menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Siliconangle

1M

read

27

img
dot

Image Credit: Siliconangle

SentinelOne shares drop after weaker-than-expected revenue guidance

  • Shares in SentinelOne Inc. fell more than 12% after weaker-than-expected revenue guidance.
  • SentinelOne reported a fourth-quarter revenue of $225.5 million, up 29% YoY, beating analyst expectations.
  • SentinelOne expanded its AI-driven security capabilities, launched automation tool Purple AI, and introduced Singularity Data Lake.
  • For fiscal 2026, SentinelOne expects first-quarter revenue of $228 million, and full-year revenue of $1.007 billion to $1.012 billion, falling short of analyst expectations.

Read Full Article

like

1 Like

source image

Securityaffairs

1M

read

139

img
dot

Image Credit: Securityaffairs

China-linked APT UNC3886 targets EoL Juniper routers

  • China-linked APT UNC3886 deploys custom backdoors on Juniper Networks Junos OS MX routers.
  • Mandiant researchers discover TINYSHELL-based backdoors on Juniper MX routers targeting defense, technology, and telecommunications sectors in the US and Asia.
  • UNC3886 demonstrates in-depth knowledge of system internals and uses compromised credentials to access Junos OS CLI from terminal servers.
  • Mandiant provides Indicators of Compromise (IoCs) and Yara rules to detect the backdoors.

Read Full Article

like

8 Likes

source image

Lastwatchdog

1M

read

414

img
dot

News alert: Aptori’s AI-driven platform reduces risk, ensures compliance — now on Google Marketplace

  • Aptori, a leader in AI-driven application security, has launched its AI-driven AppSec Platform on Google Cloud Marketplace.
  • Aptori's AI solution leverages semantic reasoning to analyze application code and logic in real time, providing vulnerability detection, risk prioritization, and automated remediation.
  • The AI Security Engineer works alongside developers and security teams to identify weaknesses, assess risk, and implement fixes in real time, ensuring compliance and reducing the risk of breaches.
  • Aptori's AI-Driven AppSec Platform automates vulnerability detection, risk remediation, and ensures continuous compliance with various security standards.

Read Full Article

like

24 Likes

source image

Medium

1M

read

410

img
dot

Image Credit: Medium

AI Won’t Replace Coders — But It Will Create a Generation of Hackers

  • The rise of large language models (LLMs) like ChatGPT has created a paradox in cybersecurity.
  • While AI helps defenders patch vulnerabilities, it also empowers cybercriminals to create sophisticated attacks.
  • Hackers now rely on AI algorithms to automate tasks, ranging from drafting phishing emails to carrying out ransomware attacks.
  • This development has transformed hacking from a complex skill to a simple copy-and-paste process, posing a challenge for users to identify deceptive AI-generated messages.

Read Full Article

like

24 Likes

source image

Digitaltrends

1M

read

315

img
dot

Image Credit: Digitaltrends

Three best ways to sync Apple passwords to a Windows PC

  • Syncing Apple passwords to a Windows PC can be challenging, but there are solutions available.
  • Apple's iCloud Passwords extension for Windows browsers like Edge, Chrome, and Firefox offers an easy way to sync passwords.
  • However, iCloud for Windows app can be resource-intensive and not a perfect solution for cross-platform users.
  • Cross-platform browsers like Google Chrome and Microsoft Edge provide password syncing across devices.
  • Password managers like 1Password offer robust security, encryption, and convenient sharing options for logins.
  • Password managers are more secure than built-in browser solutions, offering better protection for accounts.
  • Privacy-focused password managers like NordPass and Proton Pass offer additional cybersecurity features.
  • Choosing the right method depends on your device usage, with Safari and iCloud ideal for Apple users and password managers suitable for cross-platform flexibility.
  • Using well-rated password managers ensures hassle-free password syncing and simplifies logins across different platforms.

Read Full Article

like

18 Likes

source image

Medium

1M

read

270

img
dot

Image Credit: Medium

How to Use Tor for Anonymity and Privacy in 2025

  • Tor is a free, open-source network that enables anonymous communication by directing internet traffic through encrypted relays.
  • Using Tor effectively requires caution and best practices to ensure maximum privacy, such as downloading Tor from the official source, updating Tor Browser, and avoiding logging into services with real identities.
  • Tor offers security levels that disable JavaScript and browser plugins by default, and it is important to verify that websites use HTTPS encryption.
  • Tor is legal in most countries but certain governments restrict or monitor its usage, so it is important to comply with local laws and use Tor responsibly.

