menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1h

read

229

img
dot

Image Credit: Medium

Online Sale For Local VPN

  • with internet browsing safety becoming more crucial, Virtual Private Networks (VPNs) provide an extra layer of protection against cybercriminals.
  • NordVPN, the industry's leader, offers servers across the globe and is user-friendly.
  • The advanced technology of NordVPN actively shields against malware and encrypts data, ensuring privacy and personal data control.
  • It is compatible with different devices, including smartphones, tablets, and laptops.
  • The VPN blocks ads and thwarts data trackers, even offering a password manager that generates and securely stores passwords.
  • NordVPN is designed to suit different user needs and is affordable, making it a perfect choice for anyone seeking to secure their online activity.
  • As a bonus, the upcoming Black Friday sale offers a 70% discount and a three months free deal, the perfect time to consider NordVPN.
  • Take advantage of promotions like this one to secure your online activity.
  • Subscribe to NordVPN to enjoy enhanced privacy and let cyber threats no longer hold you back from exploring the online world.
  • A safe internet experience means you can enjoy surfing the web, shopping online or catching up on your favorite shows without any concerns.

Read Full Article

like

13 Likes

source image

Siliconangle

3h

read

315

img
dot

Image Credit: Siliconangle

Zscaler launches Zero Trust Segmentation to enhance security across branches and clouds

  • Zscaler Inc. has launched Zero Trust Segmentation, a solution that enhances security across branches and clouds.
  • Zero Trust Segmentation eliminates the need for traditional firewalls, SD-WANs, and site-to-site VPNs by turning branches, factories, and cloud environments into isolated, secure "virtual islands."
  • By connecting directly to the Zscaler cloud platform, Zero Trust Segmentation enforces business policies to prevent ransomware spread, secure IoT and operational technology systems, and reduce network complexity.
  • The offering comes in two parts: Zero Trust Segmentation for Branch and Factories, and Zero Trust Segmentation for Data Centers and Public Clouds.

Read Full Article

like

19 Likes

source image

Dev

3h

read

40

img
dot

Image Credit: Dev

Issue 70 of AWS Cloud Security Weekly

  • AWS Security Hub released 7 new security controls, bringing the total to 437.
  • AWS WAF on Amazon CloudFront now blocks requests free of charge starting from October 25, 2024.
  • Amazon Verified Permissions introduces the batchGetPolicies API for retrieving multiple policies with a single call.
  • AWS IAM now supports AWS PrivateLink in the AWS GovCloud (US) Regions for secure VPC connections.

Read Full Article

like

2 Likes

source image

Pymnts

4h

read

133

img
dot

Image Credit: Pymnts

Big Tech in Spotlight as UK Scrutinizes ‘Critical Third Parties’

  • Financial regulators in the United Kingdom have issued new rules governing "critical third parties."
  • The regulations, expected to go into effect on January 1, aim to govern major tech companies working with financial firms in the UK.
  • The new rules grant regulators more power to take action against service providers if there's a threat to the financial system.
  • The regulations require critical third parties to work with regulators during operational incidents and demonstrate how they manage security risks.

Read Full Article

like

8 Likes

source image

Dev

5h

read

82

img
dot

Image Credit: Dev

Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

  • Learn how to leverage Amazon Inspector’s integrations for real-time alerts and automated responses.
  • Integrate Inspector with AWS Security Hub to centralize vulnerability alerts and analyze security data from multiple AWS accounts and services.
  • Enable Security Hub and configure Inspector to send findings for a complete security posture of your AWS environment.
  • Integrate Inspector with EventBridge to create event rules and trigger alerts based on scan results, such as initial scan completion.

Read Full Article

like

4 Likes

source image

Securityaffairs

5h

read

279

img
dot

Image Credit: Securityaffairs

Ahold Delhaize experienced a cyber incident affecting several of its U.S. brands

  • A cyber attack affected Ahold Delhaize USA brands, disrupting Giant Food, Hannaford, their pharmacies, and e-commerce services.
  • Ahold Delhaize is a multinational retail and wholesale holding company that operates supermarkets and ecommerce sites in the US.
  • The cyber incident was detected on November 8, 2024, and security teams are investigating with the help of external cybersecurity experts.
  • Ahold Delhaize USA confirmed that all its brand stores remain open and continue serving customers.

Read Full Article

like

16 Likes

source image

Dev

5h

read

217

img
dot

Image Credit: Dev

Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

  • Istio introduces Ambient Mesh, a sidecar-free alternative to traditional service mesh architectures.
  • Ambient Mesh leverages Istio's zero-trust security features without the complexity of sidecar proxies.
  • Instead of sidecar proxies, Ambient Mesh uses ztunnels to create a secure Layer 4 overlay network.
  • Ambient Mesh reduces resource requirements, simplifies operations, and offers flexible security and traffic management options.

