23 Dec, 2024

Dell investigates data breach claims after hacker leaks employee info

Dell has confirmed to GeekFeed that they are investigating recent claims that it suffered a data breach after a threat actor leaked the data for over 10,000 employees. The allegations were published yesterday by a threat actor named “grep,” who alleges that the computing vendor suffered a “minor data breach” in September 2024, exposing internal employee and […]

1 min read

How to Enable Game Mode on iPhone in iOS 18

Apple finally takes action with Game Mode in iOS 18. Yes, this is the first time that Apple added a dedicated mode that aims to maintain high frame rates and reduce audio latency for an unmatched gaming experience on an iPhone. Unarguably, Game Mode is gonna be one of the best iOS 18 features for gaming enthusiasts. […]

4 mins read

HyperOS 2.0 New Update Might Come to These Xiaomi Devices

Xiaomi is gearing up for the HyperOS 2.0 launch, with a potential release set for October. Xiaomi fans are eagerly waiting for this update, but every device won’t make the cut. Only select models from Xiaomi and its sub-brands, Redmi and Poco, will receive the highly anticipated HyperOS 2.0 upgrade. The Chinese brand hasn’t officially announced anything […]

4 mins read

Redmi Note 14 Pro 5G & POCO X7 officially confirmed, coming soon

Shortly before the unveiling of the Redmi Note 14 series, new information continues to emerge. The GeekFeed team has spotted the Redmi Note 14 Pro 5G and POCO X7 in the IMEI database. Both smartphones will have similar specifications. This suggests that the POCO X7 is a rebranded Redmi Note 14 Pro 5G. Of course, there will […]

3 mins read

Clever ‘GitHub Scanner’ campaign abusing repos to push malware

A clever threat campaign is abusing GitHub repositories to distribute the Lumma Stealer password-stealing malware targeting users who frequent an open source project repository or are subscribed to email notifications from it. A malicious GitHub user opens a new “issue” on an open source repository falsely claiming that the project contains a “security vulnerability” and urges […]

4 mins read

Unexplained ‘Noise Storms’ flood the Internet, puzzle experts

Internet intelligence firm GreyNoise reports that it has been tracking large waves of “Noise Storms” containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose. These Noise Storms are suspected to be covert communications, DDoS attack coordination signals, clandestine command and control (C2) channels of malware operations, or the result […]

2 mins read

Police dismantles phone unlocking ring linked to 483,000 victims

A joint law enforcement operation has dismantled an international criminal network that used the iServer automated phishing-as-a-service platform to unlock the stolen or lost mobile phones of 483,000 victims worldwide.  The global operation, codenamed “Operation Kaerb,” began in 2022 after Europol received information from cybersecurity firm Group-IB, which contributed to identifying the victims and the criminals behind […]

2 mins read

Google Password Manager now automatically syncs your passkeys

Google announced that starting today, passkeys added to Google Password Manager will automatically sync between Windows, macOS, Linux, Android, and ChromeOS devices for logged-in users. Passkeys, which use biometric authentication such as fingerprints, facial recognition, or screen locks, provide a more secure and convenient alternative to traditional passwords, significantly reducing the risk of data breaches. […]

2 mins read

Ivanti warns of another critical CSA flaw exploited in attacks

Today, Ivanti warned that threat actors are exploiting another Cloud Services Appliance (CSA) security flaw in attacks targeting a limited number of customers. Tracked as CVE-2024-8963, this admin bypass vulnerability is caused by a path traversal weakness. Successful exploitation allows remote unauthenticated attackers to access restricted functionality on vulnerable CSA systems (used as gateways to provide enterprise users secure […]

3 mins read

Tor says it’s “still safe” amid reports of police deanonymizing users

The Tor Project is attempting to assure users that the network is still safe after a recent investigative report warned that law enforcement from Germany and other countries are working together to deanonymize users through timing attacks. The team behind the specialized web browser claims that adequate protections are in place for those using the […]

3 mins read