Achive.php Technology Archives - Page 3 of 3 - The Cyber Shark Technology Archives - Page 3 of 3 - The Cyber Shark

Motorola Edge 60 Fusion Debuts with AI Magic Eraser, Circle to Search & Moto AI Tools

Motorola Edge 60

Motorola Edge 60 Fusion, launching on April 9 at ₹22,999, features a Dimensity 7400 chipset, AI-powered tools, a 6.7-inch curved display, and a 50MP OIS camera. It packs a 5500mAh battery with 68W charging, IP68/IP69 durability, and three years of OS updates. The Edge 60 Fusion, Motorola’s first smartphone in the Edge 60 series, has been released. The smartphone’s MediaTek Dimensity 7400 chipset powers a number of artificial intelligence (AI)-based functions, such as Circle to Search and the AI Magic Eraser. The Edge 60 Fusion smartphone will go on sale on April 9 for Rs 22,999. Cost and available options for the Motorola Edge 60 Fusion 256GB storage + 8GB RAM: Rs 22,999 256GB storage + 12GB RAM: Rs 24,999 Colours: Pantone Zephyr, Pantone Amazonite, and Pantone Slipstream; availability and deals for the Motorola Edge 60 Fusion Starting on April 9, the Motorola Edge 60 Fusion smartphone will be sold in India through Flipkart, the company’s official website, and a few physical stores. Customers can take advantage of a bank discount of Rs 2000 on Axis and IDFC Bank credit cards as part of the introductory promotion. As an alternative, clients can receive a Rs 2000 exchange bonus on trade-in transactions. Programs for interest-free equivalent monthly instalments (EMIs) for a maximum of six months are also available. Details of the Motorola Edge 60 Fusion The 6.7-inch, Pantone-validated curved display of the Motorola Edge 60 Fusion smartphone has a refresh rate of 120 Hz and a resolution of 1.5K. The MediaTek Dimensity 7400 chipset powers the smartphone, which also has up to 256GB of storage that can be expanded to 1TB via microSD and up to 12GB of RAM. The Motorola Edge 60 Fusion has a 50-megapixel primary sensor (Sony LYT 700C) with optical image stabilization (OIS) for imaging. A 13-megapixel ultra-wide lens that also functions as a macro camera supports the primary camera. A 32-megapixel camera sensor with 4K recording capabilities is located at the front. A 5500mAh battery powers the smartphone, which also has 68W wired charging capability. Several native “Moto AI” capabilities and Google’s gesture-driven Circle to Search are among the AI-powered features that are pre-installed on the Motorola Edge 60 Fusion’s Hello UI, which is built on Android 15. This includes “Catch Me Up” for summaries of notifications and “Pay Attention” for summarizing, translating, and transcribing content. In addition to being MIL-810H military-grade certified for durability, the smartphone boasts an IP68/69 rating for protection against dust and water intrusion. For the Edge 60 Fusion, Motorola is providing three years of operating system updates and four years of security updates. Details of the Motorola Edge 60 Fusion Display: 6.7-inch all-curved screen with Gorilla Glass 7i, HDR10+, 4500 nits of maximum brightness, 1.5K resolution, and a refresh rate of 120 Hz MediaTek Dimensity 7400 processor Storage: 256GB (expandable to 1TB) RAM: Up to 12 GB Front camera: 32MP; rear camera: 50MP primary (Sony LYT700) plus 13MP ultra-wide; battery: 5500mAh, 68W cable charging Protection: Corning Gorilla Glass 7i, IP68, and IP69

The European Commission will invest €1.3 billion in digital skills, cybersecurity, and artificial intelligence

