menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1M

read

247

img
dot

Image Credit: Medium

The Cybersecurity Frontier: Market Trends and Industry Leaders

  • The global cyber security market is forecast to grow to $272bn in 2029, with Europe projected to reach $45.7bn in 2024
  • Emerging technologies such as AI, ML and blockchain provide both opportunities and challenges in the cybersecurity space
  • Governments and regulatory bodies are imposing stricter regulations, creating prime opportunities for businesses to help organizations navigate and adhere to their compliance and regulatory obligations
  • There is currently a global shortage of 4 million cybersecurity professionals, increasing to 85 million workers by 2030
  • Investment in cybersecurity has grown at a 24.4% CAGR over the past decade, consistently drawing more investment than many other sectors
  • Early-stage cybersecurity investment remained strong at over $600m annually since 2019, highlighting the strength of the cybersecurity investment thesis across Europe
  • PE and strategic acquisitions present highly sought-after exit opportunities for founders, while IPOs remain a potential avenue for growth
  • Startup Wise Guys, Kima Ventures, Mercia, IQ Capital, Entrée Capital, and TIIN Capital are leading investors at various stages of the cybersecurity market
  • Technological and regulatory tailwinds, alongside geopolitical headwinds, continue to drive innovation and resilience in the cybersecurity market, which is essential to our personal and professional lives

Read Full Article

like

14 Likes

source image

Tech Radar

1M

read

355

img
dot

Image Credit: Tech Radar

Pakistan withdraws plans for VPN ban – but usage may still be at risk

  • Pakistan's telecom body has decided not to ban VPN usage after facing legal limitations.
  • The Pakistan Telecommunication Authority (PTA) initially set a deadline to regulate VPN usage for businesses and freelancers.
  • However, the PTA extended the registration deadline and eventually withdrew the VPN ban due to lack of legal grounds.
  • While VPN usage remains accessible, there may still be challenges and concerns regarding VPN censorship in Pakistan.

Read Full Article

like

21 Likes

source image

Pymnts

1M

read

116

img
dot

Image Credit: Pymnts

Staying Safe From AI’s Surging Enterprise Threat This Cyber Monday

  • Artificial intelligence (AI) is a major concern this Cyber Monday as cybercriminals use AI-powered scams and frauds.
  • Companies like Amazon and JPMorgan have witnessed a substantial increase in hacking attempts, thanks to AI tactics.
  • AI-driven cyberattacks have become more sophisticated, targeting financial data, intellectual property, and enterprise systems.
  • Businesses are urged to prioritize proactive defenses, embrace AI-driven cybersecurity solutions, and automate their AP processes.

Read Full Article

like

7 Likes

source image

Tech Radar

1M

read

323

img
dot

Image Credit: Tech Radar

International operation sees Interpol arrest over 5000 and seize $400 million

  • Over the past five months, Interpol and its national partners conducted Operation HAECHI V, resulting in the arrest of over 5,500 individuals and the seizure of $400 million.
  • The operation targeted seven types of cyber-fraud, including voice phishing, romance scams, and investment fraud.
  • Interpol helped dismantle a voice phishing organization and stopped a crypto scam, saving a victim from wiring $42.3 million to fraudsters.
  • Law enforcement agencies from approximately 40 countries and regions participated in the operation.

Read Full Article

like

19 Likes

source image

Tech Radar

1M

read

62

img
dot

Image Credit: Tech Radar

These dangerous Android malware apps have been installed millions of times

  • Researchers found 15 predatory loan apps on the Play Store
  • These apps promise cheap and quick loans, and then extort money and harass their victims
  • The apps have since been removed
  • 15 Android apps from the SpyLoan malware family discovered and removed from the Google Play Store

Read Full Article

like

3 Likes

source image

Secureerpinc

1M

read

247

img
dot

Image Credit: Secureerpinc

Cybercriminals Exploit AI Tools for Advanced Phishing

  • Cybercriminals are using AI tools for advanced phishing attacks.
  • Hackers impersonate OpenAI in a new widespread phishing scam.
  • AI tools make it difficult for existing security systems to catch phishing messages.
  • Deepfake technology is also being used in phishing attacks.

