Enjoy 30 Hours of Uninterrupted Entertainment with KDM G1-X30 Wireless Neckband Earphones

March 30, 2020

  • The earphones support talk-time of up to 35 hours with a single full charge for 2-3 hours
  •  Lightweight yet powerful neckband earphone offers powerful bass performance for all types of music



Mumbai, India – March 30, 2020 – KDM, a brand committed to providing premium audio products at affordable prices, recently launched the KDM G1-X30 wireless neckband earphones which deliver uninterrupted entertainment of upto 30 hours. The neckband is inbuilt with a high-quality battery of 260mAh which supports the long hour performance. The earphones support an enhance talktime of upto 35 hours with a single charge. The neckband is designed with high-precision speakers to deliver incredible clarity with the breathtaking audio experience. The neckband comes equipped with Bluetooth version 5.0 for wireless connectivity. It features a lightweight and sturdy design and a flexible neckband.

KDM G1-X30 wireless neckband earphones come across as the perfect choice for those with an active & uncompromising lifestyle. It is a gadget that will surely bowl you over with its oozing style, superlative comfort and exceptional & energetic sound that takes the whole listening experience to the next level. With inbuilt 260 mAh battery capacity, it offers 30 hours of music playback on a single charge and a 600-hours standby duration once fully charged” said, N D Mali, Managing Director at KDM.

Designed for music lovers, KDM G1-X30 wireless neckband earphones feature an optimized Bluetooth chipset that enables a faster transmission and a more stable connection during daily activities like exercising, working, or traveling. The device comes with -42dB mic sensitivity and stunning technology of noise-isolation, noise-canceling which delivers strong audio performance, with robust bass, bright highs, and HiFi stereo sound performance. The product is engineered with a premium 260 mAh battery & exclusive power management technology, that offers 30 hours of music playback and 35 hours back of time talk, 600 hours of standby. The new optimized stable Bluetooth chip enables compatibility with a wide range of smartphones, tablets, laptops, gaming devices, and other Bluetooth. Additionally, it features a frequency response of 20Hz-20kHz and 102dB sensitivity at 1kHz. KDM G1-X30 is sported with an aesthetical design, which not only looks attractive but also gives a premium impression. The neckband can be charged to full in less than 2 hours and can be worn all day long without causing any discomfort. It is available in white and black colors. The product comes with 1 unit of Neckband, USB cable, and a warranty card.

Price, Availability, and Warranty

KDM G1-X30 Neckband comes with an MRP of Rs. 12,99/- and is readily available for purchase at retail stores across India.

# # #

About KDM

KDM TELECOM SOLUTIONS PVT LTD is spread across India providing the best mobile phone accessories & gadgets under the brand name of KDM. We have More than 1500 dealers and distributors network across India. We believe that we will achieve a Stiff & competitive market by providing the best Services & excellent quality products at competitive prices. Our R&D team always strives to innovative products, that customers have never experienced before, KDM believes to maintain excellent quality, competitive prices, on-time delivery, and aggressive technical support. We are dedicated to delivering the market with complete and satisfactory solutions. www.kdmindia.in.

Array Networks Emerges as the Leader in Indian ADC Market, Reports IDC

March 30, 2020

Bengaluru, India – March 30, 2020

 Array Networks Inc. today announced that it has secured first position in the application delivery controller (ADC) market in India for Q4 2019. Array gained a market share of 28.2 % in Q4 2019 from 22.6% during the same quarter last year, as per the India Application Delivery Controller Market Report: Q4 2019 by International Data Corporation (IDC) which was released this week.

We are elated to see that enterprises are opting for Array’s solutions over popular international ADC vendors. Customers recognize the added edge we provide through our compatible products and solutions which can easily be merged with the client’s existing infrastructure and software. We have been successful in carving out a niche with a varied portfolio of clients and we aim to strive tirelessly to solve performance and complexity challenges for businesses moving toward virtualized networking, security and application delivery,” said Shibu Paul, Vice PresidentInternational Sales at Array Networks.

This significant growth predominantly comes from Array’s latest wins and businesses secured in the government, banking and large enterprise sector. Array is currently working on state-driven programs including Smart Cities projects and aims to create new and improved products in ADC and security for the Indian market. Array’s ADCs are engineered to boost application performance in modern data center, cloud and virtual environments and ensures quick ROI for service providers, enterprise and public sector organizations.

According to the IDC report, Indian ADC market stands at $11.3 million in Q4 2019. Increasing efforts from enterprises to enhance business agility and mobility, involving application delivery network solutions, are anticipated to fuel the demand for ADN. Rising investment in Digitalization is defining the next wave of ADC. The end-users of ADC such as BFSI, healthcare, and IT are increasing rapidly in India. High Adoption of AI, IoT, and Software-Defined Technologies along with growth in internet traffic are compelling ADC providers to continuously innovate and make strategic mergers and acquisitions to gain competitive advantages over other players.

# # #

About Array Networks

Array Networks solves performance and complexity challenges for businesses moving toward virtualized networking, security and application delivery. Headquartered in Silicon Valley, Array addresses the growing market demand for Network Functions Virtualization (NFV), cloud computing, and software-centric networking. Proven at more than 5,000 worldwide customer deployments, Array is recognized by leading analysts, enterprises, service providers and partners for pioneering next-generation technology that delivers agility at scale. Visit:  www.arraynetworks.com to know about Network Functions Virtualization (NFV), cloud computing, and software-centric networking.

