menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Medium

7d

read

299

img
dot

Image Credit: Medium

How to Learn the Basics of CyberSecurity?

  • Cybersecurity is a comprehensive system that protects against cybercrime and cyber threats.
  • Cybersecurity and its objectives include firewalls, intrusion detection, encryption, vulnerability assessment, security awareness training, incident response, endpoint security, patch management, and regulatory compliance.
  • Understanding the importance of cybersecurity is vital in today's digital landscape.
  • Various types of cyber threats include viruses, malware, phishing, ransomware, etc.
  • Best practices for cybersecurity hygiene are using strong passwords, enabling two-factor authentication (2FA), and keeping software updated.
  • Education, training, hands-on practice, staying informed, networking, collaboration, and certifications are ways to enhance cybersecurity knowledge and skills.
  • As cyber threats become more sophisticated, cybersecurity professionals are increasingly turning to advanced technologies like deep learning, programming, and machine learning (ML) to bolster their defenses.
  • Cybersecurity is a concern for everyone, and actionable steps to get started on a cybersecurity journey include enrolling in online courses and certification programs, setting up a virtual lab environment, and practicing good cybersecurity hygiene.
  • Cybersecurity is a journey, not a destination. Embrace the learning process, stay curious, and never stop exploring new ways to enhance your cybersecurity knowledge and capabilities.
  • Creating secure, strong passwords that are resistant to hacking attempts is a necessary cybersecurity practice.

Read Full Article

like

18 Likes

source image

Securityaffairs

7d

read

87

img
dot

Image Credit: Securityaffairs

Mirai botnet also spreads through the exploitation of Ivanti Connect Secure bugs

  • Threat actors exploit recently disclosed Ivanti Connect Secure (ICS) vulnerabilities to deploy the Mirai botnet.
  • Researchers from Juniper Threat Labs reported that threat actors are exploiting recently disclosed Ivanti Connect Secure (ICS) vulnerabilities CVE-2023-46805 and CVE-2024-21887 to drop the payload of the Mirai botnet.
  • The vulnerabilities include an authentication bypass issue and a command injection vulnerability, which when exploited together allow threat actors to execute arbitrary commands on vulnerable systems without authentication.
  • The discovery of Mirai botnet delivery through these exploits highlights the ever-evolving landscape of cyber threats and the need to understand and address such vulnerabilities for network security.

Read Full Article

like

5 Likes

source image

Securityintelligence

7d

read

224

img
dot

Image Credit: Securityintelligence

Social engineering in the era of generative AI: Predictions for 2024

  • Large language models (LLMs) are driving the cybersecurity threat landscape, as generative AI is used to create alarming social engineering attacks and misinformation at scale.
  • Generative AI has the potential to assist analytical and creative processes and streamline operations, but it also represents a new level of cyber risk for enterprises.
  • In the context of social engineering the potential of generative AI is particularly severe, as phishing emails created using the technology are more authentic and convincing.
  • The same applies to the creation of profile images, which are increasingly difficult to distinguish from the real thing.
  • Moreover, cyber criminals can create highly authentic personas by using these technologies to communicate through social media, email and recorded messages.
  • With more sophisticated AI models emerging, AI-created phishing and social engineering content will only become every bit as convincing, if not more so.
  • As such, cybersecurity professionals are now turning to AI to keep abreast of these developments, to incorporate AI into their security, detection and mitigation processes, with the help of generative AI to tackle issues such as malware analysis, phishing detection, prevention, threat simulation, and training.
  • Generative AI has presented new opportunities to emerging non-technical threat actors, spurning accessible ‘crime as a service'. For example, prompts created using LLMs can easily create convincing phishing emails and malicious scripts.
  • Custom open-source model training, such as Stable Diffusion or GPT4ALL, is another cause for concern, enabling experts in malware development or data science to abuse generative AI and elevate the threat level posed by professional cyber criminals.
  • Deepfake technology represents the next phase of social engineering, such as through fake videos or recordings masquerading as real conference calls. There has already been a 3,000 percent increase in deepfake fraud attempts from last year, the technology has the potential to do serious harm if it falls into the wrong hands.

Read Full Article

like

13 Likes

source image

Gbhackers

7d

read

116

img
dot

Threat Actors Accessed Cancer patients’ Data left Open by Testing Lab

  • Guardant Health, a leading cancer screening and precision medicine company, has disclosed a data breach that left sensitive patient information publicly accessible online for over three years.
  • The breach involved an employee who inadvertently exposed patient names, ages, medical record numbers, treatment details, and test results, related to samples collected in late 2019 and 2020.
  • The exposed data was accessed and copied by unauthorized third parties between September 8, 2023, and February 28, 2024, raising concerns about fraud, identity theft, and privacy violations.
  • Guardant Health now faces potential legal action, financial penalties, and loss of patient trust due to the security lapse.

Read Full Article

like

7 Likes

source image

Socprime

7d

read

178

img
dot

Image Credit: Socprime

CVE-2024-21793 and CVE-2024-26026 Detection: Exploitation of Critical F5 Central Manager Vulnerabilities Can Lead to Full System Compromise

  • Defenders have disclosed critical cybersecurity issues in F5’s Next Central Manager, which are tracked as CVE-2024-21793 and CVE-2024-26026.
  • Potential adversaries can exploit these vulnerabilities to seize control over the impacted installation and create accounts on F5 assets.
  • To detect possible exploitation attempts, SOC Prime Platform offers a set of curated Sigma rules that are compatible with various security platforms.
  • F5 recommends upgrading to the latest software version 20.2.0 to mitigate CVE-2024-21793 and CVE-2024-26026 issues.

Read Full Article

like

10 Likes

source image

Medium

7d

read

245

img
dot

Image Credit: Medium

Navigating Risks in Mobile Security

  • Mobile devices are no longer just communication tools but also repositories of our data and gateways to our finances.
  • The increasing proliferation of technology has led to a wave of digitalization, which comes with security issues that need to be addressed.
  • Mobile devices are vulnerable to malware, ransomware, and phishing attacks, which exploit their unique behaviors.
  • Network spoofing attempts and advanced forms of adware and cryptojacking are becoming increasingly prominent in the mobile domain.
  • People often fail to realize the stakes involved with a security breach on mobile and that it can have significant financial losses, reputational damage, and theft of sensitive data.
  • Individuals can enhance mobile security by updating their security protocols, learning about advanced phishing methods, and being vigilant on the authentication front.
  • The emergence of advanced technological capabilities for mobile security has introduced conveniences and upgrades but is not devoid of challenges.
  • Choosing ParadigmIT Cybersecurity can provide a Zero-Trust security model that anticipates and neutralizes threats before they can impact your business.
  • The article is written by Amogh Sundararaman.

Read Full Article

like

14 Likes

source image

Gbhackers

7d

read

296

img
dot

Cyber Attack On Data Center Cooling Systems Leads To Disruption

  • Several data center cooling system failures have led to disruptions in Australian industrial organizations.
  • Data centers rely on cooling systems to maintain optimal operating temperatures for infrastructure.
  • Recent incidents, such as chiller shutdowns at Microsoft data centers and cooling problems at a Singapore Equinix facility, resulted in service outages.
  • Recommendations include identifying critical applications, including data centers in disaster plans, and engaging with cloud providers on backup and redundancy plans.

Read Full Article

like

17 Likes

source image

Spamresource

7d

read

99

img
dot

Image Credit: Spamresource

North Korea targeting weak DMARC policies

  • North Korea has been targeting domains with weak DMARC policies for phishing attacks.
  • Domains implementing a "p=none" DMARC policy are vulnerable to spoofing.
  • Out of the top ten million domains, 1.375 million have a "p=none" DMARC policy.
  • Only 38% of domains with a "p=none" policy have a reporting address configured.

Read Full Article

like

6 Likes

source image

Securityaffairs

7d

read

79

img
dot

Image Credit: Securityaffairs

Zscaler is investigating data breach claims

  • Cybersecurity firm Zscaler is investigating allegations of a data breach after hackers offered access to its network.
  • Zscaler confirmed that there is no impact or compromise to its customer, production and corporate environments.
  • A threat actor named IntelBroker announced on a forum that they were selling access to Zscaler.
  • IntelBroker offered to sell confidential logs with credentials for $20,000 in cryptocurrency.

