menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

VentureBeat

1M

read

18

img
dot

Image Credit: VentureBeat

DanaBot takedown shows how agentic AI cut months of SOC analysis to weeks

  • The recent takedown of DanaBot, a Russian malware platform, highlighted the role of agentic AI in redefining cybersecurity operations.
  • DanaBot had 150 active C2 servers per day and around 1,000 daily victims across 40 countries.
  • The U.S. DOJ indicted 16 DanaBot defendants for orchestrating fraud schemes and ransomware attacks.
  • Originally a banking trojan, DanaBot evolved into a versatile cybercrime toolkit.
  • DanaBot has links to Russian intelligence activities, merging cybercrime with state-sponsored espionage.
  • Agentic AI enabled predictive threat modeling, telemetry correlation, and dismantling DanaBot's infrastructure.
  • The takedown showed agentic AI's value by reducing months of manual analysis to weeks.
  • SOCs are benefiting from agentic AI tools for autonomous threat detection, analysis, and response.
  • DanaBot operated globally, compromising victims in multiple countries with stealthy tactics.
  • Agentic AI platforms reduce alert fatigue, improve analyst workflows, and enhance threat response capabilities.

Read Full Article

like

1 Like

source image

The Register

1M

read

421

img
dot

Image Credit: The Register

Adversarial AI: The new frontier in financial cybersecurity

  • The financial services sector is embracing the use of AI, with 75% of companies already utilizing it and another 10% planning to adopt it in the next three years.
  • While AI offers opportunities like fraud detection and analytics, many financial institutions lack a complete understanding of the technology, leaving them vulnerable to adversarial attacks.
  • Adversarial AI attackers can manipulate AI algorithms to their advantage, posing a significant threat to the financial sector that traditional cybersecurity defenses may not fully address.
  • Regulators are working on understanding adversarial AI risks, and financial institutions must be prepared to adapt to new compliance requirements to safeguard against emerging threats.

Read Full Article

like

25 Likes

source image

Siliconangle

1M

read

115

img
dot

Image Credit: Siliconangle

SentinelOne posts strong revenue growth but shares fall on weak guidance

  • Shares of SentinelOne fell over 12% in late trading after weak guidance, despite strong fiscal 2026 Q1 figures.
  • SentinelOne reported adjusted earnings per share of two cents and revenue of $229 million for the quarter, up 23% year-over-year.
  • The company's revenue growth was driven by increased business and customers, reaching annual recurring revenue of $948.1 million.
  • SentinelOne introduced Athena update, achieved FedRAMP-High authorization, and showcased latest innovations at RSA Conference 2025.

Read Full Article

like

5 Likes

source image

Arstechnica

1M

read

322

img
dot

Image Credit: Arstechnica

Thousands of Asus routers are being hit with stealthy, persistent backdoors

  • Thousands of home and small office routers manufactured by Asus are infected with a stealthy backdoor that persists through reboots and firmware updates.
  • Attackers gain access by exploiting now-patched vulnerabilities, installing an encryption key for SSH access, providing long-term control over the devices.
  • The backdoor allows unauthorized administrative control, surviving reboots and updates, without dropping malware or leaving obvious traces.
  • Researchers from security firm GreyNoise discovered the attack, noting the exploitation of authentication bypasses and legitimate configuration features.

Read Full Article

like

19 Likes

source image

Hackernoon

1M

read

371

img
dot

Image Credit: Hackernoon

If We Want More Cybersecurity Experts, We Must Make CTF Competitions an Official eSport

  • Esports have gained immense popularity over the years, with significant prize pools and millions of viewers worldwide.
  • To address the global shortage of cybersecurity professionals, Capture the Flag (CTF) competitions can serve as a vital platform for skill development.
  • CTF competitions immerse participants in realistic challenges spanning various cybersecurity domains, promoting technical skills and critical thinking.
  • Despite the abundance of CTF events, they lack the presentation elements that attract wider audiences like traditional sports.
  • Efforts are needed to promote and elevate CTFs to make them more engaging for viewers and sponsors.
  • With a cybersecurity talent shortage worldwide, emphasis should be placed on engaging the next generation in cybersecurity through CTF competitions.
  • Creating platforms similar to those in the esports industry can help showcase cybersecurity talent and attract more individuals to the field.
  • Countries like Israel, Estonia, and the U.S. have integrated cybersecurity competitions into their education systems, but more rapid training is required to keep up with evolving threats.
  • Ukraine recognized CTF competitions as part of its national sports framework, leading the way in promoting cybersecurity skills.
  • Collaboration among businesses, educational institutions, and governments is crucial to elevate CTFs to the level of an official eSport and make talent development a global priority.
  • By collectively committing to promoting cybersecurity skills through platforms like CTF competitions, a safer and more resilient digital world can be achieved.

