menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

1M

read

316

img
dot

Image Credit: Tech Radar

Firefox and Windows zero-day security bugs hit by Russian hackers, so be on your guard

  • A Russian APT group known as RomCom has been exploiting two zero-day vulnerabilities to deploy backdoor malware.
  • The first vulnerability, discovered in Firefox, allows the execution of code in the restricted context of the browser.
  • The second vulnerability, found in Windows, enables previously authenticated attackers to run arbitrary code in the system.
  • The majority of victims targeted by the attacks were located in Europe and North America.

Read Full Article

like

19 Likes

source image

Securityaffairs

1M

read

266

img
dot

Image Credit: Securityaffairs

Operation Serengeti: INTERPOL arrested 1,006 suspects in 19 African countries

  • Operation Serengeti, a joint law enforcement operation between INTERPOL and AFRIPOL, resulted in the arrest of 1,006 suspects across 19 African countries.
  • During the operation, 134,089 malicious infrastructures and networks were dismantled.
  • The operation targeted ransomware, business email compromise (BEC), digital extortion, and online scams.
  • The total financial losses caused by these cybercrimes amounted to USD 193 million.

Read Full Article

like

16 Likes

source image

Tech Radar

1M

read

429

img
dot

Image Credit: Tech Radar

Major Interpol action sees over a thousand cybercrime suspects arrested across Africa

  • Operation Serengeti, a major crackdown on organized cybercrime across Africa, has resulted in the arrest of 1,006 suspects and the takedown of 134,089 networks and devices.
  • The operation targeted cybercriminals involved in ransomware, business email compromise (BEC), digital extortion, and online scams.
  • Over $43 million in stolen assets were recovered, and more than 35,000 victims worldwide who had lost a combined $193 million were identified.
  • AFRIPOL and Interpol collaborated to carry out the operation, which also aimed to tackle emerging threats like AI-driven malware and advanced attack techniques.

Read Full Article

like

25 Likes

source image

Socprime

1M

read

425

img
dot

Image Credit: Socprime

Making Use of Fillnull and Values() to Increase Rule Resiliency in Splunk

  • Splunk's 'stats' and 'tstats' operations can cause events to be dropped unexpectedly.
  • The problem occurs when there are empty fields on the right side of the 'by' clause.
  • To mitigate this, the 'fillnull' command can be used to fill empty fields with a default value.
  • For datamodels and 'tstats', it is important to ensure that all fields on the right side are guaranteed to be present.

Read Full Article

like

25 Likes

source image

Medium

1M

read

370

img
dot

Image Credit: Medium

Between Game and Reality: Autonomy in the Digital Age #6

  • The role of artificial intelligence turns humans not only as players but also as creators. As long as there is the opportunity for playful creativity, human autonomy remains, even within digital change.
  • Digital spaces allow identity to flourish without limits. Avatarization dissolves the boundaries of the analog world, allowing identities, genders, and social roles to merge. However, this freedom poses a challenge when translated into the analog world that requires structural stability.
  • Specialized AI designed to preserve and disseminate specific knowledge could offer opportunities for societal stability, acting as a collective memory that retains critical knowledge during times of need. Specialized AI offers a form of cultural and intellectual autonomy that ensures essential knowledge and skills are preserved.
  • Algorithms that structure digital reality construct personalized filter bubbles that restrict human perception and decision-making, limiting freedom in a way that individuals perceive their thoughts and decisions as their own while influenced by machine-driven systems. Algorithmic structures blur the line between autonomous decision-making and subtle manipulation.
  • True autonomy can only exist in balance. Play allows for the exploration of technology within a creative framework and the playful experience of balancing forces. This balance between opposites is a prerequisite for preserving autonomy and supporting human freedom in the digital age.
  • A countercurrent manifests in a return to spiritual and analog values, a renaissance of a life not dominated by technology. This return to spiritual living underscores that autonomy is more than a choice between technology and nature — it is an expression of an inner striving for authentic freedom.

