menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Dev

1M

read

22

img
dot

Image Credit: Dev

Cybersecurity for Beginners: How to Secure Your Website from Hackers

  • Implement SSL/TLS encryption using HTTPS to secure communication with your website.
  • Regularly update your software, plugins, and libraries to fix vulnerabilities.
  • Implement strong authentication measures, including long and complex passwords and Two-Factor Authentication (2FA).
  • Secure your database against SQL injection by using prepared statements, validating and sanitizing data, and restricting user permissions.

Read Full Article

like

1 Like

source image

Itsecurityexpert

1M

read

198

img
dot

UK Cybersecurity Weekly News Roundup – 9 March 2025

  • Ankit Masrani, a software engineer, successfully transitioned into a cybersecurity role at Microsoft after working in IT and securing a Master's degree in computer science.
  • Cybercriminals exploited a backdoor in StubHub's system, stealing nearly 1,000 tickets primarily for Taylor Swift's Eras Tour, resulting in over $600,000 in profits.
  • The UK government introduced the Cyber Security and Resilience Bill to update regulations, strengthen cyber defenses, and protect critical infrastructure and the digital economy.
  • The US Department of Justice charged 12 Chinese nationals, including hackers and government officials, for their involvement in extensive cybercrime campaigns.

Read Full Article

like

11 Likes

source image

Brighter Side of News

1M

read

415

img
dot

Image Credit: Brighter Side of News

Scientists revolutionize biometric security using AI and infrared sensors

  • Biometric security advancements are being made using AI and infrared sensors to enhance authentication methods, with a focus on internal biometrics for increased security against fraud and replication.
  • Internal biometrics like palm vein authentication offer enhanced security as vein patterns are hidden and difficult to counterfeit, unlike external biometrics which are more vulnerable to spoofing.
  • Advancements in hyperspectral imaging have improved the accuracy and security of palm vein authentication, making it a reliable form of identity verification.
  • Techniques like Optical Coherence Tomography (OCT) and Photoacoustic Tomography (PAT) provide detailed 3D imaging for biometric identification, enhancing security measures.
  • Hyperspectral imaging analyzes tissue structures at different light wavelengths, offering a secure method to map unique vein patterns below the skin's surface for precise identification.
  • Challenges in hyperspectral imaging include processing large amounts of data efficiently, but innovative strategies like reducing image size and optimizing ROI extraction are being employed.
  • Researchers at Osaka Metropolitan University have developed a hyperspectral imaging-based personal identification system using AI to enhance accuracy and security in biometric authentication.
  • Hyperspectral biometrics hold potential not only for security applications but also for healthcare, with the capability to provide real-time health monitoring alongside authentication.
  • Future applications of hyperspectral biometrics may extend to diverse industries like banking, healthcare, personal devices, and smart home systems, offering secure and fraud-resistant authentication.
  • Advancements in AI-driven image processing and hyperspectral imaging techniques continue to refine biometric authentication, making it more efficient and applicable across various sectors.
  • The technology's unique ability to differentiate individuals accurately may lead to widespread adoption and redefine personal security in the face of evolving digital threats.

Read Full Article

like

25 Likes

source image

Medium

1M

read

4

img
dot

Welcome to Cyber with Zik!

  • 1. Social Engineering and Initial Access: Attackers used targeted phishing to trick Bybit personnel responsible for cold wallet security and gained control over the exchange's cold wallet.
  • 2. Exploiting Smart Contract Vulnerabilities: Attackers deployed a malicious contract upgrade, overriding security measures and moving funds undetected.
  • 3. Timing the Attack: Attackers may have had insider knowledge or utilized behavioral analysis to strike at the right moment and complete the transfer before detection.
  • 4. Laundering the Stolen Funds: Attackers split the stolen funds, used various anonymity tools and converted some into Bitcoin and stablecoins to obscure their tracks.

Read Full Article

like

Like

source image

Dev

1M

read

424

img
dot

Image Credit: Dev

LetsDefend SIEM Alert: Phishing Mail Detected - Internal to Internal - EventID: 52

  • Internal to Internal refers to a type of phishing email that was sent from one internal email address to another internal email address. This phishing attack is dangerous because internal emails are trusted more than external ones, making it easier for recipients to open attachments or click on embedded links.
  • The investigation starts by parsing the email to obtain information about the email's timestamp, SMTP address, sender address, recipient address, mail content, and attachments.
  • The email was sent on Feb 07, 2021, at 04:24 AM from the sender address [email protected] to the recipient address [email protected]. The email content seemed like a normal non-suspicious email with no attachments.
  • The investigation concludes that it is a false positive alert as there were no malicious attachments or URLs in the email. The alert can be closed.