Malware authors and scammers adapt to current events

March 30, 2020


Carl Leonard

Principal Security Analyst


Cyber criminals are opportunists that continuously evolve their methods of attack. And, as history has shown us, the bigger the global visibility of a cyber-attack opportunity – be it government elections, religious holidays or global events such as we find ourselves in today – bad actors employ every tool in their arsenal to make the most of every attack opportunity.

According to the World Health Organization, email attacks impersonating that organisation have increased two-fold since the beginning of March. And this is just one of many examples of current cyber-attacks posing as a trusted global organization, as every nation in the world is trying to manage through these unprecedented times.

Taking optimal advantage of world events, we are seeing trends of cyber attackers leaning into social-engineering that utilizes popular keywords – such as Coronavirus and COVID-19 – to execute online scams, phishing and malware attacks.

Following is an overview of recent global cyber-attack trends Forcepoint has been tracking to give you a view into what to look out for and how to protect yourself against impending cyber-attacks that take advantage of today’s global climate.

Standard Phishing

Phishing related campaigns have one goal – tricking people into entering their personal details or valuable credentials into a fake application or on a “legitimate” looking web site. Our first subject under analysis is pretending to be a missed call about a COVID-19 update. The email contains no text in the message body, but rather an attachment with an .htm” extension.

Figure 1 – Missed call email example


Upon a closer look, the attachment is indeed a simplistic HTML file with the sole purpose of directing people to a suspicious looking URL.

Figure 2 – HTML attachment of the missed call email

The window title will display “Fetching your audio file” while the web page is loading, and soon we will find ourselves on a fake Outlook portal. The username will be already pre-filled, only the password is waiting to be entered. Despite all the similarities we aren’t dealing with an official Outlook portal here, look at the strange URL in the HTML attachment with the prepared email address. It’s always recommended to double check the destination we land on before entering any sensitive data.

Figure 3 – Fake Outlook landing page with pre-filled username

Different flavors of traditional spam

Trading on people’s superstitions and fear is an old technique, especially in times when we are navigating through a serious global event with far reaching impact on communities all over the world. Official, semi-official and unofficial advice is coming from every possible direction – along with a number of hoaxes.


  • How to strengthen our immune system?
  • What steps to take to prevent infection?
  • What are the natural ways to defend ourselves?
  • Which are the best masks to wear when travelling?

Figure 4 – Example of Coronavirus related spam

Most of these are valid questions to raise, however answers can vary widely, and it is easy to heed fake advice. Some of the recent spam campaigns are particularly focused on this technique. They either contain links to shady web sites and services or encourage people to buy a specific product which is supposed to help protect against Coronavirus and COVID-19.

 Figure 5 – Face mask advertisement spam

When in doubt, research similar goods from reputable websites and brands you have purchased from before. And, starting research through official global health sources such as WHO or CDC can also help with debunking what is real and what may actually be detrimental to your health.

Figure 6 – Example of Health Improvement spam

New pitch for existing malware families

The examples above are from the lesser types of evil when it comes to the level of possible harm caused. Our final subject – despite arguably looking the most authentic, takes the damage potential up a notch. The email targeted those in Italy, purportedly during the time the country’s reported cases were continuing to increase. It encourages the opening of the attached document, which it presents to be sent from the World Health Organization (WHO) with information covering all the necessary precautions against Coronavirus infections.

  Figure 7 -fake WHO precautions email targeted towards Italians

Opening the attached Microsoft Word document will result in the following screen being displayed, asking users to follow the steps of enabling macros, unless the default security settings related to them were already modified.

Figure 8 – Malicious Word attachment asking for macros to be enabled

There are several macros in the document and they are also protected by a password to prevent editing. Fortunately, that can be worked around, so let’s have a look at the famous autoopen.

Figure 9 – Content of the autoopen macro

There is “DebugClassHandler” defined in the autoopen macro which would be automatically executed upon opening the document. Investigating it deeper quickly reveals the dropping of two files: “errorfix.bat” and “Ranlsojf.jse”. The former is a standard batch file meant to open the latter with the help of Windows’s inbuilt script interpreter.

Figure 10 – Source code of DebugClassHandler

As expected, the dropped “Ranlsojf.jse” is indeed a script file, actually a complex and heavily obfuscated JavaScript. It is usually referred to as the Ostap downloader family which is known for its strong ties to TrickBot.

Figure 11 – Part of Ostap’s obfuscated JavaScript code

At the end of the execution the JavaScript code will reach out to a pre-defined C2 server for downloading further payloads. In our case it was a variant of the TrickBot infostealer malware.


Under an extended period of stress such as a world-wide pandemic, anxiety and desperation can make it easy to let one’s guard down when it comes to online threats. Cybercriminals exploit these moments by playing on fears in the hope that we will fall for their carefully crafted scams. Whenever emails related to real-life events are received, we must remain vigilant and take the time to consider their authenticity. By practicing security vigilance on a daily basis, we can mitigate the impact cyber attackers can have during global events because we’ll already be looking for their exploits.

Attacker tools, techniques and procedures remain largely the same; only the theme of the lure has changed to align with current events. If kept up to date, your web and email security stack should remain effective against these adjustments in the threat landscape.

Protection statement

Forcepoint customers are protected against this threat at the following stages of attack:

Stage 2 (Lure) – Malicious emails associated with these attacks are identified and blocked.

Stage 6 (Call Home) – Attempts to contact command-and-control servers are blocked.







%d bloggers like this: