menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

TechBullion

20m

read

45

img
dot

Image Credit: TechBullion

Beyond the Burn: How FUNToken’s Deflationary Engine Powers Real Utility

  • FUNToken implements a unique deflationary engine for sustained utility and engagement.
  • Revenue-backed token burns are integrated into a gaming ecosystem, boosting utility and value.
  • The project executed its largest burn, removing 25 million tokens to reinforce scarcity.

Read Full Article

like

2 Likes

source image

The Register

22m

read

67

img
dot

Image Credit: The Register

Qantas begins telling some customers that mystery attackers have their home address

  • Qantas revealed that a cyberattack on a third-party platform exposed personal information of 5.7 million individuals.
  • Affected data includes names, email addresses, frequent flyer numbers, customer tiers, status credits, and points balances.
  • Additional data accessed by cybercrooks in about one million cases included addresses, dates of birth, phone numbers, genders, and meal preferences.
  • Qantas has increased security measures, notified affected customers, and is monitoring for potential dark web data leaks.

Read Full Article

like

3 Likes

source image

Ars Technica

28m

read

73

img
dot

Image Credit: Ars Technica

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

  • A critical vulnerability in Citrix's network management devices has been actively exploited for more than a month, despite the vendor's advisories stating otherwise.
  • The vulnerability, tracked as CVE-2025-5777, is similar to a previous flaw known as CitrixBleed, which led to the compromise of 20,000 Citrix devices two years ago.
  • Citrix disclosed the newer vulnerability and released a patch on June 17 but stated they were 'currently unaware of any evidence of exploitation', while researchers found evidence of active exploitation since at least June 23.
  • Security firms have criticized Citrix for withholding indicators that could help customers determine if their networks are under attack, stating that merely patching vulnerable devices is not enough and that customers should look for signs of compromise.

Read Full Article

like

4 Likes

source image

Tech Radar

1h

read

110

img
dot

Image Credit: Tech Radar

Many workers wouldn't tell their bosses if they'd been hit by a cyberattack

  • Two in five office workers in the UK would not inform their company's cybersecurity teams if they suspected a cyberattack at work, citing worries of being blamed or getting into trouble.
  • Despite a good understanding of cyberattacks, with 43% of UK workers knowing about ransomware, workers often choose to remain silent about potential cyber threats.
  • Factors like embarrassment over being blamed (17%) or causing a fuss (15%) contribute to workers not reporting cyber incidents, despite data showing the high cost and risks associated with delays in incident response.
  • Cohesity stresses the importance of a workplace culture that encourages employees to speak up about cyber threats, supported by cybersecurity training and a holistic approach to cyber resilience.

Read Full Article

like

6 Likes

source image

Medium

2h

read

160

img
dot

Image Credit: Medium

The Daily Tech Digest: 09 July 2025

  • Join our diverse community on various platforms for updates and content.
  • AI and Machine Learning see advancements with OpenAI's aggressive talent acquisition.
  • Grok chatbot generates antisemitic content, emphasizing algorithmic ethics and oversight needs.
  • Generative AI revolutionizes shopping experience during Prime Day sales.

Read Full Article

like

8 Likes

source image

Tech Radar

2h

read

231

img
dot

Image Credit: Tech Radar

M&S thinks it might finally know what caused cyberattack - but still won't say if it paid a ransom

  • M&S believes the recent cyberattack was carried out by the group DragonForce, originating from Asia or Russia.
  • M&S Chairman Archie Norman emphasized the need for greater transparency regarding cyberattack reporting at a UK Parliament hearing.
  • The initial breach involved social engineering, with an attacker impersonating an M&S worker to reset an employee's password.
  • 150GB of data was stolen in the cyberattack, recovery efforts ongoing with full recovery expected by October or November 2025.

Read Full Article

like

13 Likes

source image

Securityaffairs

3h

read

83

img
dot

Image Credit: Securityaffairs

Hackers weaponize Shellter red teaming tool to spread infostealers

  • Hackers exploit leaked Shellter Elite copy for infostealer attacks, bypassing security measures.
  • Elastic Security Labs identifies malware campaigns using Shellter for evasion and malware deployment.
  • Dynamic unpacker released by Elastic to detect and analyze SHELLTER-protected malware more effectively.
  • Threat actors adopt Shellter for infostealer attacks, prompting efforts to counter abuse.

Read Full Article

like

5 Likes

source image

Fintechnews

3h

read

183

img
dot

Image Credit: Fintechnews

Crypto Hacks Already Cost US$2.1 Billion in 2025 as State Attacks Rise

  • In the first six months of 2025, the crypto industry suffered over US$2.1 billion in losses due to hacks and exploits across 75 incidents.
  • State-sponsored actors are increasingly targeting critical financial infrastructure in the crypto space, exploiting its borderless and currently unregulated nature.
  • The Bybit breach, attributed to North Korean hackers, resulted in over US$1.5 billion in losses, showcasing the intensity and speed of cyberattacks in the crypto realm.
  • Crypto crime is evolving into a geopolitical tool, with state-aligned groups like Gonjeshke Darande from Iran using digital asset theft for symbolic or political motives.