The European Commission

The European Commission has allocated €1.3 billion to boost AI and digital ID development under the Digital Europe Programme. The funding will support AI innovation, cybersecurity, and digital skills training across the EU. A total of €1.3 billion has been announced by the European Commission to support the advancement and implementation of vital technologies in the European Commission digital ecosystem. Digital ID and artificial intelligence have emerged as key new technologies that support contemporary society. In order to compete with growth on a worldwide scale, the Digital Europe Programme (Digital) Work Programme places special emphasis on integrating artificial intelligence into society and launching new AI companies. One of the main goals of the DIGITAL work program is to increase the availability and accessibility of generative AI applications, such as expanding into the healthcare industry, as the competition for AI innovation continues to increase. The available funds will be used to assist Innovation Hubs, a network of businesses and government agencies with the technical know-how to offer advice on the adoption of AI models, implement the AI Act, and curate AI “virtual realities.” These steps are essential to advancing the EU’s objectives of building more AI “factories,” which entails facilitating the development of AI start-ups or generative AI models for commercial use. AI can strengthen cyber defences against intrusions. The EU is keen to continue developing AI defences to outperform fraud driven by AI. Furthermore, the technical capabilities of AI will support the deployment of the European Trust Infrastructure and the new EU Digital Identity Wallet architecture in Member States. “Investing in cutting-edge technologies and enabling individuals to enhance their digital competencies is the first step towards safeguarding European tech sovereignty,” stated Henna Virkkunen, Executive Vice-President for Tech Sovereignty, Security, and Democracy. With extra money, EU education and training institutes will teach digital skills to entice more talent to enter the profession. “We are making sure that new technologies—and with them, new potential—reach European citizens, businesses, and public administrations through the opportunities under the Digital European Commission Program.”

Vodafone Advances Cybersecurity for Businesses in Germany

Vodafone

Vodafone, Inc. The opening of a cybersecurity centre in Düsseldorf, Germany, was recently announced by VOD. The cybersecurity centre will provide small and medium-sized businesses (SMEs) nationwide with 24/7 protection. Vodafone has a wide range of cybersecurity products. Businesses are better equipped to withstand new cyber threats thanks to Vodafone Business Managed Security Services. The administrator may configure and keep an eye on laptops, smartphones, and other devices used by an organization thanks to Unified Endpoint Management. A risk management tool called Vodafone Business Security Assessment-Security Ratings gives companies the ability to continuously monitor and provide a comprehensive picture of any cyber threats. Organizations can respond quickly to security threats thanks to this thorough visibility and accurate evaluation of cyber health. To prevent cyberattacks, Vodafone’s cyber security centre will try to detect any dangers and efficiently activate defences. It will also provide a cyber portal that would show information about security status and prevent cyberattacks. To guarantee the smooth deployment, monitoring, and upkeep of security systems for its clients, Vodafone has more than 100 security specialists on staff and provides round-the-clock services. To further enhance security capabilities and integrate cutting-edge technologies, the organization is also actively collaborating with significant tech firms like Google, Microsoft, Lookout, CybSafe, Zscaler, and others. Additionally, Vodafone’s cyber centre will work with clients to give corporate staff the right training and resources to identify such risks. Will VOD’s Share Performance Be Driven by This Initiative? To prevent cyberattacks, big businesses with substantial financial resources set up advanced IT infrastructure. SMEs with little funding are unable to make significant investments in cyber defence. In a highly competitive corporate environment, this renders them vulnerable and disadvantageous. Cybercriminals frequently take advantage of this weakness. According to recent studies, SMEs are the target of more than 50% of cyberattacks, and it takes them around 21 days to recover. This has a huge impact on how businesses operate. The German economy relies heavily on SMEs, thus the rise in cyberattacks targeting them is concerning for the nation. Vodafone is attempting to improve the digital resilience of its SME clients nationwide by establishing a cyber security centre in recognition of this underserved market. A customer-focused strategy like this bodes well for the long-term expansion of the business. Other Stocks to Consider Inter Digital In the last four quarters, IDC’s earnings surprised by 158.41%. It is a leader in cutting-edge mobile technologies that make wireless capabilities and communications possible. The business creates and develops a broad range of cutting-edge technological solutions for usage in networks and products connected to IEEE 802, digital cellular, and wireless 3G and 4G. Celestica Inc. Many of the top original equipment manufacturers in the world rely on CLS for post-manufacturing support, competitive manufacturing technologies, and service solutions for printed circuit and system assembly. United States Cellular Corporation USM’s most recent reported quarter saw a 150% earnings surprise. To improve churn control and speed up subscriber additions, U.S. Cellular has taken proactive measures. The company wants to give consumers the greatest cellular experience possible by offering a top-notch network with nationwide coverage. It is ideally situated to facilitate the expenditure needed for network improvements, such as the introduction of 5G technology.