Read Full Article

like

22 Likes

source image

TechBullion

1M

read

380

img
dot

Image Credit: TechBullion

How VPNs Protect You in a Connected World

  • Virtual Private Networks (VPNs) safeguard your privacy, secure sensitive data, and shield you from prying eyes in ways you might not even realize
  • VPNs protect you by encrypting your internet traffic and ensuring that sensitive information remains protected from hackers and other malicious actors
  • Using a VPN also hides your real location and browsing habits from websites, advertisers, and malicious entities, reducing the risk of targeted attacks or unauthorized data collection
  • By anonymizing your internet activity, a VPN disrupts the efforts of advertisers, data brokers, and tech companies to monitor your browsing habits, search queries, and location data
  • Public Wi-Fi networks are often unsecured, making them a hotspot for cyberattacks. However, when you connect to public Wi-Fi with a VPN, you significantly reduce the risk of falling victim to man-in-the-middle attacks or other security breaches
  • Advanced VPNs include features that block malicious websites and warn you about potential phishing attempts. These added layers of security help prevent you from accessing harmful sites that could install malware or steal sensitive information
  • VPNs also enable you to bypass geographic restrictions and access content that would otherwise be unavailable in your region
  • By encrypting your data to masking your identity and protecting you on public Wi-Fi, VPNs empower you to navigate the internet with confidence in a world where digital threats are constantly evolving
  • VPNs are essential for both personal and professional use, and by choosing a reliable VPN and using it consistently, you can take control of your online safety and enjoy the benefits of a connected world without compromising your privacy or security

Read Full Article

like

22 Likes

source image

Socprime

1M

read

140

img
dot

Image Credit: Socprime

Creating Macros for Code Reuse in Splunk

  • When you find yourself constantly reusing certain strings of Splunk commands, it can be a lot easier to represent those commands as a single line of code that can accept positional arguments and serve the same functions as a set of commands you find yourself using often.
  • To create a new macro, start on the search page and follow these steps: Select Settings > Advanced Search > Search macros Click New to create a search macro Follow the guidance in the macro creation page to finish your macro and save your work.
  • The macro creation menu in Splunk makes this very easy for you and provides examples for each field you need to fill out. Once you’ve saved your macro, you can make use of it again in a search by calling it between a pair of back tick characters ` ` followed by the positional arguments.
  • Creating Macros for Code Reuse in Splunk

Read Full Article

like

8 Likes

source image

Medium

1M

read

162

img
dot

Image Credit: Medium

How AI is Dangerous

  • Geoffrey Hinton, a leading AI researcher, warns about the dangers of AI becoming more intelligent than humans and potentially dominating us.
  • Elon Musk and over 1,000 tech pioneers have also expressed concerns about the risks of artificial intelligence and called for a delay in large-scale AI experiments.
  • Concerns include job automation, biased algorithms, and the development of autonomous weapons.
  • We are still in the early stages of understanding the full capabilities and implications of AI.

Read Full Article

like

9 Likes

source image

Identityiq

1M

read

348

img
dot

Image Credit: Identityiq

Tips to Avoid Holiday Job Scams

  • Holiday seasons provide opportunities for scammer to exploit job seekers by posting fake job ads promising high pay and flexible hours.
  • Job scams can lead to financial losses and compromise personal details like Social Security numbers (SSNs) and bank account information.
  • Be wary of job offers from unsolicited email or social media messages that claim that you have been preselected for the role.
  • Fake remote jobs that require cashing of fake checks or transferring of funds can also be part of a scam strategy.
  • Job seekers face alarming risks during holiday seasons when businesses take on higher demand and consumers seek additional income.
  • The average amount lost by victims in employment scams last year was $2,000 and over 15,000 cases were reported.
  • Before applying for any position, research the potential employer and verify the job listing on the official website.
  • Never share sensitive details such as SSN or bank account information through unsecured channels.
  • Be cautious of jobs listed by distant or international employers and hold off on background checks until you've met the employer.
  • Avoid jobs offered through unsolicited emails and be careful of work-at-home ads promising big earnings.

Read Full Article

like

20 Likes

source image

Securityaffairs

1M

read

58

img
dot

Image Credit: Securityaffairs

How DSPM Helps Businesses Meet Compliance Requirements

  • Data Security Posture Management (DSPM) helps monitor, secure, and ensure compliance reducing risks across environments.
  • Organizations find it challenging to adhere to complex cybersecurity regulations that protect sensitive information of employees and customers.
  • Data Security Posture Management (DSPM) facilitates compliance with regulations and helps align security strategies.
  • DSPM is a data-centric approach to securing cloud environments. It helps organizations discover and protect their data against evolving threats.
  • DSPM tools offer visibility into where sensitive data is stored and provide context about data governance and user access.
  • DSPM can simplify data protection processes for complex multi-cloud environments by aggregating information from many sources across different platforms.
  • DSPM tools are beneficial as they map data assets to regulatory requirements, helping organizations determine compliance requirements and prioritize security measures.
  • Best practices like understanding the organization’s existing security posture, resources, and staff, and integrating the organization’s systems help leverage DSPM effectively.
  • Organizations can use DSPM to protect their sensitive data, comply with regulations, and ensure data privacy and security regulations.
  • DSPM is an effective security tool that facilitates regulatory compliance, ensuring the security of the sensitive information of employees and customers across diverse environments.