Read Full Article

like

25 Likes

source image

Medium

1M

read

31

img
dot

Image Credit: Medium

What Secrets Would Your Phone Spill? Let’s Lock It Down!

  • Your phone is a treasure trove of data, knowing your location, interests, and search histories.
  • Third parties can obtain your data without you realizing it, potentially sharing it with data brokers or advertisers.
  • To tighten up your privacy, take practical steps like reviewing app permissions and using strong passwords.
  • By taking control of your phone's privacy settings, you can keep your secrets secure and protect your data.

Read Full Article

like

1 Like

source image

Medium

1M

read

411

img
dot

Image Credit: Medium

From the Field to the Firewall:The Intersection of Sports and Cybersecurity.

  • Protection of personal data is a pressing concern in the intersection of sports and cybersecurity.
  • Wearable technology used by athletes can be exploited by hackers for betting manipulation or game outcome interference.
  • Online betting and fantasy sports platforms are increasingly targeted by cybercriminals, requiring collaboration between sports leagues and cybersecurity experts.
  • Constant vigilance and adaptation are necessary to prioritize cybersecurity and maintain a secure environment for players and fans.

Read Full Article

like

24 Likes

source image

Securityaffairs

1M

read

379

img
dot

Image Credit: Securityaffairs

Undocumented hidden feature found in Espressif ESP32 microchip

  • Undocumented hidden feature discovered in the ESP32 microchip manufactured by Espressif.
  • The hidden functionality acts as a potential backdoor, enabling impersonation attacks and persistent infections on IoT devices.
  • The hidden feature poses a security risk for millions of IoT devices.
  • Tarlogic researchers developed BluetoothUSB, a tool for auditing Bluetooth device security to protect Bluetooth-enabled gadgets.

Read Full Article

like

22 Likes

source image

Medium

1M

read

411

img
dot

Image Credit: Medium

Four ways to take encrypted backup of your PC

  • Windows Backup and BitLocker can be used to encrypt and backup data on Windows.
  • Software like Cryptomator and Veracrypt can be used to encrypt files and folders on any platform.
  • Various tools like Borg, Rclone, Kopia, Veeam backup, Backblaze B2, Crashplan, etc., can encrypt and upload data to cloud storage providers.
  • Manually storing files on encrypted cloud storage providers like Proton, Tresorit, Filen, Crypt.ee, Koofr, Icedrive, etc., is another option.

Read Full Article

like

24 Likes

source image

Dev

1M

read

257

img
dot

Image Credit: Dev

01. Introduction

  • The article discusses the importance of secure coding in software engineering, highlighting the reasons for software being insecure and the repercussions of software failures.
  • It emphasizes the impact of software failures on injury, financial loss, resource loss, denial of service, information loss, and trust.
  • The article identifies various adversaries exploiting vulnerabilities and emphasizes the need to identify security risks and implement mitigations.
  • It explains that security features alone are not sufficient and discusses the trade-off between security and usability.
  • The article touches on measuring security, understanding weaknesses, and different types of attacks like XSS and SQL Injection.
  • It delves into the inception of weaknesses within software layers and the possibility of writing secure code.
  • The Secure Development Lifecycle is elaborated, highlighting phases like governance, education, design, implementation, verification, and operations.
  • The article underscores the importance of security training, risk assessments, and security and privacy considerations throughout the software development lifecycle.
  • It stresses the need to embed security requirements into software design and discusses the verification phase and incident response in software development.
  • CWE, common weaknesses enumeration, and various security models like BSIMM, SAMM, and SDL are mentioned as tools to enhance code security.
  • The article concludes by emphasizing the significance of secure coding practices and processes to mitigate software vulnerabilities and ensure robust software systems.

Read Full Article

like

15 Likes

source image

Dev

1M

read

421

img
dot

Image Credit: Dev

Secure Coding in Software Engineering

  • Secure Coding in Software Engineering is a comprehensive course designed to provide essential knowledge and skills in securing software systems.
  • The course covers topics such as the Secure Development Lifecycle, Penetration Testing and Security Analysis, and Identification and Remediation of Software Weaknesses.
  • By completing this course, participants will gain practical skills to audit software systems, identify security weaknesses, and conduct secure code reviews for various purposes.
  • The course emphasizes proactive measures to secure software systems through best practices and fills the gap in traditional software engineering classes that often overlook security aspects.