Mozilla Fixes a Serious Firefox Issue Like the New Zero-Day Vulnerability in Chrome

Mozilla Fixes

Mozilla has patched a critical sandbox escape vulnerability (CVE-2025-2857) in Firefox for Windows, with no evidence of active exploitation. Only a few days after Google patched a similar vulnerability in Chrome that was actively exploited as a zero-day, Mozilla has published fixes to fix a serious security weakness affecting its Firefox browser for Windows. According to descriptions, the security flaw CVE-2025-2857 is an instance of an improper handle that could result in a sandbox escape. “Following the recent Chrome , Mozilla sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC [inter-process communication] code,” an alert from Mozilla stated. “A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.” In Firefox 136.0.4, Firefox ESR 115.21.1, and Firefox ESR 128.8.1, the flaw that impacts both Firefox and Firefox ESR has been fixed. CVE-2025-2857 has not been exploited in the wild, according to any evidence. To address CVE-2025-2783, which has been used in the wild as part of attacks on Russian government agencies, media outlets, and educational institutions, Google published Chrome version 134.0.6998.177/.178 for Windows. The infection happened when unidentified victims clicked on a specifically constructed link in phishing emails and used Chrome to access the attacker-controlled website, according to Kaspersky, which discovered the activity in mid-March 2025. According to reports, CVE-2025-2783 was linked to another unidentified browser exploit to bypass the sandbox’s restrictions and accomplish remote code execution. Nevertheless, fixing the flaw successfully stops the whole assault chain. Since then, the vulnerability has been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) database, and federal agencies are required to implement the required mitigations by April 17, 2025. To protect themselves from potential threats, users are advised to update their browser instances to the most recent versions.

Microsoft Unveils Six New Agentic AI Solutions to Boost Cybersecurity

Microsoft

Microsoft launched six new Agentic AI solutions to enhance cybersecurity, focusing on phishing, data security, and identity management. These AI agents aim to automate tasks and strengthen defences against complex cyber threats. Software major Microsoft announced on March 25 its six new Agentic Artificial intelligence (AI) agents designed to autonomously assist with critical areas such as phishing, data security, and identity management. This is important as the company now processes 84 trillion signals daily, including 7,000 password attacks per second. Scaling cyber defences through AI agents is now imperative to keep pace with this threat landscape. “We are expanding Security Copilot with six security agents built by Microsoft and five security agents built by our partners—available for preview in April 2025. The relentless pace and complexity of cyberattacks have surpassed human capacity and establishing AI agents is a necessity for modern security,” the company said in a release. Microsoft launched its earlier version of Security Copilot a year ago to empower defenders to detect, investigate, and respond to security incidents swiftly and accurately. Between January and December 2024, the company detected over 30 billion phishing emails targeting customers. The volume of these cyberattacks overwhelms security teams relying on manual processes and fragmented defences, making it difficult to both triage malicious messages promptly and leverage data-driven insights for broader cyber risk management. To solve this, the latest version unveiled can handle routine phishing alerts and cyberattacks, freeing up human defenders to focus on more complex cyber threats and proactive security measures. The six Copilot agents enable teams to autonomously handle high-volume security and IT tasks while seamlessly integrating with Microsoft Security solutions. Purpose-built for security, agents learn from feedback, adapt to workflows, and operate securely—aligned to Microsoft’s Zero Trust framework. With security teams fully in control, agents accelerate responses, prioritise risks, and drive efficiency to enable proactive protection and strengthen an organization’s security posture. Moreover, as organisations rapidly adopt generative AI, there is a growing urgency to secure and govern the creation, adoption, and use of AI in the workplace. According to Microsoft’s new report, 57 per cent of organizations report an increase in security incidents from AI usage. While most firms recognise the need for AI controls, 60 per cent have not yet started.