Read Full Article

like

3 Likes

source image

Fintechnews

1M

read

307

img
dot

Image Credit: Fintechnews

Sumsub and Elliptic Join Forces to Fight Crypto Crime

  • Global verification provider Sumsub has partnered Elliptic to bolster its crypto transaction monitoring and Travel Rule solutions.
  • The integration of Elliptic's blockchain analytics into Sumsub's platform offers enhanced tools to screen cryptocurrency wallets, identify fraudulent activity, and assess risk in transactions.
  • The partnership aims to address the rising blockchain-related crime and help companies gain a complete view of blockchain transactions, better protect their users, and meet regulatory requirements.
  • Clients can connect their Elliptic subscriptions to Sumsub's system using a Bring Your Own Key (BYOK) model, ensuring control over data and simplifying workflow.

Read Full Article

like

18 Likes

source image

Medium

1M

read

190

img
dot

Image Credit: Medium

Cloaked: Online Anonymity and Privacy

  • Cloaked is a digital tool that allows users to create alias identities, ensuring online anonymity and privacy.
  • Cloaked uses a Zero-Knowledge Architecture to keep your private information private.
  • Cryptographic Controls protect user information, ensuring only the user has access to it.
  • Cloaked employs internal access controls to limit employee access to areas necessary for their job role.
  • Threat Detection and Threat Intelligence are used to monitor and prevent internal and external data breaches.
  • Cloaked allows users to create aliases with fake names and contact details, enabling users to tailor the information they share online.
  • Users can categorize their aliases by use, keeping their digital life organized and compartmentalized.
  • Cloaked allows users to import accounts, making the transition to using an alias and the app seamless.
  • Cloaked offers a Learning Corner, a blog with tips and product news to help users get the most out of their alias.
  • Users can utilize Cloaked to sign up for sketchy websites, provide a fake phone number, and protect themselves from data breaches.

Read Full Article

like

11 Likes

source image

Pymnts

1M

read

244

img
dot

Image Credit: Pymnts

Chief Risk Officers Suit Up for Digital Duty

  • The role and impact of the chief risk officer (CRO) is evolving dramatically as financial services become more interconnected and technology-driven.
  • CROs are now responsible for quickly identifying and managing risks in a complex environment, redefined by the digitization of business processes and money movement.
  • CROs are expected to lead cyber defense efforts, address third-party risk management, and utilize governance, risk, and compliance (GRC) tools for streamlined risk management.
  • The CRO's role also expands to becoming core strategists, working alongside CEOs and CFOs to assess risks in real-time and challenge stakeholders to think critically about new investments and initiatives.

Read Full Article

like

14 Likes

source image

Pymnts

1M

read

366

img
dot

Image Credit: Pymnts

How Simplifying Transactions Can Translate Into Meaningful Customer Interactions

  • Simplifying payments and offering real-time solutions can enhance customer interactions and strengthen client relationships.
  • Ingo Payments is focused on building a future where transactions are transformed into valuable relationships.
  • They have developed the Modern Money Stack, an embedded finance platform that simplifies the movement of money and provides flexibility for account issuers and holders.
  • The Modern Money Stack offers agility through a unified platform and ensures security and compliance to protect customers and business relationships.

Read Full Article

like

22 Likes

source image

The Fintech Times

1M

read

40

img
dot

Vodafone Business Publishes UK Gov Recommendations to Counter Rise of AI-Phishing Attacks

  • Vodafone Business has published recommendations for the UK Government to counter the rise of AI-phishing attacks.
  • Vodafone Business research shows that 98% of businesses feel unprepared to handle AI-driven phishing attacks.
  • The recommendations include incentivizing cyber security adoption, launching a 'Cyber Safe' PR campaign, enhancing cyber security skills, and expanding Cyber Resilience Centres.
  • Vodafone Business urges businesses to adopt a proactive, multi-layered approach to cybersecurity.

Read Full Article

like

2 Likes

For uninterrupted reading, download the app