Read Full Article

like

16 Likes

source image

Medium

1M

read

139

img
dot

Image Credit: Medium

Technology in the Classroom Comes with Digital Baggage

  • Parents are encouraged to get involved in their children's digital lives to ensure their safety and monitor their access to technology through schools.
  • Children have access to technology services beyond what parents may allow at home, once they bring school-issued devices or link their school email accounts to personal devices.
  • Tech giants like Apple, Microsoft, and Google heavily push their technology into schools, making it part of standard technology education programs.
  • Parents are advised to have open conversations with their children about technology use, understand their school's technology education program, and actively participate in the technology conversation.

Read Full Article

like

8 Likes

source image

Medium

1M

read

252

img
dot

Image Credit: Medium

Have You Talked to your Kid about Hard-Core Pornography?

  • Statistics indicate that children as young as eight to eleven-years-old are first exposed to pornography.
  • Kids have easy access to screens of all kinds, making it important for parents to have conversations about technology and its implications.
  • Parents are encouraged to have 'The Tech Talk' with their children, providing more detailed discussions about sex at younger ages.
  • Free resources are available to help parents navigate discussions around technology and pornography.

Read Full Article

like

15 Likes

source image

TechCrunch

1M

read

342

img
dot

Image Credit: TechCrunch

The people in Elon Musk’s DOGE universe

  • Elon Musk has built a universe of companies where engineers and tech experts converge, including SpaceX and Tesla, collaborating on government efficiency initiatives with the U.S. federal government.
  • TechCrunch's investigation uncovered connections between Musk's associates and DOGE, revealing insights into the collaboration and networks involved.
  • New discoveries include a DOGE-related chatbot, cybersecurity staff cuts at CISA, and Musk-linked individuals serving in various government roles.
  • The individuals within DOGE's universe are categorized as Musk's inner circle, senior figures, worker bees, and aides, showcasing the diversity of roles and backgrounds.
  • Musk's mission-driven approach attracts talent to tackle challenges in sustainability, transportation, space exploration, and more, fostering innovation and disruption in industries.
  • Despite criticisms, Musk's companies have received significant government contracts, including SpaceX securing over $20 billion in contracts from federal agencies.
  • DOGE, a temporary government organization, operates under Musk's guidance, with him being an unpaid special government employee and senior advisor to President Trump.
  • Key individuals in Musk's DOGE universe include Steve Davis, Nicole Hollander, Brian Bjelde, Amanda Scales, Branden Spikes, and others serving important roles within the government initiative.
  • The composition of DOGE's team reflects a mix of tech expertise, government experience, and relationships with Musk, with recruiting efforts led by figures like Marc Andreessen and Vinay Hiremath.
  • TechCrunch's ongoing investigation reveals the evolving nature of Musk's involvement in government initiatives and the continuous developments within the DOGE ecosystem.

Read Full Article

like

20 Likes

source image

VentureBeat

1M

read

153

img
dot

Image Credit: VentureBeat

Nous Research just launched an API that gives developers access to AI models that OpenAI and Anthropic won’t build

  • Nous Research has launched a new Inference API to make its language models more accessible to developers and researchers.
  • The API release features models like Hermes 3 Llama 70B and DeepHermes-3 8B Preview.
  • Developers can access the API documentation for integration options and sign up through the waitlist system for access.
  • The waitlist strategy manages demand and highlights Nous Research's infrastructure constraints and marketing tactics.
  • The API is based on OpenAI's API design pattern and follows the release of Nous Chat in November.
  • Nous Research aims to balance idealism and practicality in transitioning to commercial offerings while maintaining open-source values.
  • The API launch represents a key step in Nous Research's evolution towards a sustainable business model.
  • Nous Research emphasizes individual agency and user alignment in contrast to tightly controlled AI systems.
  • Despite being marketed as “unrestricted,” Nous's models have guardrails against harmful outputs and responsible deployment.
  • The API signifies an evolution in Nous Research's business model, balancing revenue generation with open-source principles.

