menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Siliconangle

1M

read

4

img
dot

Image Credit: Siliconangle

Global law enforcement and Microsoft take down Lumma malware infrastructure

  • A global law enforcement operation, supported by Microsoft Corp., has disrupted the infrastructure behind Lumma, a popular malware-as-a-service tool known for widespread information theft.
  • The U.S. Department of Justice coordinated the takedown of Lumma, leading to the seizure of domains used for Lumma distribution, enabling cybercriminals to steal sensitive data globally.
  • Lumma, which emerged in December 2022, was widely used due to its affordability and ease of deployment. It allowed low-skilled threat actors to conduct sophisticated attacks, targeting various data types.
  • Despite the takedown, concerns remain about potential reemergence of Lumma or similar threats, as threat actors often adapt quickly with rebrands, new delivery methods, and rebuilt infrastructure.

Read Full Article

like

Like

source image

Siliconangle

1M

read

160

img
dot

Image Credit: Siliconangle

Bringing AI to the data: How Dell and Microsoft are syncing cloud and edge

  • Dell Technologies Inc. and Microsoft Corp. are focusing on syncing cloud and edge to bring AI to the data.
  • The partnership involves Dell implementing Cloud Platform with Microsoft Azure to build full-stack solutions for multicloud and hybrid ecosystems.
  • The collaboration aims to bring AI capabilities to data residing in different locations, like bringing Dell PowerScale to Azure Cloud for running unstructured data and using Azure services.
  • The partnership between Dell and Microsoft delivers management control solutions for IT customers, enabling consistent management and security capabilities across on-premises and cloud environments.

Read Full Article

like

2 Likes

source image

The Verge

1M

read

178

img
dot

Image Credit: The Verge

Signal says no to Windows 11’s Recall screenshots

  • Signal rolls out a new version for Windows 11 that enables screen security by default to prevent Microsoft's Recall feature from capturing secured chats.
  • Developers like Joshua Lund stress the need for OS vendors to provide tools for apps like Signal to reject granting AI systems access to sensitive information.
  • Microsoft's Recall feature lacks an API for app developers to opt out users' sensitive content from its AI-powered archives, raising privacy concerns.
  • Microsoft includes filters for private browser windows and Copilot Plus PC users can filter out certain apps with Recall, but the feature poses potential security risks.

Read Full Article

like

10 Likes

source image

Medium

1M

read

68

img
dot

Image Credit: Medium

Stop the Insanity: Rethinking Medical Device Product Cybersecurity Before Your Teams Burn Out

  • Cybersecurity is becoming a non-negotiable aspect in the medical device industry, but many companies are not adequately prepared to address it.
  • Since the PATCH Act came into effect, cybersecurity requirements have become crucial for FDA approval, including aspects like cryptographic key management and secure update pathways.
  • Most companies are still allocating minimal budgets for cybersecurity, not fully understanding or accounting for the complex security needs of medical devices.
  • The article emphasizes the need for separate focus and investment in product security compared to corporate security, highlighting the unique challenges and requirements in the medical device field.

Read Full Article

like

4 Likes

source image

Medium

1M

read

155

img
dot

Image Credit: Medium

Silgan Containers Data Breach: Potential Claims in California

  • Silgan Containers, a major producer of metal food packaging solutions based in California, detected unauthorized access to its computer systems in February 2024.
  • The company conducted a thorough review to identify affected individuals after confirming the breach, potentially exposing sensitive personal information of customers in California.
  • Silgan Containers initiated data breach notification procedures, including mailing notification letters to impacted individuals and implementing security enhancements to prevent future breaches.
  • Law firms, including Potter Handy LLP, are investigating possible legal remedies for affected individuals, focusing on the company's security protocols and safeguards for personal data.

Read Full Article

like

9 Likes

source image

The Register

1M

read

275

img
dot

Image Credit: The Register

US teen to plead guilty to extortion attack against PowerSchool

  • A 19-year-old student, Matthew Lane, has agreed to plead guilty to hacking into the systems of two companies as part of an extortion scheme, one of which was PowerSchool.
  • Lane faces federal charges including cyber extortion, cyber extortion conspiracy, unauthorized access to protected computers, and aggravated identity theft.
  • He and a co-conspirator tried to extort $200,000 in Bitcoin from a telco by threatening to leak stolen data, but their efforts were unsuccessful.
  • Lane accessed a school software provider's systems, stole user information, and demanded 30 Bitcoin (around $2.85 million) in exchange for not leaking the data.

Read Full Article

like

16 Likes

source image

Medium

1M

read

237

img
dot

Image Credit: Medium

Topic: How does my social media know what I am interested in?

  • Social media platforms use users' interactions such as likes and engagement to tailor advertisements based on their interests.
  • Algorithms on social media platforms help in customizing content to keep users engaged and interested.
  • Paid advertisements on social media target specific audience demographics, making advertising more effective for brands.
  • It's important for parents and educators to be aware of how social media gathers and uses information to protect privacy, especially for young users.

Read Full Article

like

14 Likes

source image

Medium

1M

read

374

img
dot

Image Credit: Medium

The Problem with Privacy and Social Media

  • Social media has become an integral part of society, even for young kids who can create accounts from home computers.
  • Concerns about privacy on social media have escalated globally, with many feeling they have lost control over their personal information.
  • Studies show that a large percentage of social media users worry about advertisers and businesses accessing their data.
  • While privacy settings and features exist on social media platforms, individuals, including kids, cannot entirely control the fate of the information they share.