Read Full Article

like

14 Likes

source image

Cybersecurity-Insiders

1M

read

383

img
dot

Image Credit: Cybersecurity-Insiders

AWS offers Information Security Incident Response to curtail cyber attacks

  • Amazon Web Services (AWS) introduces Security Incident Response service to aid cybersecurity teams in responding to cyber-attacks efficiently.
  • Many organizations have dedicated security response teams but lack clear leadership and coordination, leading to delays in addressing threats.
  • Cyber-attacks are estimated to cost the global economy $23 trillion by 2027, highlighting the importance of robust cybersecurity measures.
  • AWS's Security Incident Response service automates investigation, response, and resolution processes, reducing the time spent on detecting and managing security breaches.

Read Full Article

like

23 Likes

source image

Entrepreneurshiplife

1M

read

395

img
dot

Image Credit: Entrepreneurshiplife

Why Hiring IT Specialists is Critical for Future-proofing Your Business

  • Hiring IT specialists is essential for businesses to stay ahead in a rapidly shifting landscape with increasing complexities in managing technology.
  • IT specialists help businesses to strengthen cybersecurity by implementing advanced security tools and protocols, regular audits and incident response plans.
  • IT specialists focus on areas like system integration, providing scalable solutions and proactive maintenance to ensure optimal IT infrastructure.
  • IT specialists bring expertise to optimize how businesses store, access and utilize their data by performing database administration, implementing secure and scalable cloud-based storage solutions, and advanced data analytics.
  • IT specialists continuously monitor technological advancements relevant to your industry, and adapt efficiently by assessing your current systems, phasing out outdated technologies, and introducing solutions that can handle increased workloads or new operational needs.
  • Partnering with a managed services provider, such as Seattle IT services or another trusted provider in your area, ensures your business is equipped with the expertise needed to stay protected and prepared.
  • Relying on skilled IT professionals ensures your business remains flexible and well-prepared for whatever comes next, in an ever-evolving market.
  • Investing in skilled IT professionals is a smart move for any business aiming to remain competitive and efficient, providing the expertise to streamline operations, secure data, and innovate for future success.

Read Full Article

like

23 Likes

source image

Dev

1M

read

364

img
dot

Image Credit: Dev

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

  • DevOpsDays Chattanooga 2024 was a gathering of over 100 developers, DevOps enthusiasts, agile professionals, and security practitioners in Tennessee, USA.
  • The event showcased the culture of progress prevalent in the city and highlighted the importance of connection, not just between systems, but between people.
  • The keynote, delivered by Victor Frye, addressed the importance of openness, transparency, iterative improvement and a culture of accountability
  • Yvette Johns highlighted the role of the support team in uncovering product inefficiencies and gaps that go unnoticed by others. Her recommendation to foster better communication and feedback loop between support, product, and engineering teams.
  • Jodi Jones shared her insights on the challenges of effective software development and the importance of making better decisions in the face of chaos.
  • The speakers emphasized collaboration, creativity, and comradery among DevOps enthusiasts and the importance of connecting with people.
  • Ignite talks offered quick bursts of insight and inspiration with highlights including self-hosting email, and the identification of vulnerabilities through red meat attack tests and tools like Shodan and Greynoise.
  • The discussion in the Open Spaces surrounded non-human identity lifecycle management, IAM, and security teams, adding to the exchange of knowledge and ideas shared at the event.
  • DevOpsDays events like this one across the globe offer opportunities for practitioners to share knowledge, insights, and updates about their favorite tools and best practices.
  • Overall, DevOpsDays Chattanooga 2024 provided attendees with opportunities to learn, network, and exchange ideas and exemplified the forward-thinking and innovative culture of the city itself.

Read Full Article

like

21 Likes

source image

The Register

1M

read

260

img
dot

Image Credit: The Register

Discover the future of Linux security

  • Red Hat is hosting the State of Linux Security Symposium 2024, a webinar that offers practical strategies for securing Linux environments.
  • The symposium will cover topics such as the core principles of security, securing the supply chain, and the advantages of Red Hat Enterprise Linux.
  • Through real-world use cases and demonstrations, Red Hat aims to showcase its activity within the Linux ecosystem and promote open collaboration with customers for innovation and robust security solutions.
  • IT professionals from various industries can join the webinar to learn from experts and gain actionable insights to strengthen their Linux infrastructure.

