menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1M

read

154

img
dot

Image Credit: Medium

From Code to Ownership: My journey as a builder with a bigger vision.

  • Tolulope, a product builder and cyber risk analyst, shares his journey of transitioning from being a corporate engineer to building tools like Auron and Comply with a focus on solving real-world problems.
  • He balances his role as a Cyber Risk & AI Analyst by day with his passion for building AI-powered tools in his free time, facing challenges like context switching and impostor syndrome along the way.
  • Auron and Comply, his AI projects, aim at predicting market movements and automating cybersecurity compliance, reflecting his commitment to creating impactful solutions.
  • In the coming months, Tolulope plans to launch full public versions of his projects, grow his brand around AI and cybersecurity, and inspire collaboration within the tech community.

Read Full Article

like

9 Likes

source image

Medium

1M

read

400

img
dot

Image Credit: Medium

Top 5 Secure Messaging Apps in 2025 to Protect Your Privacy Online

  • In 2025, online privacy is a growing concern with every tap and text being tracked and analyzed on the internet.
  • Switching to more secure messaging apps is recommended to protect privacy.
  • Five secure messaging apps that prioritize privacy and ease of use are highlighted.
  • Signal is praised for its simplicity, lack of ads, and focus on privacy.

Read Full Article

like

24 Likes

source image

Tech Radar

1M

read

54

img
dot

Image Credit: Tech Radar

Windows 11 is getting top-level protection against the next generation of quantum cyberattacks

  • Microsoft unveils new protections against quantum-powered cyberattacks on Windows and Linux.
  • These updates introduce post-quantum cryptography (PQC) capabilities for Windows Insiders and Linux to address the evolving threat landscape presented by quantum computing.
  • Microsoft is adding ML-KEM and ML-DSA to Windows Insiders through CNG libraries and making updates to OpenSSL's API surface for developers on Linux.
  • The evolution in quantum computing necessitates continuous development in security measures due to the potential threat quantum computers pose to existing encryption algorithms.

Read Full Article

like

3 Likes

source image

Tech Radar

1M

read

336

img
dot

Image Credit: Tech Radar

Experts "deeply concerned" by the EU plan to weaken encryption

  • Experts and tech industry signatories are deeply concerned by the EU's plans to weaken encryption, urging the European Commission to reconsider its approach.
  • The ProtectEU strategy aims to create a legal backdoor into encrypted communications, posing risks to privacy and security.
  • Encryption is crucial for secure communications in services like Signal, WhatsApp, and Proton Mail, with experts emphasizing its importance.
  • Cybersecurity experts warn that weakening encryption undermines the foundation of secure systems, making individuals and institutions more vulnerable to attacks.
  • The European Commission's focus on finding ways to weaken encryption under ProtectEU has raised significant concerns within the tech industry.
  • The EU's attempt to weaken encryption with initiatives like Chat Control has faced opposition and challenges to maintain the security and privacy of communications.
  • Law enforcement agencies are facing challenges with encrypted communications, including messaging apps, email providers, VPN services, and encrypted devices.
  • Experts stress the need to balance security concerns with human rights and accountability when considering encryption backdoors.
  • Industry concerns regarding encryption must be taken into account in any future roadmap to ensure credibility and balance in technological capabilities.
  • Digital rights and tech experts have repeatedly called on the European Commission to protect encryption and involve them in decision-making processes to safeguard security and privacy.

Read Full Article

like

20 Likes

source image

TechDigest

1M

read

13

img
dot

Image Credit: TechDigest

Adidas customer data stolen in latest retail cyber attack

  • Adidas customer data has been stolen in a recent cyberattack targeting UK retailers.
  • The stolen information primarily includes contact details of individuals who interacted with Adidas customer service desk.
  • Adidas confirmed that the breach has no operational impact and reassured customers that sensitive data like passwords and credit card information remain unaffected.
  • Adidas acted swiftly to contain the breach, notify potentially affected customers, and collaborate with experts for a comprehensive investigation.