Read Full Article

like

22 Likes

source image

BGR

1M

read

0

img
dot

Image Credit: BGR

Hidden Chinese comms devices were discovered in US energy equipment

  • Hidden Chinese communication devices have been discovered inside U.S. energy equipment, raising concerns about cybersecurity and national security.
  • Multiple hidden Chinese devices have been found in imported solar inverters and battery systems, posing a serious risk to the security of power grids in the U.S. and other countries.
  • These devices, capable of remote communication, could potentially be used to manipulate energy flow and disrupt power supply, leading to growing unease among experts and government officials.
  • In response to these findings, there are calls to reduce dependencies on Chinese-made components in critical infrastructure, with some utilities in the U.S. already phasing out inverters from Chinese suppliers.

Read Full Article

like

Like

source image

Securityaffairs

1M

read

211

img
dot

Image Credit: Securityaffairs

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

  • Cellcom, a regional wireless carrier based in Wisconsin, confirmed a cyberattack that caused a week-long outage affecting voice and text services in Wisconsin and Upper Michigan.
  • The company announced it has begun restoring services and stated it had protocols in place for such incidents to address the cyberattack.
  • Cellcom reported that the cyberattack impacted a network area not linked to the storage of sensitive information, and there's no evidence of customer personal or financial information being compromised.
  • The company is working with external cybersecurity experts, local authorities, and aims to fully restore its services by the end of the week.

Read Full Article

like

12 Likes

source image

Arstechnica

1M

read

411

img
dot

Image Credit: Arstechnica

“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall

  • Signal Messenger is warning its Windows Desktop users about the privacy threat posed by Recall, an AI tool in Windows 11 that captures and stores user activity.
  • Signal for Windows will now block Windows from taking screenshots by default to protect user privacy.
  • Users can opt to allow screenshots by adjusting settings, but Signal emphasizes the potential privacy risks from tools like Recall.
  • According to Signal, Microsoft's Recall feature jeopardizes the privacy of content displayed in privacy-focused apps, leading them to add extra protection to Signal Desktop for Windows 11.

Read Full Article

like

24 Likes

source image

Medium

1M

read

18

img
dot

Image Credit: Medium

Cybersecurity Advisory: Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

  • Hackers are exploiting a CAPTCHA trick on Webflow to deliver phishing attacks, turning the defense mechanism into an attack vector.
  • The attack is effective because it deceives users by appearing as a legitimate CAPTCHA, bypassing security measures.
  • To protect against such attacks, organizations should adopt a multi-layered defense strategy, including security tools and continuous education.
  • The evolving sophistication of cybercriminals underscores the importance of user vigilance and prioritizing cybersecurity to mitigate risks.

Read Full Article

like

1 Like

source image

Medium

1M

read

82

img
dot

Image Credit: Medium

Top 3 Microsoft Office Exploits Hackers Are Using in 2025 & How to Stop Them

  • 1. Phishing with Malicious Documents (The Enduring Classic): Hackers continue to use phishing emails with malicious Office documents to trick users.
  • 2. Old Vulnerabilities That Won’t Die (The “Follina” and Equation Editor Legacy): Exploits like Follina and Equation Editor persist due to unpatched systems and can be delivered via phishing.
  • 3. Privilege Escalation & Sandbox Escapes (The Sneaky Insiders): Attackers leverage vulnerabilities in Windows components related to Office to gain higher privileges or escape application sandboxes.
  • The Bottom Line: A layered security approach combining user education, robust technical controls, continuous patching, and proactive monitoring is crucial to stay secure against Microsoft Office exploits in 2025.

Read Full Article

like

4 Likes

source image

Medium

1M

read

120

img
dot

Image Credit: Medium

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

  • Hackers are exploiting Zoom's remote control feature, allowing them to take control of a participant's screen, keyboard, and mouse.
  • The exploitation is not a flaw in the feature itself but rather how attackers misuse it through social engineering tactics.
  • The widespread adoption of Zoom makes many individuals and organizations potentially vulnerable to this type of attack.
  • To protect yourself, take concrete steps like being cautious of remote control requests and staying informed about cybersecurity best practices.

Read Full Article

like

7 Likes

source image

TechCrunch

1M

read

235

img
dot

Image Credit: TechCrunch

Wyden: AT&T, T-Mobile, and Verizon weren’t notifying senators of surveillance requests

  • Sen. Ron Wyden revealed in a letter that major U.S. cellphone carriers like AT&T, T-Mobile, and Verizon didn't notify Senators about government surveillance requests as required.
  • An investigation found that the companies were not informing Senators about legal requests to surveil their phones, including those from the White House. They have since started providing such notice.
  • Wyden's letter highlighted the threat of executive branch surveillance on the Senate's independence and separation of powers. Some companies like Google Fi, US Mobile, and Cape now notify customers about government requests.
  • The Senate Sergeant at Arms updated contracts to require carriers to send notifications of surveillance requests, which were not happening before. Wyden advised colleagues to switch to carriers providing such notifications.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app