Read Full Article

like

22 Likes

source image

TechCrunch

1M

read

426

img
dot

Image Credit: TechCrunch

Security startup Horizon3.ai is raising $100M in new round

  • Cybersecurity startup Horizon3.ai aims to raise $100 million in a new funding round, having secured at least $73 million according to an SEC filing.
  • NEA leads the funding round, with Horizon3.ai potentially being valued at over $750 million. The startup is said to generate around $30 million in annual recurring revenue.
  • This marks NEA's second significant investment in a cybersecurity startup within a month, following a $108 million funding round for Veza.
  • Founded in 2019, Horizon3.ai is known for its AI-powered autonomous threat detection tools and recently received FedRAMP authorization to sell to federal agencies, reporting impressive revenue growth.

Read Full Article

like

25 Likes

source image

Medium

1M

read

63

img
dot

Image Credit: Medium

How to Avoid Clickbait

  • Clickbait is a sensationalized headline that appeals to emotions and curiosity to encourage clicking on a link.
  • Online entities use clickbait to generate revenue from advertising companies based on the number of clicks.
  • To avoid clickbait, be cautious of exaggerated headlines that don't necessarily reflect the truth.
  • It is important to teach children to recognize and avoid clickbait to prevent wasting time on misleading content.

Read Full Article

like

3 Likes

source image

Medium

1M

read

145

img
dot

Image Credit: Medium

Why is technology so addictive?

  • Technology addiction is becoming more common among children, teens, and adults, leading to a fear of missing out and feeling left out from friends.
  • Neurologically, technology addiction is fueled by the brain releasing dopamine when receiving rewards like messages, likes, or video game achievements, leading to a craving for that 'happy feeling'.
  • Signs of technology addiction include excessive screen time, neglecting real-world activities, and disrupted sleep patterns.
  • If you suspect a technology addiction, it is crucial to set limits, establish boundaries, and communicate openly with your child to address the issue.

Read Full Article

like

8 Likes

source image

Medium

1M

read

213

img
dot

Image Credit: Medium

What are some types of online harassment?

  • Online harassment is a common issue faced by Americans, ranging from mild negativity to severe threats to privacy and physical safety.
  • Types of online harassment include name-calling, embarrassment, physical threats, repeated harassment, stalking, sexual harassment, cyberstalking, catfishing, online impersonation, doxxing, and trolling.
  • Cyberstalking involves using the internet to harass or intimidate someone, and it can be punishable by law in many states.
  • To tackle online harassment, individuals are advised to gather evidence, report incidents to authorities, block perpetrators, keep social media accounts private, and educate children about recognizing and preventing online harassment.

Read Full Article

like

12 Likes

source image

Tech Radar

1M

read

263

img
dot

Image Credit: Tech Radar

Millions of users could fall for fake Facebook ad for a text-to-AI-video tool that is just malware

  • Fake AI video editor ads are targeting Facebook users.
  • The threat group UNC6032 has been identified spreading malware through fake ads impersonating legitimate AI generator tools.
  • These malicious ads have reached over 2 million users, potentially putting them at risk of falling victim to malware.
  • Users are advised to exercise caution when engaging with AI tools and verify the legitimacy of websites before interacting with them.

Read Full Article

like

15 Likes

source image

VentureBeat

1M

read

58

img
dot

Image Credit: VentureBeat

Less is more: Meta study shows shorter reasoning improves AI accuracy by 34%

  • Researchers from Meta’s FAIR team and The Hebrew University of Jerusalem found that shorter reasoning processes in AI systems lead to more accurate results while reducing computational costs.
  • The study challenges the assumption that long thinking chains result in better reasoning capabilities and shows that shorter reasoning chains can be up to 34.5% more accurate.
  • A novel approach called “short-m@k” was developed, which executes multiple reasoning attempts in parallel and reduces computational resources by up to 40% while maintaining performance.
  • The research emphasizes optimizing for efficiency rather than raw computing power in AI development, suggesting potential cost savings and performance improvements by teaching AI models to be more concise.

Read Full Article

like

3 Likes

source image

Mcafee

1M

read

371

img
dot

Image Credit: Mcafee

Standing Together Against Scams: McAfee Joins the Global Anti-Scam Alliance

  • McAfee has joined the Global Anti-Scam Alliance to combat digital deception by understanding the human cost behind scams.
  • Stories from the Scam Stories initiative reveal the emotional impact and aftermath of falling victim to scams.
  • GASA aims to provide a coordinated global response to the increasing threat of scams, with billions lost annually to various scams.
  • McAfee contributes cutting-edge technology, real-world insights, global reach, and an educational mission to GASA.
  • Online scams now utilize AI for deepfakes, exploit trusted brands, and craft personalized attacks, posing a significant challenge.
  • The partnership with GASA reflects McAfee's commitment to collaboration and shared insights in combating scams.
  • GASA facilitates coordination among various entities to address scams collectively, emphasizing knowledge sharing and rapid action.
  • McAfee pledges to work across borders and sectors, leveraging advanced AI technology to anticipate and mitigate emerging scams.
  • Through initiatives like Scam Stories, McAfee aims to empower victims, end stigmas around being scammed, and raise awareness about evolving cyber threats.
  • By joining forces with GASA, McAfee strengthens its resolve to protect individuals in today's digital landscape, encouraging a safer online environment.

Read Full Article

like

22 Likes

source image

Medium

1M

read

185

img
dot

Image Credit: Medium

Do You Really Know About Incognito Mode?

  • Many people misunderstand what incognito mode actually does and believe it makes them completely anonymous online.
  • The myth that incognito mode makes users invisible to websites, advertisers, and other trackers is widespread.
  • The misconception about incognito mode leading to complete anonymity is a persistent myth in the tech industry.
  • Even tech-savvy individuals often fall for the myth surrounding the capabilities of incognito mode.

Read Full Article

like

11 Likes

source image

Securityaffairs

1M

read

63

img
dot

Image Credit: Securityaffairs

Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry

  • The Czech Republic has accused China's APT31 of a cyberattack on its Foreign Ministry, linking the cyber espionage group to a cyberattack on its critical infrastructure.
  • Czech intelligence agencies conducted a joint investigation attributing the attack to China with a high degree of certainty.
  • The EU, its Member States, and NATO Allies expressed support and solidarity with Czechia following the cyberattack, urging China to adhere to international norms and principles in cyberspace.
  • APT31, also known as Zirconium or Judgment Panda, has a history of cyber espionage activities targeting diplomatic cables, industrial designs, and political documents in Europe, North America, and Asia.
  • The US and UK have unsealed criminal charges and sanctions against members of APT31 for facilitating China's political and economic intelligence objectives.
  • The Czech government's announcement received backing from the EU and NATO, highlighting concerns regarding malicious cyber activities originating from China.
  • China has denied the allegations of involvement in the cyberattack, despite APT31 being linked to multiple cyber espionage operations targeting various countries.
  • APT31 has been previously reported for using tools such as Jian, identified as a clone of the NSA Equation Group's hacking tool, demonstrating advanced cyber capabilities.
  • The cyber espionage group has targeted organizations in the EU, US, Canada, and other countries in previous campaigns, indicating a widespread reach in its malicious activities.
  • France's national cyber-security agency also warned of ongoing attacks by APT31 against French organizations, with the group hijacking home routers for concealing attack infrastructure.

Read Full Article

like

3 Likes

source image

Mcafee

1M

read

240

img
dot

Image Credit: Mcafee

Adidas Data Breach: What Consumers Need to Know and How to Protect Yourself

  • Adidas confirmed a data breach compromising customer personal information through an attack on their customer service operations.
  • The breach exposed contact details but assured that financial data like credit card numbers remained secure.
  • The breach stemmed from a compromised third-party customer service provider, highlighting supply chain security vulnerabilities.
  • Adidas recommended immediate actions for affected consumers, such as changing passwords and enabling two-factor authentication.
  • The breach exposed risks like identity theft, phishing campaigns, social engineering attacks, and secondary account compromises.
  • Consumers were advised to monitor financial accounts, review credit reports, and consider credit freezing for long-term protection.
  • McAfee+ offers services like dark web monitoring, personal data cleanup, identity monitoring, AI-powered scam protection, and financial monitoring to help individuals navigate data breaches.
  • Consumers were urged to act quickly, invest in comprehensive protection, stay vigilant, and learn and adapt to improve their overall cybersecurity posture.
  • Cybersecurity experts emphasized the importance of proactive security measures and resilience to mitigate the impact of data breaches in our interconnected digital ecosystem.
  • The incident underscores the need for consumers to take security precautions, prepare for breaches, and leverage tools to detect and respond to threats promptly.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app