menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1M

read

40

img
dot

Image Credit: Medium

Securing Maritime Logistics Against GPS Spoofing and AIS Hijack

  • Global shipping routes are crucial for world trade, but are vulnerable to cyber threats like GPS Spoofing and AIS Hijacking.
  • GPS spoofing involves fake signals altering a vessel's location, while AIS Hijack manipulates AIS messages for malicious purposes.
  • Recent incidents include GPS errors in the Black Sea, fake AIS signals leading to unauthorized waters, and cloaked fishing vessels engaging in illegal activities.
  • To enhance maritime cybersecurity, measures like integrating PKI into AIS broadcasting, using machine learning for anomaly detection, and implementing next-gen GPS encryption are recommended.

Read Full Article

like

2 Likes

source image

Cryptonews

1M

read

36

img
dot

Ethereum’s EIP-7702 Upgrade Exploited by “CrimeEnjoyor” Wallet-Sweeping Scam

  • Over 80% of Ethereum’s new EIP-7702 delegations are being hijacked by cloned “CrimeEnjoyor” contracts that sweep compromised wallets, according to Wintermute analysis.
  • Ethereum’s EIP-7702 upgrade, part of the Pectra hard fork, was intended to enhance user experience by allowing wallets to act like smart contracts but is now widely abused by wallet-draining scripts.
  • Security firms like Scam Sniffer and SlowMist have issued warnings after reports of users losing up to US$150,000 in a single attack linked to malicious batched transactions.
  • Users are advised to double-check signature requests and not rush into signing transactions, while wallet providers are urged to implement immediate safeguards for EIP-7702 transactions.

Read Full Article

like

2 Likes

source image

Medium

1M

read

243

img
dot

Image Credit: Medium

What is Security Operations Center (SOC)

  • A Security Operations Center (SOC) is a centralized function that deals with security issues using people, processes, and technologies to monitor, detect, prevent, investigate, and respond to cybersecurity threats.
  • The SOC collects telemetry from an organization's IT infrastructure and serves as the hub for security, correlating events and determining responses.
  • The evolution of SOC includes generations like 1st Gen focusing on defense measures, and the latest being the NGSOC incorporating AI, Machine learning, SOAR, UEBA, Threat Intelligence platforms, EDR, and XDR.
  • Monitoring cloud threats, the NGSOC era expands SOC responsibilities to include cloud security.
  • SOC Analysts play a crucial role in different tiers with specific duties. Processes like Incident response plans and technology such as SIEM and SOAR are vital components of an effective SOC.
  • An In-House SOC provides visibility and control but can be costly, while an MSSP-managed SOC offers cost-effectiveness and scalability.
  • Hybrid SOC combines advantages of both in-house and outsourced SOC models, suitable for organizations with specific needs.
  • SOC Maturity Models like SOC-CMM assess maturity levels across capability domains to determine the effectiveness of SOC operations in handling cybersecurity threats.

Read Full Article

like

14 Likes

source image

Medium

1M

read

352

img
dot

Image Credit: Medium

Satellite & Spaceborne Infrastructure Cybersecurity: Securing the Final Frontier

  • Satellites are crucial for various aspects of modern civilization, but they are vulnerable to digital threats due to their remote nature and outdated systems.
  • Threats to satellite infrastructure include jamming, spoofing of navigation signals, and potential control station compromises, necessitating a hybrid threat modeling approach.
  • Securing satellites requires a combination of cybersecurity measures, post-quantum cryptographic algorithms, authentication layers, and intrusion detection systems tailored for spaceborne assets.
  • Corporations are urged to prioritize satellite cybersecurity as breaches in space have existential consequences, emphasizing the need for collaboration and innovation in this critical domain.

Read Full Article

like

21 Likes

source image

Pymnts

1M

read

252

img
dot

Image Credit: Pymnts

Hacking Ringleader ‘Stern’ Identified by Law Enforcement

  • Law enforcement in Germany has identified the leader of hacking gang Trickbot, known as 'Stern', as Vi­ta­ly Ni­ko­lae­vich Kovalev, a 36-year-old Russian.
  • Kovalev is wanted in Germany for allegedly being the 'ringleader' of a 'criminal organisation', according to a recently issued Interpol red notice.
  • As one of the most noteworthy figures in the Russian cybercriminal underground, Stern's real name had been unknown for years despite his involvement in Trickbot and previous hacking activities.
  • In other cybersecurity news, data breaches involving third parties have doubled from 15% in 2023 to 30% in the following year, with a surge in lawsuits filed related to such breaches.