Read Full Article

like

9 Likes

source image

Tech Radar

1M

read

351

img
dot

Image Credit: Tech Radar

Chinese hackers targeting Juniper Networks routers, so patch now

  • Chinese hackers are targeting Juniper Networks routers with backdoor malware.
  • The campaign is attributed to the China-nexus espionage group UNC3886.
  • The attackers infiltrated Junos OS-powered devices by injecting malicious code.
  • Users are urged to upgrade and scan their Juniper routers for security.

Read Full Article

like

21 Likes

source image

Medium

1M

read

72

img
dot

Image Credit: Medium

The Risk of Being An Early Adopter

  • Being an early adopter of technology has its drawbacks, as it involves taking risks.
  • Early adoption of technology may prioritize convenience over safety, such as using ride-sharing services without considering potential risks.
  • New services like Amazon Key, which allows strangers to enter your home, bring up safety concerns, despite screenings and precautions.
  • Given the risks, the author chooses not to be an early adopter of Amazon Key.

Read Full Article

like

4 Likes

source image

Semiengineering

1M

read

265

img
dot

Image Credit: Semiengineering

Multi-Party Computation for Securing Chiplets

  • A technical paper titled 'Garblet: Multi-party Computation for Protecting Chiplet-based Systems' was published by Worcester Polytechnic Institute.
  • The paper presents Garblet, a framework that combines chiplet technology and Garbled Circuits (GC)-based Multi-party Computation (MPC) to enable secure computation in the presence of potentially compromised chiplets.
  • Garblet integrates a customized hardware Oblivious Transfer (OT) module and an optimized evaluator engine into chiplet-based platforms, reducing communication costs and enhancing computation speed.
  • The framework was implemented on an AMD/Xilinx UltraScale+ multi-chip module, showing promising results in terms of security, privacy, and computational efficiency.

Read Full Article

like

15 Likes

source image

Medium

1M

read

49

img
dot

Image Credit: Medium

The Human Firewall: Why Cybersecurity Awareness is the First Line of Defense Against Social…

  • Social engineering attacks are the biggest cybersecurity threat organizations face, targeting human vulnerabilities.
  • No firewall or antivirus software can fully prevent employees from falling for scams.
  • Cybersecurity awareness training is crucial to protect against modern cyberattacks.
  • The future of cybersecurity involves integrating AI-driven security measures with employee training.

Read Full Article

like

2 Likes

source image

Dev

1M

read

243

img
dot

Image Credit: Dev

Python Keyloggers: Do They Still Work in 2025?

  • Python keyloggers have evolved significantly by incorporating advanced techniques like obfuscation, in-memory execution, and polymorphism to evade detection by traditional security measures.
  • Modern AI-powered security software relies on behavioral analysis and anomaly detection to detect keyloggers that exhibit unusual typing patterns or system behaviors.
  • Ethical keystroke tracking is used for legitimate purposes such as enhancing employee productivity, optimizing user experience, and preventing fraud when implemented transparently and securely.
  • Detailed Python code examples illustrate both basic keylogging techniques using libraries like pynput and advanced methods like in-memory keylogging with randomization.
  • Statistics reveal that AI-based security solutions have significantly reduced false negatives and organizations increasingly use AI-powered tools to detect and combat threats effectively.
  • Collaborative intelligence sharing among cybersecurity communities and continuous learning are essential to stay ahead of evolving threats in the cybersecurity landscape.
  • Future trends in cybersecurity may involve enhanced polymorphic techniques, improved behavioral analytics, ethical monitoring expansion, and increased collaboration for threat detection.
  • It is crucial for cybersecurity professionals to remain proactive and stay informed about evolving threats, advanced coding techniques, and AI-driven security to foster a more secure digital world.
  • Every keystroke counts in the realm of cybersecurity, emphasizing the importance of vigilance, continuous learning, and proactive actions to safeguard data and innovate in the digital landscape.
  • By actively engaging with advanced techniques and leveraging top resources, individuals can shape the future of cybersecurity by defending against threats and leading in the ever-evolving digital world.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app