Silk Typhoon hackers now target IT supply chains to breach networks

Silk Typhoon

Microsoft cautions that the Chinese cyber-espionage threat organization “Silk Typhoon” has changed its strategy and is now attacking cloud services and remote management tools in supply chain attacks that allow it to reach downstream clients. The tech giant has verified breaches in some sectors, including energy, government, IT services, healthcare, defence, education, and non-governmental organizations. “They [Silk Typhoon] exploit unpatched applications that allow them to elevate their access in targeted organizations and conduct further malicious activities,” says the study from Microsoft. “After successfully compromising a victim, Silk Typhoon uses the stolen keys and credentials to infiltrate customer networks where they can then abuse a variety of deployed applications, including Microsoft services and others, to achieve their espionage objectives.” Silk Typhoon storms IT supply chains In early December 2024, a Chinese state-sponsored espionage outfit called Silk Typhoon gained notoriety for breaking into the U.S. Office of Foreign Assets Control (OFAC) and collecting information from the Committee on Foreign Investment in the United States (CFIUS). Around that time, according to Microsoft, Silk Typhoon changed its strategy and began misusing credentials for identity management, privileged access management, IT providers, and RMM solutions that were stolen and compromised. These credentials were then used to get access to downstream client networks and data. According to Microsoft, the hackers look through GitHub repositories and other open sources to find credentials or authentication keys that have been released, then exploit them to compromise systems. Password spray attacks are another well-known tactic used by threat actors to obtain legitimate credentials. In the past, threat actors mostly used n-day and zero-day vulnerabilities in edge devices that were visible to the public to obtain initial access, plant web shells, and then migrate laterally via compromised RDPs and VPNs. The attackers can roam around cloud environments, steal Active Directory sync credentials (AADConnect), and abuse OAuth applications for a far more covert attack when they shift from organization-level intrusions to MSP-level compromises. Threat actors no longer use web shells and malware; instead, Silk Typhoon uses cloud apps to take data and then delete records, leaving very little evidence behind. Microsoft has noted that Silk Typhoon still uses vulnerabilities, commonly known as zero days, to gain early access in addition to its new strategies. As a zero-day penetration of corporate networks, the threat organization was most recently seen taking use of a major Ivanti Pulse Connect VPN privilege escalation issue (CVE-2025-0282). Earlier in 2024, Silk Typhoon took advantage of CVE-2023-3519, a remote code execution vulnerability in Citrix NetScaler ADC and NetScaler Gateway, and CVE-2024-3400, a command injection vulnerability in Palo Alto Networks GlobalProtect. Microsoft claims that to conduct attacks and hide malicious activity, the threat actors have established a “CovertNetwork” made up of compromised Cyberoam appliances, Zyxel routers, and QNAP devices. At the bottom of its report, Microsoft has included updated indications of compromise and detection criteria that take into account Silk Typhoon’s most recent change in strategy. Defenders are advised to incorporate the information into their security tools to promptly identify and stop any attacks.