Read Full Article

like

13 Likes

source image

Semiengineering

6h

read

90

img
dot

Image Credit: Semiengineering

Systems-in-Package: Authenticated Partial Encryption Protocol For Secure Testing (U. of Florida)

  • Researchers at the University of Florida and University of Central Florida have published a technical paper titled "GATE-SiP: Enabling Authenticated Encryption Testing in Systems-in-Package".
  • The paper proposes GATE-SiP, an authenticated partial encryption protocol for secure testing in heterogeneous integrated Systems-in-Package (SIP) systems.
  • GATE-SiP ensures that sensitive testing data designated for a specific chiplet is only sent to the authenticated chiplet, preventing blocking, tampering, or sniffing by malicious chiplets.
  • Simulation results demonstrate that GATE-SiP protocol incurs minimal penalties on area and timing overhead, with only 6.74% and 14.31% increase, respectively.

Read Full Article

like

5 Likes

source image

Tech Radar

7h

read

0

img
dot

Image Credit: Tech Radar

US plans to support controversial cybercrime UN treaty despite fears it could be misused

  • The latest draft of the UN Cybercrime Convention faces key vote.
  • The US is set to support the treaty.
  • Human rights advocates say the convention will make it easier for authoritarian regimes to expand surveillance.
  • Concerns raised that the treaty focuses more on surveillance than protecting against cybercrime.

Read Full Article

like

Like

source image

Identityiq

3h

read

89

img
dot

Image Credit: Identityiq

What Happens to Identity Thieves When You Report Them? 

  • Identity theft can cause lasting damage to your finances, credit, and even reputation.
  • Each state has its own identity theft laws determining misdemeanor or felony charges on a case-by-case basis.
  • Reporting identity theft by someone known can be difficult for fear the victim will get the person in trouble or fear negative familial reactions.
  • It's crucial to report identity theft to stop further crimes and restore your identity.
  • The process for reporting identity theft involves reporting to the Federal Trade Commission, filing a police report, notifying the relevant agencies or organizations, and more.
  • The penalties for identity theft range from fines up to imprisonment.
  • IdentityIQ monitors credit reports and alerts you whenever suspicious activity occurs.
  • The company's team of dedicated specialists can work with you to create an action plan in case you become a fraud victim.
  • A proactive approach to identity theft can help prevent future fraud and save you from potential consequences.
  • Get started with IdentityIQ today to better protect yourself against identity theft.

Read Full Article

like

5 Likes

source image

Pymnts

4h

read

320

img
dot

Image Credit: Pymnts

CISO’s Role in Payments Starts With Risk Mitigation

  • The role of the chief information security officer (CISO) is central in protecting financial transactions and mitigating payments risk in digital payments.
  • Testing and expertise of the CISO aid in securing sensitive financial data, preventing fraud, and ensuring compliance with industry regulations.
  • Tokenization, replacing sensitive data with unique identifiers, is considered the future of cybersecurity and builds consumer trust.
  • CISOs are responsible for managing third-party risks, educating employees and customers, and continuously evolving the security playbook in the ever-expanding digital payments landscape.

Read Full Article

like

19 Likes

source image

VentureBeat

6h

read

48

img
dot

Image Credit: VentureBeat

Qwen2.5-Coder just changed the game for AI programming—and it’s free

  • Alibaba Cloud has released Qwen2.5-Coder, a new AI coding assistant.
  • The release includes six model variants, making advanced AI coding accessible to developers with different computing resources.
  • Qwen2.5-Coder's success stems from refined data processing, synthetic data generation, and balanced training datasets.
  • Unlike its closed-source competitors, most Qwen2.5-Coder models carry the permissive Apache 2.0 license, allowing free integration into products.

Read Full Article

like

2 Likes

source image

TechBullion

8h

read

310

img
dot

Image Credit: TechBullion

Revolutionizing Cybersecurity with Deep URL Profiling: Stephanie Ness’s Approach to Malware Detection

  • Stephanie Ness has pioneered research on Deep URL Profiling for malware detection.
  • Her approach leverages machine learning and AI to analyze URL structures and behaviors.
  • Ness's work is transforming cybersecurity by developing adaptive solutions and integrating them into national security frameworks.
  • She aims to refine her methodology by incorporating real-time data analysis and predictive AI models.

Read Full Article

like

18 Likes

source image

Medium

8h

read

38

img
dot

Image Credit: Medium

Magnet AXIOM and DuckDuckGo: Parsing Forensic Artifacts of Current Tabs on Android Devices

  • DuckDuckGo's mobile app on Android devices stores snapshots of the currently open tabs in a cache directory for fast loading.
  • Magnet AXIOM, a digital forensics tool, can extract and analyze these tab screenshots, providing insights into a user's recent browsing activity.
  • The cached tab previews can reveal URLs, search terms, and other identifying information visible in the snapshots, even using OCR to convert text into searchable data.
  • While these cached images offer valuable forensic insights, their accessibility is temporary, and ethical considerations regarding user privacy must be taken into account.

Read Full Article

like

2 Likes

source image

Tech Radar

8h

read

91

img
dot

Image Credit: Tech Radar

Has Pakistan begun the crackdown on "unregistered" VPNs?

  • Residents in Pakistan experienced issues accessing their VPN services due to a 'technical glitch'.
  • Pakistan Telecommunication Authority (PTA) plans to regulate VPN usage to curb misuse and security risks.
  • Proton VPN witnessed a spike in usage during the reported VPN outages.
  • While VPNs are not illegal, authorities urge VPN providers to register their services with PTA to avoid future disruptions.

Read Full Article

like

5 Likes

For uninterrupted reading, download the app