menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1M

read

44

img
dot

Image Credit: Medium

How Your Phone Tracks You: 10 Methods No One Talks About

  • Your phone tracks you in various ways, even if you swap SIM cards or use a new device.
  • Operators can triangulate your position based on signal strength from nearby towers, even if GPS is turned off.
  • Registered SIM cards and phones leave an IMEI trail, making them traceable assets.
  • Apps, links, and city cameras contribute to the tracking and merging of your digital and physical identities.

Read Full Article

like

2 Likes

source image

Pymnts

1M

read

408

img
dot

Image Credit: Pymnts

41% of Banks Prefer Metal Cards to Stop Authentication Fraud

  • Authentication-based fraud is on the rise, leading to increased efforts by banks to combat the problem.
  • A collaboration between PYMNTS Intelligence and Arculus found that 87% of banks have experienced an increase in credential-based fraud.
  • Metal payment cards with built-in biometric authentication and tap-to-verify technology are being considered as a powerful new layer of security by 77% of financial institutions.
  • 41% of banks prefer metal cards with tap-to-authenticate technology to combat authentication fraud, compared to 25% who prefer plastic cards for the same use.

Read Full Article

like

24 Likes

source image

Medium

1M

read

17

img
dot

Image Credit: Medium

Ekoahamdutivnasti: Leading the Future of Cybersecurity and AI

  • Ekoahamdutivnasti is a leading cybersecurity and AI company.
  • It specializes in deepfake detection, AI development, and cybersecurity solutions.
  • Founded by Navneet Singh, Ekoahamdutivnasti has developed the Vatsav Deepfake Detection System and Vrinda AI.
  • With Ekoahamdutivnasti being the first Indian company to develop a deepfake detection system, it is shaping the future of digital security.

Read Full Article

like

1 Like

source image

TechBullion

1M

read

107

img
dot

Image Credit: TechBullion

Bridging Security and Performance: Innovations in Privacy-Preserving Machine Learning

  • Privacy-preserving machine learning (PPML) is revolutionizing data-driven applications by ensuring user privacy while harnessing vast datasets.
  • Advancements in federated learning (FL), homomorphic encryption (HE), and secure multi-party computation (MPC) technologies are redefining data security in AI applications.
  • FL allows decentralized AI model training without sharing raw data, while HE performs computations on encrypted data, and MPC enables joint computations while keeping individual data private.
  • PPML is being applied in healthcare, finance, and IoT, offering privacy-preserving diagnostics, personalized recommendations, and secure collaborative data analysis.

Read Full Article

like

6 Likes

source image

Global Fintech Series

1M

read

166

img
dot

Image Credit: Global Fintech Series

fija Partners with softstack in Smart Contract Auditing

  • Germany’s leading blockchain security firm softstack conducted four independent smart contract audits for fija.
  • Over 50 vulnerabilities were identified and mitigated, reinforcing the robustness of fija's security model.
  • The audits focused on securing critical components such as the vault & core protocol, curve & convex strategies, and GMX & Aave optimizer.
  • DeFi security is crucial, with billions lost to hacks and exploits in 2024 alone, highlighting the need for comprehensive audits.

Read Full Article

like

10 Likes

source image

Dev

1M

read

188

img
dot

Image Credit: Dev

Pergola Grey or Gazebo Grey? Choosing the Right Structure for Your Yard

  • Pergolas and gazebos in shades like pergola or gazebo grey can add elegance to outdoor spaces, with each offering unique benefits and styles.
  • A grey pergola is an open structure perfect for creating shaded walkways or seating areas, while a grey gazebo is ideal for dining or entertaining in protected spaces.
  • Opting for a grey pergola design brings advantages such as a spacious feel, customization options, and affordability.
  • A grey gazebo offers a more enclosed and protected space, suitable for year-round use and versatile in creating elegant focal points or functional areas.
  • When choosing between a grey pergola and a grey gazebo, consider design preferences and functionality, with pergolas offering openness and gazebos providing more structure.
  • The size, purpose of the outdoor space, and desired level of enclosure are factors to consider when selecting the right structure like a grey pergola for a minimalist design or a grey gazebo for a functional gathering space.
  • Both pergolas and gazebos can be enhanced with accessories like climbing plants, string lights, and comfortable seating to create inviting and personalized outdoor retreats.
  • In conclusion, choosing between a pergola grey and a gazebo grey structure depends on style, budget, and functional needs, with each option offering unique benefits for creating a beautiful and enjoyable outdoor retreat.

