menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

1M

read

310

img
dot

Image Credit: Tech Radar

Talk about an own goal - Bologna FC hit by ransomware hackers

  • Bologna FC, an Italian football club, suffered a ransomware attack where sensitive information was stolen.
  • RansomHub, the ransomware group, claimed responsibility and mentioned that the club had no data protection.
  • The stolen data includes financials, medical data, contracts, and personal information of players since 2017.
  • Potential risks include business email compromise, phishing, identity theft, and wire fraud.

Read Full Article

like

18 Likes

source image

TechCrunch

1M

read

94

img
dot

Image Credit: TechCrunch

Cloud security specialist Upwind confirms it raised $100M at a $900M valuation

  • Cloud security specialist Upwind has raised $100 million in a Series A round, valuing the company at $900 million post-money.
  • The funding will be used to expand Upwind's team and develop its platform, which focuses on 'runtime' security.
  • Upwind aims to reduce the number of alerts organizations receive by prioritizing those that are most important.
  • The investment in Upwind highlights the growing attention and importance of cloud security in the market.

Read Full Article

like

5 Likes

source image

TechCrunch

1M

read

431

img
dot

Image Credit: TechCrunch

Retail outages drag into second week after Blue Yonder ransomware attack

  • A ransomware attack on supply chain software giant Blue Yonder continues to cause disruption to the company’s customers, almost two weeks after the outage first began.
  • Blue Yonder is making 'good progress' in its recovery, with several impacted customers brought back online.
  • The number of affected customers is still unknown.
  • U.K. supermarket chains Morrisons and Sainsbury’s, along with Starbucks, have confirmed being affected by the ransomware attack.

Read Full Article

like

25 Likes

source image

Wired

1M

read

13

img
dot

Image Credit: Wired

Malicious Ads in Search Results Are Driving New Generations of Scams

  • Malwarebytes reports that scammers mainly from South and Southeast Asia are continuing to use malicious ads in search results to scam victims, with instances of malvertising increasing at a high rate from July to September 2021. Malvertising is a key method used by cybercriminals and is often used in phishing attacks, credit card scams and malware distribution and has even been incorporated into pig butchering and other investment and romance scams
  • Research by Malwarebytes indicates that 77% of advertising accounts used for malvertising are only used once.
  • Malvertising is difficult to detect and prevalent in search results that gains legitimacy simply by appearing alongside legitimate search results.
  • Search engines like Google have pledged to vet advertising content and detect malvertising. Despite their efforts, attackers continue to develop circumvention methods, and Google removed 5.5 billion ads and suspended 12.7 million advertiser accounts in 2020 alone.
  • Criminals can get the most for their money when buying ads for more unique searches where they can dominate the ad space and get to the top of the results more organically. However, malicious ads also run frequently against searches such as Google, Walmart, Disney+, Slack, Lowe’s, and Apple.
  • Malwarebytes has to invest heavily in using its analytical skills in purchasing search engine ads just to avoid malvertising for its own brand.
  • Google regularly updates its policies and takes down misleading and fraudulent ads; however, the malicious ad activity keeps growing and evolving.
  • Malvertising is highly prevalent in search results, especially on mobile screens where legitimate and malicious results appear side by side.
  • Sophos’ researches indicate that scammers are using ad delivery networks and can redirect the URL after the ad is paid for.
  • Mostly originating from South and Southeast Asia, cybercriminals still use malvertising as a key technique to scam unsuspecting victims.

Read Full Article

like

Like

source image

Socprime

1M

read

80

img
dot

Image Credit: Socprime

Finalizing Your AWS WAF Web ACL Configuration

  • Set Rule Priority: Arrange the processing order for rules and rule groups.
  • Configure Metrics: View and manage metrics for Amazon CloudWatch and review web request sampling options.
  • Review and Create: Verify all settings and click Create Web ACL to finalize the configuration.
  • Properly finalizing your web ACL ensures optimal rule performance, accurate metrics, and streamlined traffic monitoring in AWS WAF.

Read Full Article

like

4 Likes

source image

Socprime

1M

read

94

img
dot

Image Credit: Socprime

Configuring Elasticsearch Authentication with LDAPS

  • LDAP (Lightweight Directory Access Protocol) is a popular method for centralizing user authentication and access control across an organization.
  • Configuring Elasticsearch to use LDAP over a secure connection (LDAPS) adds an additional layer of security by encrypting communication between Elasticsearch and the LDAP server.
  • This article provides a step-by-step guide to setting up LDAPS for Elasticsearch authentication.
  • Ensure Elasticsearch security features are enabled, configure LDAPS realm, define role mappings, and test the LDAPS configuration.

Read Full Article

like

5 Likes

source image

Securityaffairs

1M

read

445

img
dot

Image Credit: Securityaffairs

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

  • Operation HAECHI-V led to more than 5,500 suspects arrested and $400 million seized.
  • The operation targeted cyber frauds such as phishing, romance scams, and online gambling.
  • A voice phishing syndicate causing $1.1 billion in losses was dismantled, leading to 27 arrests.
  • INTERPOL issued a Purple Notice warning about cryptocurrency fraud involving the USDT Token Approval Scam.

Read Full Article

like

26 Likes

source image

TechBullion

1M

read

341

img
dot

Image Credit: TechBullion

Blockchain Development- Transforming Financial Operations and Security

  • Blockchain development has revolutionized the finance sector, providing decentralized, transparent, and secure systems.
  • Blockchain streamlines financial operations, enhances efficiency, and reduces costs by eliminating intermediaries.
  • Blockchain ensures transparency, simplifies auditing, and enhances compliance with regulatory standards.
  • Blockchain technology offers robust security measures, protecting against fraud, data breaches, and identity theft.

