchanges.

Reports say that the deal between Uber and Zomato was executed at 50.44 rupees per share after Zomato shares fell by 9.6% to 50.25 rupees on India’s Bombay Stock Exchange (BSE). The stock cut was trading down by 5.7% on 0634 GMT. On 4 July Zomato’s stock had closed at 55.6 rupees on BSE. The offer size of the block deal was set to be 612 million shares and the stake sale by Uber was approximately 30.87 billion INR. Uber also reported a net loss of $2.6 billion globally for the second quarter of 2022 including the equity investment in Zomato.

According to various reports, Indian startup companies are struggling to gain capital amid global inflation and low market value to which Uber deal comes as a sign of relief.

The post Uber Technologies sold 7.8% stake in Zomato for $392 million appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/current-affairs/business/uber-technologies-sold-7-8-stake-in-zomato-for-392-million/feed/ 0
Manjusaka implants are being used as an alternative to Cobalt Strike attack by Chinese authorities https://www.thetechoutlook.com/news/security/manjusaka-implants-are-being-used-as-an-alternative-to-cobalt-strike-attack-by-chinese-authorities/ https://www.thetechoutlook.com/news/security/manjusaka-implants-are-being-used-as-an-alternative-to-cobalt-strike-attack-by-chinese-authorities/#respond Wed, 03 Aug 2022 07:51:16 +0000 https://www.thetechoutlook.com/?p=66239 Manjusaka implants are being used as an alternative to Cobalt Strike attack by Chinese authorities

Security researchers warned that Manjusaka which is a new post-exploitation cyberattacking framework is being used as an alternative means to the Cobalt Strike toolset. Manjusaka is written in multi-paradigm Rust programming language and its binaries are written in Golang programming language designed at Google. Manjusaka has also armed with Remote Access Trojan (RAT) implants which […]

The post Manjusaka implants are being used as an alternative to Cobalt Strike attack by Chinese authorities appeared first on The Tech Outlook.

]]>
Manjusaka implants are being used as an alternative to Cobalt Strike attack by Chinese authorities

Security researchers warned that Manjusaka which is a new post-exploitation cyberattacking framework is being used as an alternative means to the Cobalt Strike toolset. Manjusaka is written in multi-paradigm Rust programming language and its binaries are written in Golang programming language designed at Google. Manjusaka has also armed with Remote Access Trojan (RAT) implants which help in command execution, file access, and network reconnaissance to run commands and receive compromised data from remote locations.

Security researchers at Cisco Talos who were investigating Cobalt Strike infection also discovered Manjusaka and observed that the threat actor used the same framework for both attacks. According to the researchers, a malicious document disguised as a COVID-19 report has infected various devices. Manjusaka implants were downloaded as EXE or ELF files instead of the Cobalt Strike toolkit. Cisco Talos researchers defined this attack as an imitation of the Cobalt Strike framework.

According to the reports of Cisco Talos, both Windows and Linux versions can be infected using this framework. As the Manjusaka implants consist of RAT and a file management module, RAT has been responsible for conducting arbitrary commands via cmd.exe to collect credentials from web browsers, WiFi SSID, and account details under respective network connections. It has been also observed to steal Premiumsoft’s Navicat credentials, inspected hardware details, and captured screenshots of currently used desktops. Manjusaka’s file management module can perform file enumeration, create directories, read or write file contents, delete files or directories, and can move files to multiple locations.

However, security officials from Cisco Talos also added that the Manjusaka is in its testing phase but the framework is highly powerful. Although the threat actor will not be using Manjusaka implants as a free version and it is a relieving sign as its use will have some restrictions. The security officials have observed its lure document is written in Chinese which states that the developers are based in China.

The post Manjusaka implants are being used as an alternative to Cobalt Strike attack by Chinese authorities appeared first on The Tech Outlook.

]]>
https://www.thetechoutlook.com/news/security/manjusaka-implants-are-being-used-as-an-alternative-to-cobalt-strike-attack-by-chinese-authorities/feed/ 0