Read Full Article

like

Like

source image

Currentanalysis

1M

read

287

img
dot

Image Credit: Currentanalysis

Enterprises Take Up Arms Against Perilous Threats but Still Struggle with Unwieldy Security Tools

  • Enterprises face increasing cybersecurity threats, with reports indicating a rise in ransomware attacks and challenges in managing vulnerabilities.
  • Security professionals struggle with maintaining security tools, spending excessive resources on upkeep rather than shielding the enterprise from threats.
  • Issues like alerting problems, maintenance overload, and lack of integrated solutions hinder security efficacy, with staffing and skills shortages identified as major obstacles.
  • Future security operations will likely focus on unified platforms for better threat identification, reduced tool maintenance time, and improved threat coverage.

Read Full Article

like

17 Likes

source image

Tech Radar

1M

read

18

img
dot

Image Credit: Tech Radar

Mac users beware - fake Ledger apps are being used by hackers to steal seed phrases and hack accounts

  • Cybercriminals are targeting cryptocurrency owners using Apple Mac devices with a fake Ledger Live app to steal seed phrases.
  • The fake app replaces the legitimate Ledger Live app and prompts users to submit their 24-word seed phrase through a fake error message during login.
  • This sophisticated malware has been active since August 2024 and aims to outsmart users by stealing their seed phrases, allowing attackers to access their funds.
  • Cryptocurrency users are urged to stay alert, avoid sharing seed phrases, and only download wallet apps from legitimate sources to protect themselves from such scams.

Read Full Article

like

1 Like

source image

Securityaffairs

1M

read

49

img
dot

Image Credit: Securityaffairs

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

  • A new Russia-linked APT group known as Laundry Bear has been linked to a security breach at Dutch police in September 2024.
  • The breach exposed officers' work-related contact details, prompting the Dutch police to implement security measures and report the incident to the Data Protection Authority.
  • The Dutch intelligence services blamed a 'state actor' for the breach and issued a joint advisory warning organizations about Laundry Bear attacks, highlighting the group's evasion tactics.
  • Laundry Bear has targeted Western governments, defense contractors, cultural groups, and digital service providers since 2024, focusing on entities connected to Russia's war in Ukraine.

Read Full Article

like

3 Likes

source image

Medium

1M

read

0

img
dot

Image Credit: Medium

Steps Towards AI Governance — The Benefits of a Privacy-First Approach

  • A privacy-first approach is crucial for safeguarding digital lives and data security efforts.
  • It is important to understand the data first before implementing security measures to avoid wasted resources and vulnerabilities.
  • Privacy-first approach involves deeply understanding the purpose and context of data before building targeted security measures.
  • Prioritizing privacy from the outset leads to building trustworthy and responsible AI systems and ensures data protection throughout the lifecycle.

Read Full Article

like

Like

source image

Tech Radar

1M

read

68

img
dot

Image Credit: Tech Radar

FBI warns legal firms of Luna Moth extortion attacks where hackers will call their office

  • The FBI is warning US law firms about phishing attacks by the Silent Ransom Group, targeting sensitive data.
  • The group impersonates employees, gains access to systems, exfiltrates data using tools like WinSCP, and then threatens to leak the data unless a ransom is paid.
  • Silent Ransom Group, also known as Luna Moth, Chatty Spider, or UNC3753, has been active since 2022 and recently focused more on US law firms.
  • To defend against such attacks, the FBI recommends using strong passwords, 2FA, and robust backup solutions.

Read Full Article

like

4 Likes

source image

Socprime

1M

read

154

img
dot

Image Credit: Socprime

AI-Powered SPL Rule Generation for WRECKSTEEL IOC Detection

  • Uncoder AI converts complex threat intelligence into Splunk’s Search Processing Language (SPL) for direct deployment in security analytics workflows.
  • It parses IOC-rich reports to generate multi-index SPL queries aligned with Splunk’s native event and network telemetry.
  • Uncoder AI automates the correlation of IOC strings with telemetry sources, detects PowerShell cradle activity, and streamlines Splunk rule authoring for rapid threat rule deployment.
  • Operational value includes rapid threat rule deployment, enhanced behavioral and IOC coverage, and the ability to uncover historical matches across environments by deploying AI-converted SPL.