Department of Telecommunications Issues Strong Warning Against Telecom Fraud, Enforces Harsh Penalties Under 2023 Act

Department of Telecommunications

The Department of Telecommunications (DoT) has issued a warning against the misuse of telecom resources, stressing penalties under the Telecommunications Act of 2023. The Act targets fraud, including SIM card tampering and identifier spoofing, with severe legal consequences. The misuse of telecom resources, such as altering or spoofing IP addresses, IMEI numbers, SMS headers, and mobile numbers, has been strongly warned against by the Department of Telecommunications (DoT). The Telecommunications Act of 2023, which stipulates severe penalties for violators, is violated by such actions, the DoT stressed. Growing Threat of Department of Telecommunications Fraud Telecom resources are increasingly being used by scammers for financial fraud and cybercrime. Illicitly obtained Subscriber Identity Module (SIM) cards and SMS headers have been used by criminals to transmit large quantities of bogus texts. To help hackers, some people also purchase SIM cards in their names and provide them to others, frequently without realizing it. SIM cards obtained through fraud, impersonation, or forged documents have also been reported. In certain cases, Points of Sale (PoS), which are in charge of issuing SIM cards, have allowed these unlawful purchases, thereby aiding and abetting the crime. Tampering with Telecom Identifiers: A Serious Crime Cybercriminals have also been seen changing telecommunication identifiers, such as the Calling Line Identity (CLI), sometimes referred to as a phone number, using mobile apps and other tools. Other crucial telecom identifiers, like IP addresses, IMEI numbers, and SMS headers, have also been changed to deliver fake messages and evade detection. Department of Telecommunications Act of 2023: Strict Legal Provisions The Telecommunications Act of 2023 imposes harsh penalties for offences related to telecommunications: Tampering with telecommunication identifiers is prohibited by Section 42(3)(c). Section 42(3)(e): Makes it illegal to obtain SIM cards or other telecom identifiers by deception, fraud, or impersonation. Section 42(7) overrides the 1973 Code of Criminal Procedure by declaring certain offences to be cognizable and non-bailable. Penalties: Violators may be fined up to Rs 50 lakh, imprisoned for up to three years, or both. Section 42(6): Those who aid or abet such offences face similar punishments. DoT’s Commitment to a Secure Telecom Ecosystem The Department of Telecommunications ( DoT ) reiterated its dedication to stopping telecom fraud through the use of cutting-edge security measures and guidelines. The department warned of harsh penalties for violators under the Department of Telecommunications Act of 2023 and asked citizens to be on guard. A safe and secure telecom ecosystem for all users is the goal of the strict legal framework, which also attempts to discourage fraudulent operations.

During the rise of DeepSeek, Elon Musk lost $90 billion; see what Bezos and Zuckerberg lost instead.

DeepSeek

Tech billionaires lost $94 billion as a result of the Chinese AI business DeepSeek. Larry Ellison, the billionaire and chief technology officer of Oracle, lost almost $9 billion. Elon Musk, the CEO of Tesla, is among the IT giants who have lost billions of dollars as a result of China’s DeepSeek’s breakthrough achievement this year. Fortune reports that the world’s richest person lost $90 billion. According to reports, Nvidia CEO Jensen Huang and Meta CEO Mark Zuckerberg lost $20 billion and $11 billion, respectively. Nvidia was the most severely impacted by the billion-dollar AI startup’s ascent to prominence, which led to a sell-off in the AI chip manufacturer and a $600 billion decline in its market value—one of the worst decrease in US stock prices in the history of the market, according to Bloomberg. Moreover, at the beginning of February, Bloomberg assessed Musk’s net worth to be around $433 billion, but on February 28, it decreased to $349 billion. Within the same period, Zuckerberg’s net worth plummeted from $243 billion to $232 billion. Larry Ellison, the billionaire and chief technology officer of Oracle, lost almost $9 billion. According to Fortune, DeepSeek collectively wiped off $94 billion from tech billionaires’ wallets. Despite the sharp decline in his and his company’s wealth brought on by DeepSeek, Huang lauded the Chinese firm on Nvidia’s most recent earnings call, claiming it had “ignited global enthusiasm.” “It’s a great invention, but more significantly, it has made a top-notch AI reasoning model publicly available,” he stated. For a tenth of the price, DeepSeek had unveiled a sizable language model that could compete with those of competitors like OpenAI. According to CNBC, Nvidia’s biggest clients, Meta, Amazon, Google, and Microsoft, appear unfazed and plan to spend over $320 billion on AI and data centre expansion.