Read Full Article

like

4 Likes

source image

Gbhackers

7d

read

8

img
dot

SocGholish Attacks Enterprises Via Fake Browser Updates

  • Enterprises are being targeted by the malware known as SocGholish through deceptive browser update prompts.
  • This malware is spreading through fake browser updates and is causing significant security concerns for organizations.
  • The initial stage of the SocGholish attack involves compromising legitimate websites, where attackers infect malicious JavaScript code.
  • The downloaded file initiates the infection process of the SocGholish malware.
  • SocGholish uses evasion techniques to avoid detection by automated security analysis.
  • The malware spreads through multi-stage infection processes.
  • Attackers engages in hands-on activity, including the extraction of stored passwords from browsers like Microsoft Edge and Google Chrome.
  • In response to the rising threat posed by SocGholish, cybersecurity experts recommend several defensive measures.
  • The campaign underscores the critical importance of vigilance and cybersecurity hygiene in the face of increasingly sophisticated social engineering attacks.
  • By adopting recommended security measures and fostering a culture of awareness, enterprises can significantly mitigate the risk of falling victim to such deceptive tactics.

Read Full Article

like

Like

source image

Gbhackers

7d

read

404

img
dot

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

  • Researchers have discovered critical vulnerabilities in F5’s Next Central Manager, allowing attackers to gain full device control remotely.
  • The security flaw creates hidden rogue accounts on managed assets, posing a threat to organizations' network infrastructures.
  • F5 has released fixes for the vulnerabilities, identified as CVE-2024-21793 and CVE-2024-26026, in software version 20.2.0.
  • This incident highlights the ongoing challenge of securing critical network infrastructure against sophisticated cyber threats.

Read Full Article

like

24 Likes

source image

Gbhackers

7d

read

342

img
dot

Polish Government Under Sophisticated Cyber Attack From APT28 Hacker Group

  • The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28 hacking group, also known as Fancy Bear or Sofacy.
  • The campaign is targeting various Polish government institutions with a new strain of malware.
  • The attack begins with spear-phishing emails containing malicious attachments or links.
  • The malware used in this campaign is a new variant of the X-Agent backdoor, enabling the attackers to execute arbitrary commands and exfiltrate data.

Read Full Article

like

20 Likes

source image

Minis

7d

read

695

img
dot

Image Credit: Minis

Chinese man uses 4,600 phones to fake live-stream views, earns over ₹ 3 crore in 4 months

  • A Chinese man has been sentenced to one year and three months in prison and fined $7,000 for using 4,600 phones to fake live-stream views, earning over ₹3 crore in just four months.
  • Wang's scheme, known as "brushing," involved inflating viewer counts to simulate genuine interactions. He purchased phones controlled by cloud software and network equipment, profiting by selling his service to live-streamers.
  • Authorities are investigating Wang and 17 others for breaking regulations and disrupting market order. This case sheds light on the prevalence of online fraud and the measures needed to combat it effectively.

Read Full Article

like

11 Likes

source image

Medium

1w

read

16

img
dot

Image Credit: Medium

Stories of data leakage | Overkill Security

  • A US Navy contractor deliberately sabotaged a submarine's threat detection system by inserting malicious code in 2007.
  • Robert Birchum, a retired US Air Force intelligence officer, was sentenced to three years in federal prison for unlawfully possessing and retaining classified documents.
  • Harold Martin, a former NSA contractor, was arrested for stealing and retaining highly classified top-secret documents for 20 years.
  • Jerry Chun Shing Lee, a former CIA officer, was arrested for unlawful retention of national defense information, possessing notebooks containing classified information.
  • Jack Teixeira, a member of the Massachusetts Air National Guard, pleaded guilty to leaking highly classified military documents on a social media platform.

Read Full Article

like

1 Like

source image

Siliconangle

1w

read

317

img
dot

Image Credit: Siliconangle

Zscaler addresses rising phishing threats and AI security challenges

  • During the RSA Conference, concerns were raised about the use of AI in cyber attacks.
  • Zscaler Inc. addresses the rising phishing threats and the need to secure AI technologies.
  • Zscaler blocked 2 billion phishing attempts and observed a 60% increase in phishing attacks last year.
  • To combat the threat, Zscaler leverages AI to analyze logs and detect compromised users.

Read Full Article

like

19 Likes

For uninterrupted reading, download the app