Read Full Article

like

20 Likes

source image

Medium

1M

read

422

img
dot

Image Credit: Medium

Your Smart Home or Your Digital Prison: The Hidden Dangers of IoT Devices

  • Smart devices have become popular additions to our homes, but they come with hidden dangers.
  • These devices can be hacked, potentially leading to invasion of privacy and harassment.
  • Cybercriminals can gain access to your home through these devices, making them a new frontier for ransomware attacks.
  • It's important to be aware of the risks and take steps to secure your smart devices.

Read Full Article

like

25 Likes

source image

Socprime

1M

read

391

img
dot

Image Credit: Socprime

Get started with ISM (Index State Management)

  • To start with Index State Management, first set up policies using Visual Editor or Dev-tools.
  • Configure error notifications to react faster when something goes wrong.
  • Create an index and a template for it using the provided commands.
  • Set states and actions, such as rollover and deletion, for managing the index.

Read Full Article

like

23 Likes

source image

VoIP

1M

read

400

img
dot

Image Credit: VoIP

Global Telecom Leaders Unite to Boost Submarine Cable Security

  • The International Telecommunication Union (ITU) and the International Cable Protection Committee (ICPC) have formed an advisory body to enhance submarine cable resilience.
  • Submarine cables are vital for international data transfers but face risks such as damage, natural hazards, and potential sabotage.
  • The advisory body aims to protect cable networks, accelerate repairs, and establish consistent practices.
  • The group comprises government officials, regulators, and industry experts, with the first meeting scheduled next month.

Read Full Article

like

24 Likes

source image

Pymnts

1M

read

197

img
dot

Image Credit: Pymnts

Reaching the Digital Generation: Credit Union Strategies for Growth

  • Credit Unions (CUs) with an aging membership need to engage with younger demographics for sustainability.
  • Attracting younger members presents challenges and opportunities with FinTechs and banks already making inroads.
  • CUs are less innovative than their bank or FinTech peers, a perception that is rapidly becoming obsolete as CUs make digital strides.
  • Younger customers prioritise self-service banking, so CUs will need to match these services with their competitors'.
  • CUs' personalised member-centric approach can be an advantage for younger consumers but unfamiliarity with CU's benefits is an obstacle, with Gen Z only at 11% membership.
  • In the 2024 spending plan, over 70% of CU's plan to up their technology spending.
  • Collaborative resources like Velera Innovation Alliance (VIA), allows CU's to find the requisite expertise to develop digital services.
  • CUs will need to familiarize younger generations with long-established CU strengths alongside innovation.
  • Innovating self-service banking features and digital solutions, as well as improving marketing efforts, are recommended for growth among younger members.
  • CUs can gather valuable data about their member's financial behaviors to provide more personalized offerings and improved member engagement.

Read Full Article

like

11 Likes

source image

Pymnts

1M

read

112

img
dot

Image Credit: Pymnts

B2B Payments Enter a New Era of Innovation and Transformation

  • The B2B payments landscape is undergoing a transformation driven by technological advancements, evolving business needs, and increasing consumerization of business processes.
  • B2B payments are no longer boring, as they are being reimagined through innovative platforms, strategic integration, embedded finance, cross-border efficiency, evolving roles of CFOs and treasurers, addressing uncertainty, cash flow management, and exploring generative artificial intelligence.
  • The opportunities for growth and transformation in B2B payments are boundless, unlocking strategic value, fostering innovation, and reimagining business models.
  • Subscribe to the daily B2B Newsletter for all PYMNTS B2B coverage.

Read Full Article

like

6 Likes

source image

Identityiq

1M

read

161

img
dot

Image Credit: Identityiq

Roblox Scams: What Parents Need to Know

  • As a parent, educating yourself about these dangers can be crucial to help protect your child’s online safety. Gaming scams and fraud are skyrocketing, increasing in 64% this year, making it important to be aware of potential dangers on the platform.
  • According to the Hindenburg report, Roblox struggles to filter inappropriate content, which adds urgency to the need for parents to be informed about the many potential risks on the platform.
  • Poison PDFs are a particularly predatory type of scam design to rank high in search results with enticing offers like free Robux generators or exclusive Fortnite skins. They infiltrate your online experience, taking you to other websites that exploit and steals confidential information like credit card details or login credentials.
  • Roblox is generally rated safe for children aged 10 and over, but its real safety depends on how it's used and monitored. It may be helpful to add additional parental control and monitoring to mitigate exposure to inappropriate content and interactions.
  • The most common scams on Roblox include free Robux generators, item trading scams, fake giveaways, and phishing scams. Scammers trick young players with these tactics.
  • Exploring Roblox could be a delightful experience for children, but their safety must come first. Educate your children on how to recognize potential scams, avoid sharing personal information, and decline friend requests from strangers.
  • To help keep Roblox users safe from potential scams, parents must also activate two-factor authentication (2FA) on their child’s Roblox account, adjust privacy settings, and set spending limits for Robux purchases.
  • Enlisting the help of identity theft protection services may also help protect your child from Roblox scams and safety concerns.

Read Full Article

like

9 Likes

source image

Wired

1M

read

404

img
dot

Image Credit: Wired

The Pressure Is on for Big Tech to Regulate the Broken Digital Advertising Industry

  • Digital advertising is a $700 billion industry that lacks regulation.
  • Lack of transparency leads to ads being placed on unsavory websites.
  • Regulations are being developed to protect brands from fraud and safety violations.
  • Unregulated digital advertising poses a threat to democracy.

Read Full Article

like

24 Likes

For uninterrupted reading, download the app