menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1M

read

4

img
dot

Image Credit: Medium

How to Turn Off Meta AI on Facebook

  • Meta AI is an advanced technology used on platforms like Facebook, Instagram, and WhatsApp.
  • It analyzes user activity to provide personalized experiences and recommendations.
  • To limit data gathering by Meta AI, users can adjust permissions and turn off certain AI features.
  • Turning off Meta AI offers increased privacy but may require more manual interaction with the platforms.

Read Full Article

like

Like

source image

Siliconangle

1M

read

441

img
dot

Image Credit: Siliconangle

Networking, AI simplification and observability take center stage: theCUBE’s final Ignite 2024 analysis

  • The era of artificial intelligence platformization has arrived at Microsoft Ignite 2024.
  • Connectivity and networking are crucial for highly distributed environments and multicloud ecosystems.
  • Microsoft emphasizes AI simplification with user-friendly interfaces and professional services.
  • Education and upskilling initiatives highlighted for driving productivity and comfort with AI tools.

Read Full Article

like

26 Likes

source image

Securityaffairs

1M

read

200

img
dot

Image Credit: Securityaffairs

Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

  • Mexico is investigating a ransomware attack targeting its legal affairs office.
  • The ransomware gang Ransomhub claimed responsibility for the attack.
  • Stolen files include contracts, insurance, and financial documents.
  • This is not the first time Mexico's government has been targeted in a hack involving sensitive information.

Read Full Article

like

12 Likes

source image

Hackernoon

1M

read

345

img
dot

Image Credit: Hackernoon

Halo Security Launches Slack Integration For Real-Time Alerts On New Assets And Vulnerabilities

  • Halo Security has launched a new Slack app for real-time alerts on new assets and vulnerabilities.
  • The integration allows customers to receive security notifications directly within Slack, improving response time and collaboration.
  • Halo Security's platform offers external attack surface management, including asset discovery and penetration testing.
  • The Slack integration helps teams stay ahead of emerging threats without being overwhelmed by irrelevant alerts.

Read Full Article

like

20 Likes

source image

Dataprivacyandsecurityinsider

1M

read

13

img
dot

Image Credit: Dataprivacyandsecurityinsider

Enfield, NH Victim of $742K Wire Fraud Scheme

  • The Town of Enfield, New Hampshire, fell victim to a $742,000 wire fraud scheme.
  • An employee was tricked into changing a bank account number for a vendor, resulting in the payment being directed to a fraudulent account.
  • The scheme involved a man-in-the-middle attack, where the threat actor impersonated the vendor and provided false banking instructions.
  • The town notified the bank and some of the funds may be recoverable, but the incident highlights the need to verify payment instructions through alternate means.

Read Full Article

like

Like

source image

TechBullion

1M

read

286

img
dot

Image Credit: TechBullion

Fraud Prevention Systems: Leveraging AI to Combat Financial Crime

  • Fraud prevention systems are leveraging AI to combat financial crime.
  • AI is transforming fraud prevention by analyzing data, detecting patterns, and monitoring transactions in real-time.
  • Industries such as banking, e-commerce, insurance, and cryptocurrency are utilizing AI tools to prevent fraud and protect customer trust.
  • Combining AI with blockchain technology, implementing biometric authentication, and fostering collaborative AI networks are the future of fraud prevention.

Read Full Article

like

17 Likes

source image

Dataprivacyandsecurityinsider

1M

read

300

img
dot

Image Credit: Dataprivacyandsecurityinsider

Chinese Manufactured Batteries Pose Cybersecurity Threat to Critical Infrastructure

  • China's dominance in battery manufacturing for electric vehicles and energy storage poses a cybersecurity risk to the United States.
  • The US-China Economic and Security Review Commission recommends considering legislation to restrict or ban certain technologies and services controlled by Chinese entities.
  • These technologies include advanced autonomous humanoid robots and energy infrastructure products with remote servicing capabilities.
  • The aim is to protect US economic and national security interests as China's near monopoly on battery manufacturing creates dependencies for US auto manufacturers and potential threats to critical infrastructure.

Read Full Article

like

18 Likes

source image

Siliconangle

1M

read

150

img
dot

Image Credit: Siliconangle

Quantum computing and hollow-core fiber shaping tomorrow’s IT: theCUBE Microsoft Ignite analysis

  • Quantum computing is advancing alongside AI & networking to reshape technology, with innovations designed to unlock new possibilities for data analysis and productivity.
  • Hollow-core fiber is a technology that’s being implemented by organizations to carry more capacity over greater distances with lower latency.
  • Microsoft is exploring applications for this technology in AI data centres, being able to stretch the fibres across data centres.
  • The need for security, governance, and observability in increasingly complex IT environments was emphasized at the Microsoft Ignite keynote.
  • AI and quantum computing are two key technologies driving innovation, with Microsoft’s focus on integrating AI into tools such as Microsoft 365 Copilot and its broader Azure ecosystem.
  • Promising advancements from Microsoft’s collaboration with Atom Computing include achieving greater reliability with 24 qubits in a commercially neutral environment towards making quantum solutions accessible.
  • Microsoft’s efforts to strengthen its security posture reflect the industry’s broader challenge of ensuring trust in new technologies and protecting AI models from AI-driven threats.
  • Staying ahead of increasingly sophisticated malicious actors and investing in security will be important for any AI that is deployed.
  • Observability of increasingly complex, distributed environments are of concern for organizations.
  • Microsoft Ignite keynote emphasized challenges of securing AI models and establishing clear governance frameworks.