Read Full Article

like

11 Likes

source image

Cybersecurity-Insiders

1M

read

336

img
dot

Image Credit: Cybersecurity-Insiders

FBI alerts Gmail users over Medusa Ransomware

  • The FBI issued an urgent warning to Gmail users regarding the Medusa Ransomware hacking campaign.
  • Medusa Ransomware has compromised around 300 targets through phishing scams and unpatched software vulnerabilities.
  • The campaign aims to extort money from victims while also being involved in espionage activities.
  • Experts advise caution, enabling 2FA, updating systems, and avoiding unsecure networks to protect against Medusa Ransomware.

Read Full Article

like

20 Likes

source image

Cybersecurity-Insiders

1M

read

121

img
dot

Image Credit: Cybersecurity-Insiders

Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure

  • Guardz uncovered an advanced phishing campaign exploiting Microsoft 365 infrastructure.
  • The cyberattack involved manipulating trusted Microsoft 365 services for credential harvesting.
  • Guardz disrupted the campaign targeting its customers, showcasing evolving cyber threats.
  • Adversaries exploited Microsoft 365 properties to embed phishing content within legitimate emails.
  • The attack involved acquiring multiple Microsoft 365 tenants and configuring deceptive tactics.
  • Phishing lures were disguised in billing emails from authentic Microsoft sources.
  • The attackers used official Microsoft channels to deceive recipients and evade detection.
  • Guardz recommended enhanced detection tools and user training to combat such threats.
  • The company's unified security platform effectively mitigated the phishing attack.
  • Guardz aims to provide AI-powered cybersecurity solutions for SMBs to combat cyber threats.

Read Full Article

like

7 Likes

source image

Cybersecurity-Insiders

1M

read

121

img
dot

Image Credit: Cybersecurity-Insiders

Blockchain and cyber security

  • The global blockchain security market is projected to grow from an estimated US$20bn in 2024 to $250bn in the next five years.
  • Blockchain technology is increasingly being adopted by large corporations to enhance processes such as safe communications, data protection, and defense against cyber-attacks.
  • The projected rapid growth of blockchain security will be driven by the integration of emerging technologies like AI and IoT, and its applications across various sectors.
  • While blockchain technology offers significant benefits, it is still susceptible to cyber risk-related challenges that need to be correctly managed, including phishing attacks, smart contract flaws, and cryptocurrency mining without consent.

Read Full Article

like

7 Likes

source image

Cybersecurity-Insiders

1M

read

49

img
dot

Image Credit: Cybersecurity-Insiders

Cybersecurity in the Age of Scarcity

  • The traditional cybersecurity mindset of 'more people, more controls' is outdated.
  • Automated cybersecurity, driven by artificial intelligence, is crucial in handling a greater number of threats with fewer people.
  • AI-driven security can detect, respond, and adapt to threats faster, augmenting human operators and reducing the chances of human error.
  • Innovation and smarter approaches in cybersecurity are necessary to strengthen defenses, increase effectiveness, and reduce breaches.