Tata Technologies IT services reinstated after ransomware attack

Tata Technologies

Tata Technologies assured stakeholders that client delivery services will continue uninterrupted. A ransomware attack impacted some IT systems owned by Tata Technologies. As a result, the business temporarily suspended several IT services, but they have now resumed. It gave stakeholders peace of mind that client delivery services would go on as usual. With the assistance of specialists, the business is carrying out a sweeping investigation to determine the incident’s cause and implement the necessary corrective measures. “We are dedicated to defending the highest security and data protection standards, and are taking all necessary steps to minimise any potential risks,” the business said. This organization is regarded as one of India’s leading providers of ER&D services and provides outsourced engineering and digital modification resolves to creation clients across the globe. The Tata Electronics (TEPL) office in Hosur, Tamil Nadu, experienced a significant fire incident in September 2024. The incident is presently being investigated by forensic experts. Tata Technologies has emphasized the significance of boosting investment in upskilling programs to prepare India’s workforce for the demands of Industry 4.0 in a related development. In advance of the next Union Budget, the business presented these suggestions. Warren Harris, CEO and Managing Director, stated that policies that encourage innovation, encourage investment in cutting-edge technology, and make it easier to produce goods “in India, for India, and the To meet India’s $5 trillion economic goal, “in India, for India, and the world” is required.

Tech wrap Jan 6: OnePlus 13 launch, Samsung Vision AI for TVs, Redmi 14C

Samsung

This January brings exciting launches from top brands. On January 7, OnePlus unveils its flagship 13 series at a live event. Samsung introduces Vision AI for smarter TVs, while Xiaomi rolls out the budget-friendly Redmi 14C 5G. Realme teases its 14 Pro series 5G, launching on January 16. LG also showcases its OLED EVO TVs with built-in AI and new lifestyle projectors. Stay tuned for these groundbreaking tech releases! What to expect from the OnePlus 13 series launch on Jan 7 OnePlus, the Chinese smartphone maker, is gearing up to reveal its latest flagship smartphones in the OnePlus 13 series at the Winter Launch Event on January 7. The event will be held in person, starting at 9 PM IST, and will also be streamed live on the official OnePlus India YouTube channel. Samsung brings on-device AI features to TVs with ‘Vision AI’ At CES 2025, Samsung unveiled advanced AI technology for its 2025 TV line-up, introduced under the name “Vision AI.” These features were revealed at Samsung’s CES 2025 First Look event. The company also highlighted collaborative efforts with Microsoft and Google, integrating new functionality into its entertainment devices, including speakers and soundbars. Xiaomi has introduced the Redmi 14C 5G, a budget-friendly smartphone, in India. Powered by the Qualcomm Snapdragon 4 Gen 2 processor, the device supports dual 5G SIMs. With prices starting at Rs 9,999, the phone boasts a “Premium Starlight Design” and a glass back panel for a refined look. Realme 14 Pro series 5G launching on Jan 16 in India-inspired colorways Realme has announced the launch of its 14 Pro series 5G smartphones in India on January 16. The company also unveiled the first glimpse of the smartphones, showcasing new colors inspired by India – Bikaner Purple and Jaipur Pink. Samsung unveils AI-powered Neo QLED TVs, The Frame Pro, and more Samsung showcased a range of new entertainment devices at CES 2025 in Las Vegas, USA. Alongside its “Vision AI” features, the company introduced Neo QLED, OLED, and QLED TVs, as well as “The Frame Pro.” A new interactive triple-laser ultra-short-throw projector also made its debut. LG brings OLED EVO TVs with built-in AI, new lifestyle projectors LG unveiled its 2025 OLED Evo TV series at CES 2025, featuring innovations like the wireless OLED Evo M5 and OLED Evo G5 models. The new TVs are equipped with AI-driven personalization features designed to create customized viewing experiences. LG also introduced lifestyle projectors, adding versatility to its product line-up.