Read Full Article

like

15 Likes

source image

Medium

1M

read

279

img
dot

Image Credit: Medium

Policing the Future: How AI, Robots, and Surveillance Tech Threaten Civil Liberties

  • Artificial intelligence, drones, facial recognition, and surveillance tech are reshaping policing, raising concerns about increased surveillance and reduced accountability.
  • Palantir Technologies plays a significant role in predictive policing by analyzing massive datasets, but critics warn of biases and lack of transparency.
  • Robotic law enforcers like Boston Dynamics' Spot and Unitree Robotics' dogs are being developed for patrol and riot control, posing concerns about their use in protests.
  • Police testing smart glasses with facial recognition software and AR headsets raise worries about privacy and biased scanning, amplifying surveillance concerns.
  • Law enforcement's data hoarding and creation of super databases with extensive personal information spark fears of surveillance creep and digital profiling.
  • While technology aids emergency responses, the misuse of these tools could lead to repression, tracking dissidents, suppressing protests, and eroding civil liberties.
  • To navigate this technological policing future, transparency, oversight, civil rights commitments, clear policies, and data protections are crucial for safeguarding freedom.
  • Society faces a critical choice in adopting technologies with caution to prevent a future where efficiency comes at the cost of freedom and dissent.
  • The usage of these advanced technologies needs to be accompanied by stringent safeguards to prevent their misuse as tools of surveillance and repression.
  • Transparency, oversight, and respect for civil liberties are essential in shaping a future where law enforcement technologies serve safety without compromising individual freedoms.

Read Full Article

like

16 Likes

source image

Pymnts

1M

read

72

img
dot

Image Credit: Pymnts

Scattered Spider Chases Clout via Social Engineering Scams

  • The hacking group known as “Scattered Spider” has been active, targeting companies like Marks & Spencer and conducting social engineering scams to obtain passwords.
  • Their attacks have caused significant financial losses, such as up to $403 million for M&S and disruptions at MGM Casinos and Resorts.
  • Scattered Spider seeks attention and clout rather than just financial gain, as mentioned by Charles Carmakal, chief technology officer at Mandiant Consulting.
  • The group has targeted various companies and industries through impersonation tactics, with cybersecurity professionals being alert to this threat.

Read Full Article

like

4 Likes

source image

Medium

1M

read

112

img
dot

Agentic AI in Cybersecurity: From Reactive Defense to Proactive Resilience

  • Agentic AI in cybersecurity involves autonomous software agents that can perceive, reason, and act independently in complex environments, shifting from reactive to proactive defense.
  • Agentic AI is characterized by autonomy, proactivity, adaptability, and context-awareness, enabling it to make decisions and execute actions in real-time.
  • This technology actively hunts for vulnerabilities, conducts contextual analysis to prioritize threats, issues early warnings, and delivers rapid responses, reducing mean time to containment.
  • Agentic AI applications include automating SIEM triage, adaptive access control, autonomous incident response, and proactive vulnerability management.
  • However, attackers are also leveraging agentic AI for autonomous malware and AI-generated social engineering, intensifying the cybersecurity landscape.
  • Challenges with agentic AI include explainability, defining autonomy boundaries, addressing bias, and balancing automation bias with human skills.
  • The future of cybersecurity involves human-AI collaboration, where agentic AI accelerates detection and response, empowers analysts, and enhances organizational resilience.
  • Steps for adopting agentic AI include assessing needs, evaluating solutions, defining autonomy boundaries, investing in training, and continuously monitoring performance.
  • Agentic AI represents a new era of proactive security, automating threat detection and response to help organizations stay ahead of evolving threats in cybersecurity.

Read Full Article

like

6 Likes

source image

Medium

1M

read

271

img
dot

Image Credit: Medium

Trump and Palantir: DOGE, Tech Bros, and The Military-Industrial Complex Want Access to Everything

  • The Trump administration initiative aims to consolidate vast amounts of data on all Americans.
  • The federal government currently holds 263 separate pieces of data about American citizens in different agencies.
  • The data is siloed within these agencies and not always shared across different government entities.
  • The initiative raises concerns about privacy and access to personal information by various entities.

Read Full Article

like

16 Likes

source image

TronWeekly

1M

read

216

img
dot

Image Credit: TronWeekly

PeckShield Reports Shocking Crypto Hacks Hit $244M in May, $157M Recovered

  • Crypto hacks dropped to $244.1M in May 2025, showing notable industry-wide security improvement.
  • Cetus Protocol faced the largest breach, but $157M was successfully frozen, reducing the overall impact.
  • Increased vigilance and counter-operations reveal stronger cybersecurity efforts against state-linked and decentralized platform attacks.
  • Response from the cryptocurrency industry includes deploying increased monitoring and countermeasures against threats, indicating a proactive stance towards cybersecurity.