Read Full Article

like

2 Likes

source image

Cybersecurity-Insiders

1M

read

4

img
dot

Image Credit: Cybersecurity-Insiders

The DevOps Threats Unwrapped: over 502 incidents and 955 hours of disruptions in GitHub, GitLab, Atlassian, and Azure DevOps

  • The DevOps Threats Unwrapped report by GitProtect.io analyzed 502 incidents in GitHub, GitLab, Atlassian, and Azure DevOps, leading to 955 hours of disruptions.
  • 2024 highlighted the severity of security breaches with the Crowdstrike-Microsoft incident resulting in $5.4 billion in damages and impacting 8.5 million Windows devices globally.
  • There was a surge in attacks on SaaS applications and DevOps tools in 2024, a trend expected to accelerate in 2025.
  • The research focused on flaws, outages, errors, and breaches affecting GitHub, GitLab, Bitbucket, Jira, and Azure DevOps data protection.
  • DevOps encountered 502 incidents with 48 at high risk, causing 955 hours of major disruptions, equivalent to 120 business days annually.
  • GitHub, Bitbucket, Jira, Azure DevOps, and GitLab had varying numbers of incidents and hours of disruption in 2024.
  • Threats to DevOps continuity include hardcoded secrets, unsecured databases, intruders, AI-generated threats, and human errors.
  • Top affected industries were Technology, Software, Fintech/Banking, Media, and Entertainment, among others.
  • The Shared Responsibility model is crucial for SaaS vendors like GitHub and Microsoft to inform and educate customers about cybersecurity obligations.
  • Legislation, compliance requirements, and rising awareness are driving the prioritization of SaaS app backup, with forecasts indicating increased focus on data security in 2025.

Read Full Article

like

Like

source image

Cybersecurity-Insiders

1M

read

193

img
dot

Image Credit: Cybersecurity-Insiders

Accelerating Mergers and Acquisitions with Zero Trust Network Access (ZTNA)

  • Mergers and acquisitions (M&A) come with significant IT and security challenges that require rapid integration of networks and secure access to applications and data.
  • Zero Trust Network Access (ZTNA) offers a modern, scalable, and secure approach to accelerate M&A by enabling seamless access management, reducing cyber risks, and ensuring business continuity.
  • Challenges of IT integration in M&A include complex network mergers, security vulnerabilities, access management difficulties, compliance and regulatory requirements, and operational disruptions.
  • ZTNA accelerates M&A by providing seamless and secure user onboarding, enhanced security with zero trust principles, regulatory compliance and risk reduction, and ensuring business continuity and productivity.

Read Full Article

like

11 Likes

source image

Securityaffairs

1M

read

98

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog.
  • CISA added the vulnerabilities CVE-2025-21590 and CVE-2025-24201 to its Known Exploited Vulnerabilities catalog.
  • CVE-2025-21590 is an Improper Isolation or Compartmentalization issue in Juniper Networks Junos OS that allows local attackers to compromise device integrity.
  • CVE-2025-24201 is an out-of-bounds write issue exploited in sophisticated attacks; Apple released emergency security updates for it.

Read Full Article

like

5 Likes

source image

Medium

1M

read

408

img
dot

Image Credit: Medium

Identity Theft Prevention & Identity Theft Response

  • Identity theft is a common and serious crime with life-changing consequences.
  • It is important to take steps to prevent identity theft, such as setting security freezes on credit files.
  • If you become a victim of identity theft, report it immediately to the FTC and follow the steps on identitytheft.gov.
  • It is also important to report the theft to other organizations and agencies.

Read Full Article

like

24 Likes

source image

Siliconangle

1M

read

391

img
dot

Image Credit: Siliconangle

Rubrik shares jump on earnings beat and strong fiscal year outlook

  • Shares in Rubrik Inc. were up over 15% in late trading today after the data security software provider impressed investors with revenue and earnings beats in its fiscal 2025 fourth quarter.
  • For the quarter, Rubrik reported an adjusted earnings per share loss of 18 cents, up from a loss of $1.52 per share in the same quarter last year, on revenue of $258.1 million, up 47% year-over-year.
  • Rubrik saw subscription revenue in the quarter of $243.7 million, up 54% year-over-year, with an average subscription dollar-based net revenue retention rate of over 120%.
  • For its fiscal 2026 first quarter, Rubrik expects an adjusted earnings per share loss of 31 cents to 33 cents on revenue of $259 million to $261 million, and for the full year, the company expects an adjusted earnings per share loss of $1.13 to $1.23 on revenue of $1.145 billion to $1.161 billion.

Read Full Article

like

23 Likes

For uninterrupted reading, download the app