Read Full Article

like

15 Likes

source image

Securityaffairs

1M

read

8

img
dot

Image Credit: Securityaffairs

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

  • The Tor Project is seeking help in deploying 200 WebTunnel bridges by the end of the year to counter government censorship.
  • Recent reports from Russia indicate increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps.
  • WebTunnel bridges are being blocked in Russia, making it necessary to deploy more bridges to provide secure access for users.
  • The Tor Project is urging the community to help by running a WebTunnel bridge, with specific technical requirements outlined in the WebTunnel guide.

Read Full Article

like

Like

source image

Siliconangle

1M

read

323

img
dot

Image Credit: Siliconangle

Skyhawk Security introduces interactive cloud threat detection for enhanced zero-trust security

  • Skyhawk Security introduces interactive cloud threat detection for enhanced zero-trust security.
  • The new capability adds real-time user interaction to verify suspicious activity, reducing load on SOCs and aligning with zero-trust frameworks.
  • The release addresses the issue of context gaps in security operations centers, making it difficult to determine if alerts are from legitimate users or attackers.
  • Interactive CDR continuously monitors cloud asset behaviors, sends notifications for deviating activities, and obtains context from asset owners or users.

Read Full Article

like

19 Likes

source image

Tech Radar

1M

read

170

img
dot

Image Credit: Tech Radar

Yet another ransomware attack - an NHS children’s hospital is the latest victim

  • Alder Hey Children's Hospital in Liverpool is investigating a ransomware attack and data breach.
  • The breach, claimed by the INC Ransom group, includes leaked donation records, procurement data, and patient's medical records.
  • The hospital confirmed that this incident is not related to the recent attack on Wirral University Teaching Hospital.
  • Alder Hey is working with the UK's National Crime Agency to verify the data impacted and understand the repercussions.

Read Full Article

like

10 Likes

source image

Wired

1M

read

17

img
dot

Image Credit: Wired

Are You Being Tracked by an AirTag? Here’s How to Check

  • Apple's AirTag Bluetooth tracker has been criticized for potentially allowing stalkers to track people, causing concerns worldwide.
  • Apple has updated firmware to reduce misuse, however, profits from being connected to Apple's ecosystem cause AirTags to remain a market-dominant option.
  • iPhone owners running iOS 14.5 or newer should receive a push alert whenever an unknown AirTag is nearby for an extended period of time and away from its owner.
  • Owners of newer iPhones should turn on Bluetooth and check their settings to ensure they’ll receive notifications.
  • Precision location data can be used to find hidden devices, but Bluetooth scanners are not reliable for tracker searching.
  • Without a device on hand, you must rely on visual and audible clues to find any hidden AirTags.
  • The best way to disable an AirTag is to remove the battery. If you believe you are in a dangerous situation, 'contact your local law enforcement'.
  • Women are often the victims of AirTag stalking, but tech-enabled abuse can impact anyone. Just under two-thirds of the survivors coming to me are women according to Galperin.
  • Anyone affected by tech-enabled abuse can visit the website for the National Domestic Violence Hotline.
  • The article has been updated on Dec 2, 2024, to reflect recent changes to how iOS, Android, and AirTags currently operate.

Read Full Article

like

1 Like

source image

Medium

1M

read

278

img
dot

Image Credit: Medium

Why We Invested in Upwind Security … Again

  • Craft has invested in Upwind Security, recognizing its potential to build a generational company in the cyber security sector.
  • Upwind's approach to cloud security is centered around its eBPF sensor, providing real-time protection and runtime context for organizations.
  • Buyers now demand more than just visibility; they want runtime context and real-time protection, which Upwind delivers through its agentless CSPM.
  • Upwind's eBPF sensor-based approach has the potential to revolutionize not only cloud security but also other tangential areas like application security and data security.

Read Full Article

like

16 Likes

For uninterrupted reading, download the app