Read Full Article

like

10 Likes

source image

VentureBeat

4h

read

151

img
dot

Image Credit: VentureBeat

Hugging Face just launched a $299 robot that could disrupt the entire robotics industry

  • Hugging Face launches $299 Reachy Mini robot democratizing robotics development.
  • Robot combines AI with robotics, aiming to challenge industry's closed-source, high-cost model.
  • Emphasizes accessibility, packs advanced features like body rotation, multiple microphones, and cameras.

Read Full Article

like

9 Likes

source image

Global Fintech Series

50m

read

201

img
dot

Image Credit: Global Fintech Series

Finastra Appoints Adam Banks to Board of Directors

  • Finastra announced the appointment of Adam Banks to its Board of Directors, bringing deep transformation expertise in financial services, cybersecurity, and infrastructure sectors.
  • Banks has extensive experience in digital transformation, having held senior roles at influential companies such as A.P. Moller–Maersk, where he led technology transformation post-cyberattack.
  • As a technology leader, Banks has also worked at companies like FINkit and Visa, providing advisory services to a diverse portfolio of firms, from top corporations to startups.
  • His appointment through Vista Equity Partners creates a pathway for talented board candidates to drive results for Finastra and other portfolio companies, marking a pivotal time for Finastra's future growth.

Read Full Article

like

12 Likes

source image

Devopsonline

55m

read

301

img
dot

Image Credit: Devopsonline

Gain the edge over security debt and strengthen cyber defences

  • Unresolved security flaws lead to 'security debt' and invite cyber-attacks on businesses.
  • Research shows that many organizations struggle with unresolved critical security flaws.
  • Accumulation of security debt can be reduced with AI solutions and proactive strategies.

Read Full Article

like

18 Likes

source image

Shinyshiny

1h

read

75

img
dot

Image Credit: Shinyshiny

Think your hotel room is safe? 5 ways hackers can target you on vacation

  • Cybercriminals can target travelers in hotel rooms, making vacations risky for personal data.
  • Ways devices can be hacked on vacation include hotel Wi-Fi vulnerabilities, USB charging ports for 'juice jacking,' insecure smart TVs, automatic connections to insecure networks, and phishing scams.
  • Safety precautions: Confirm correct Wi-Fi network, use mobile data, avoid public USB charging ports, unplug smart TVs, disable auto-connect features, and be vigilant against phishing.
  • Travelers are advised to prioritize digital security measures to protect their personal information while on vacation.

Read Full Article

like

4 Likes

source image

The Verge

2h

read

213

img
dot

Image Credit: The Verge

Activision pulls Call of Duty game after PC players are hacked

  • Activision has removed Call of Duty: WWII from the Microsoft Store and PC version of Game Pass due to reports of PC players being hacked after playing the game.
  • The outage only affects PC versions of the game from Microsoft's storefront and Game Pass, but the game remains playable on Steam, Xbox, and other platforms.
  • Reports on social media suggest that players had their PCs compromised, showing signs of remote code execution vulnerabilities after playing.
  • The issue may stem from different versions of the game with an old flaw being added to the Microsoft Store and subscription service in June. As of now, the game has not yet been reinstated.

Read Full Article

like

12 Likes

source image

Dev

3h

read

262

img
dot

Image Credit: Dev

How to Secure a Website and How SafeLine Helps

  • Securing your website is essential in today's digital landscape to protect against bots, attackers, and vulnerabilities.
  • Key strategies include using HTTPS, hardening HTTP headers, blocking common web attacks, implementing rate limiting, protecting admin panels, monitoring traffic, and self-hosting for maximum privacy.
  • SafeLine WAF can assist in enforcing HTTPS, injecting custom security headers, detecting web threats with a semantic analysis engine, and providing rate limiting and abuse protection features.
  • It offers real-time notifications, threat intelligence dashboards, and self-hosted solutions for website security without compromising privacy.
  • The article qualifies for web story generation.

Read Full Article

like

15 Likes

source image

Semiengineering

4h

read

194

img
dot

Image Credit: Semiengineering

PUFs In A Post-Quantum World

  • Quantum computing is a looming threat to current cryptographic standards, with potential to disrupt existing methods.
  • Transitioning to post-quantum cryptography may be necessary to maintain robust security in the quantum era.
  • PUF technology is highlighted as a secure option against quantum attacks, offering strong security for systems.
  • The white paper offers insights into the impact of quantum computing on security and the role of PUF products in ensuring robust security.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app