Read Full Article

like

9 Likes

source image

Siliconangle

1M

read

399

img
dot

Image Credit: Siliconangle

DefectDojo adds next-gen security operation center features to unify AppSec and SOC workflows

  • DefectDojo Inc. launches next-gen security operations center capabilities for DefectDojo Pro, offering a unified platform for SOC and AppSec professionals.
  • Dojo Pro's new release includes machine learning algorithms for noise reduction, eliminating duplicate findings and streamlining cybersecurity operations.
  • The platform introduces risk-based prioritization features to help teams assess vulnerabilities and SOC alerts more effectively by considering various factors.
  • DefectDojo aims to simplify cybersecurity operations by unifying next-gen SOC and AppSec workflows, alongside recent features like Rules Engine for automated customization.

Read Full Article

like

24 Likes

source image

Medium

1M

read

349

img
dot

Cybersecurity Isn’t a Checklist — It’s a Mindset

  • Cybersecurity is not just a checklist of rules, but a mindset that involves thinking and behaving online with caution and awareness.
  • Online threats are subtle and quiet, requiring proactive awareness and caution to prevent problems before they occur.
  • Developing a cybersecurity mindset involves treating your online spaces like real-world places, being intentional, and staying alert.
  • Cybersecurity starts with individual awareness and actions, such as being mindful of permissions, using password managers, and enabling two-factor authentication.

Read Full Article

like

21 Likes

source image

TronWeekly

1M

read

440

img
dot

Image Credit: TronWeekly

Solana Exec’s Data Leaked on Migos’ IG Account in 40 BTC Crypto Extortion Attempt

  • Solana co-founder Raj Gokal's personal data was leaked on Migos' Instagram account in a 40 BTC extortion attempt.
  • The leaked data included images resembling KYC checks commonly used for crypto verification, revealing sensitive information like phone numbers and email addresses.
  • The hackers used Migos' Instagram account to post images of Gokal's passport, ID, and phone number before Instagram removed the hacked posts.
  • Raj Gokal had previously warned of ongoing attempts to compromise his digital security, with hackers likely using social engineering techniques to target his accounts.

Read Full Article

like

26 Likes

source image

Managedmethods

1M

read

4

img
dot

Image Credit: Managedmethods

AI in K-12 Cybersecurity: Hype or Helpful?

  • AI-powered K-12 cybersecurity solutions are being marketed as the next frontier in data protection amidst rising threats like phishing and ransomware in schools.
  • The education sector is highly targeted for cyberattacks, with 63% of lower education organizations hit by ransomware in the last year.
  • AI in K-12 cybersecurity can help detect phishing attacks that traditional filters might miss and spot unusual behavior or patterns across user accounts.
  • Automating response and remediation processes, reducing alert fatigue, and prioritizing threats are key benefits of AI in K-12 cybersecurity.
  • AI is not a replacement for human expertise, user training, cyber hygiene, patching, backups, or multi-factor authentication, but it can complement these measures.
  • Understanding the type of AI used in cybersecurity solutions and its integration capabilities is crucial for effective implementation.
  • Smarter email protection tools, like Advanced Phishing, utilizing AI models can enhance cybersecurity in schools by understanding context and intent behind emails.
  • AI-powered K-12 cybersecurity, when tailored and transparent, can significantly improve email security, save time, integrate seamlessly, and enhance overall cyber defense.
  • Adopting targeted AI solutions that align with workflow and save time is advisable for enhancing K-12 cybersecurity measures.
  • Exploring AI-powered K-12 cybersecurity solutions to strengthen email security and combat threats like phishing and ransomware is recommended for schools.

Read Full Article

like

Like

For uninterrupted reading, download the app