Read Full Article

like

25 Likes

source image

The Fintech Times

1M

read

36

img
dot

Money Launderers Turn to Savings Accounts to Receive Fraudulent Funds, Finds Synectics

  • Reports show a 63% increase in the use of savings accounts to receive fraudulent or disputed funds, compared to a 12% increase in current accounts.
  • Fraudsters are diversifying their activity across a wider range of financial products, including savings accounts, to evade detection.
  • ID fraud is the main growing fraud typology in the UK, with an increase in false identity reports and the use of synthetic IDs.
  • The cost-of-living crisis is identified as a significant contributing factor to fraud rates in the UK.

Read Full Article

like

2 Likes

source image

Dev

1M

read

424

img
dot

Image Credit: Dev

How to Prevent Web Cache Deception Attacks in Laravel: A Complete Guide

  • Web Cache Deception (WCD) is a vulnerability that occurs when sensitive data is improperly cached by web servers or reverse proxies.
  • Web Cache Deception attacks target caching mechanisms and exploit misconfigured caching mechanism in Laravel app.
  • The blog post explains how WCD works, how to detect vulnerabilities in Laravel app, and provides mitigation techniques with code examples.
  • Prevention methods involve avoiding caching dynamic content, caching only static content, and addressing common misconfigurations in caching mechanisms.

Read Full Article

like

25 Likes

source image

Dev

1M

read

58

img
dot

Image Credit: Dev

Professional Cloud Security Engineer Certification exam preparation 2025

  • The article discusses the preparation for the Professional Cloud Security Engineer Certification exam in 2025.
  • Key topics covered in the exam include services on Google Cloud Platform (GCP) such as Compute Engine, IAM, VPC network, Cloud Storage, Kubernetes Engine, Dataflow, BigQuery, and more.
  • After retaking the exam in 2025, the focus was on managing access and identities, protecting data, securing networks, logging and monitoring, managing secrets, incident response, securing workloads, and hybrid environments.
  • The importance of understanding IAM roles, encryption techniques, network security, logging, and Secrets Manager is highlighted.
  • Skills in incident response, hybrid cloud setups, Security Command Center, VPC Service Controls, and VPC Flow Logs are crucial for the exam.
  • The article also mentions the mock exams available on Udemy for exam preparation and provides links to additional Google guides for reference.
  • Preparation materials include understanding predefined and custom IAM roles, encryption techniques, network security using Firewall Rules and Cloud Armor, logging with Cloud Logging, and managing secrets securely.
  • The exam also covers incident response strategies, workload security on GCP, and the use of Security Command Center for security and compliance insights.
  • Topics such as Securing Hybrid Environments, VPC Service Controls, and VPC Flow Logs are emphasized for a comprehensive understanding of cloud security.
  • Overall, the Professional Cloud Security Engineer Certification exam in 2025 focuses on a wide range of topics related to cloud security and GCP services.
  • For more detailed information, individuals can refer to the provided Udemy course and Google guides to enhance their exam preparation.

Read Full Article

like

3 Likes

source image

Medium

1M

read

67

img
dot

The Unseen Puppeteer: MITM Ghost Attacks

  • MITM attacks involve intercepting and manipulating data exchanges, bypassing encryption without being detected.
  • These attacks pose threats ranging from financial fraud to altering diplomatic agreements and historical events.
  • Real-world examples include a $2.7 trillion fund disappearance and a manipulated ceasefire message sparking prolonged conflict.
  • MITM attacks in high-frequency trading led to a $180 billion market swing, showing their significant impact.
  • These attacks challenge the foundation of trust in digital communications and the concept of truth itself.
  • Future concerns include quantum MITM attacks, AI-generated conversations, and the potential division of the global internet.
  • Defenses against MITM attacks include encryption, secure authentication, network security measures, AI-powered anomaly detection, and quantum-resistant security.
  • Preventing MITM attacks involves strategies like end-to-end encryption, multi-factor authentication, VPNs, and behavioral biometrics.
  • Awareness, training, and vigilance are crucial components of defending against MITM attacks, which can have far-reaching consequences.
  • Addressing MITM attacks requires a multidimensional approach to safeguard digital communications and maintain trust in the digital realm.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app