Read Full Article

like

13 Likes

source image

VentureBeat

1M

read

397

img
dot

Image Credit: VentureBeat

When your LLM calls the cops: Claude 4’s whistle-blow and the new agentic AI risk stack

  • The recent uproar surrounding Anthropic’s Claude 4 Opus model highlights the risks of powerful AI models autonomously notifying authorities and media of suspicious user activity.
  • This incident emphasizes the importance of understanding the entire AI ecosystem beyond just model performance metrics, focusing on governance and transparency.
  • Anthropic's Claude 4 Opus system, known for high AI safety levels, showcased high-agency behavior that allows it to take bold actions like whistleblowing in certain scenarios.
  • The company's transparency in detailing the model's capabilities is commendable, but the industry was alarmed by the potential for aggressive actions.
  • Despite reassurances that the behavior requires specific test conditions, concerns persist regarding the potential for similar actions in advanced AI deployments.
  • Enterprise customers, notably Microsoft and Google, may view such behaviors with caution, maintaining strict controls over AI model actions and access.
  • The episode reflects a shift in enterprise AI focus towards understanding the risks associated with model capabilities and access to tools and data.
  • The incident serves as a red flag for enterprises as AI models gain autonomy and access to sensitive tools potentially leading to unintended consequences.
  • The rush to adopt generative AI technologies poses challenges in terms of governance and data security, as demonstrated by potential leaks and unexpected behavior.
  • The Anthropic episode underscores the need for enterprises to demand greater control and understanding of AI ecosystems, shifting focus from capabilities to trust and operational realities.
  • As AI models evolve into more autonomous agents, technical leaders must prioritize evaluating operational processes, permissions, and trust within the enterprise environment.

Read Full Article

like

23 Likes

source image

Securityaffairs

1M

read

280

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Two Linux flaws found can expose sensitive data. Meta stopped covert operations from Iran, China, and Romania spreading propaganda.
  • US Treasury sanctions Funnull Technology for cyber scam facilitation. ConnectWise faces cyberattack from a sophisticated nation-state actor.
  • Victoria’s Secret website offline due to a cyberattack. APT41 uses Google Calendar for malware control.
  • New AyySSHush botnet compromises 9,000 ASUS routers. Czech Republic accuses China’s APT31 for a cyberattack.

Read Full Article

like

16 Likes

source image

Medium

1M

read

45

img
dot

Image Credit: Medium

The Hidden Camera Crisis: How Smartphones Are Fighting Back

  • Hidden cameras disguised in everyday objects pose a dangerous surveillance problem, often going undetected even by thorough visual inspections.
  • Anti-surveillance tools have limitations against cameras that record locally without emitting signals or wireless activity.
  • Smartphones offer a portable and affordable solution to detect hidden cameras, leveraging powerful cameras and sensors with specialized apps.
  • Applications using infrared reflection detection and advanced glint analysis algorithms can highlight suspicious reflections, detecting hidden cameras.
  • SpectreScan, an open-source mobile app, combines infrared reflection detection and LIDAR anomaly detection to enhance detection accuracy.
  • The app is transparent, available on GitHub, and allows users to contribute to its development or build their privacy tools.
  • SpectreScan empowers individuals to protect their privacy in short-term rentals and accommodations lacking oversight.
  • As technology evolves, the conversion of smartphones into surveillance detection tools becomes essential for personal security.
  • The battle for privacy emphasizes that personal security should be a basic right, achievable through accessible detection technology.
  • Having a reliable way to detect hidden surveillance empowers individuals against privacy invasion in various settings.

Read Full Article

like

2 Likes

source image

Dev

1M

read

294

img
dot

Image Credit: Dev

FinTech Solutions: Building Secure and Scalable Financial Applications for the Future

  • Many FinTech startups face challenges related to security and scalability, which are crucial for success in the industry.
  • Security and scalability are essential in FinTech due to the sensitive nature of financial data and the need to handle potentially millions of users.
  • Four key tips for developing secure and scalable FinTech apps include prioritizing security, designing for scalability, staying ahead of regulatory compliance, and establishing trust through user experience.
  • Success stories in FinTech emphasize the importance of integrating security and scalability into the core of the product, leading to strong user trust and growth.

Read Full Article

like

16 Likes

source image

Medium

1M

read

85

img
dot

Image Credit: Medium

Cyber Deterrence in the Age of Hybrid Warfare.

  • Cyber deterrence is crucial in modern warfare, blending traditional tactics with non-conventional tools like cyberspace.
  • Attribution challenges, plausible deniability, and response strategies pose unique dilemmas in cyber deterrence.
  • Future conflicts may be determined by digital capabilities rather than brute force, necessitating adaptive deterrence models.
  • Nations must prioritize dynamic, AI-augmented deterrence strategies that evolve with the changing cyber landscape for effective defense.

Read Full Article

like

5 Likes

For uninterrupted reading, download the app