Read Full Article

like

9 Likes

source image

Siliconangle

1M

read

191

img
dot

Image Credit: Siliconangle

Palo Alto Networks’ Nir Zuk on what’s coming in cybersecurity in 2025

  • Nir Zuk, founder and CTO of Palo Alto Networks, presented the company’s 2025 predictions for cybersecurity at its recent Ignite on Tour event.
  • Zuk predicted a significant shift in the widespread adoption of mean time to detect (MTTD) and mean time to respond (MTTR) as benchmarks for security performance.
  • SOCs will rely on AI-technology driven systems to detect and respond to threats, with people stepping in for more complex cases.
  • Organizations will move towards a single, consolidated data lake as the backbone for cybersecurity operations.
  • Post-quantum encryption will become increasingly vital as organizations prepare for future quantum computing threats.
  • Zuk’s predictions outline the need for modernized cybersecurity strategies and advanced technologies that redefine operations to counter emerging threats.
  • Organizations need to prepare for the future, and Zuk’s predictions for 2025 present key areas they can focus on.
  • The adoption of post-quantum encryption will vary by organization; some may choose to act immediately.
  • The rise of a unified data cloud is critical to the success of AI in security.
  • SOCs will phase out legacy tools such as security information and event management, or SIEM, endpoint detection and response, or EDR, and security orchestration, automation, and response (SOAR).

Read Full Article

like

11 Likes

source image

Medium

1M

read

254

img
dot

ORM (Object-Relational Mapping) is a programming technique that relates objects used in…

  • ORM (Object-Relational Mapping) is a programming technique that relates objects used in databases to classes and records.
  • ORM simplifies CRUD operations by allowing developers to add, read, update, and delete data through objects, rather than using direct SQL code.
  • Advantages of ORM include easier code, database neutrality, protection from SQL injection, and easy testing.
  • Popular ORM libraries include Hibernate (Java), Django ORM (Python), Entity Framework (C#), and SQLAlchemy (Python).

Read Full Article

like

15 Likes

source image

BGR

1M

read

186

img
dot

Image Credit: BGR

Millions of people replaced passwords with passkeys, so why haven’t you?

  • Password managers are essential for generating and storing unique passwords as well as protecting sensitive information.
  • Passkeys, which use biometrics for authentication, are a more secure alternative to passwords.
  • Passkeys are currently unhackable and require the user's fingerprint or face for access.
  • Millions of people have already adopted passkeys, and more companies are embracing this password replacement.

Read Full Article

like

11 Likes

source image

Medium

1M

read

104

img
dot

Image Credit: Medium

Unveiling Arcium Network: The Future of Confidential Computing

  • The Arcium Network is a distributed architecture that utilizes multi-party computation (MPC) tasks.
  • It ensures that no single node has access to the complete dataset, enhancing security and privacy.
  • This technology has implications for industries such as blockchain, healthcare, finance, and AI.
  • Arcium Network currently operates on Solana but plans to expand to other chains.

Read Full Article

like

6 Likes

source image

TechBullion

1M

read

122

img
dot

Image Credit: TechBullion

Cybersecurity in Finance: Best Practices for Protecting Digital Assets

  • Cybersecurity in finance is crucial for protecting digital assets.
  • Financial institutions store sensitive data targeted by hackers.
  • Best practices include employee training, multi-factor authentication, and encryption.
  • Technology advancements like AI and blockchain enhance security measures.

Read Full Article

like

7 Likes

source image

Fb

1M

read

286

img
dot

Image Credit: Fb

Cracking Down On Organized Crime Behind Scam Centers

  • Meta is sharing its approach to countering the cross-border criminal organizations behind forced-labor scam compounds under our Dangerous Organizations and Individuals (DOI) and safety policies.
  • ‘Pig butchering’ is an egregious and sophisticated fraud scam where the target is manipulated to deposit more and more money into an investment scheme, often using cryptocurrency, and ultimately lose that money.
  • During the COVID-19 pandemic, scam compounds run by organized crime emerged in the Asia Pacific region as one of the major sources of ‘pig butchering’ and other scam activity.
  • At the outset, Meta actively engaged with expert NGOs and law enforcement partners to better understand the modus operandi of these criminal groups.
  • The criminal compounds force their workers to engage in a wide range of malicious activity, from cryptocurrency, gambling, loan and investment scams (e.g., ‘pig butchering’) to government and other impersonation scams.
  • Meta relies on its DOI policies as the most effective and appropriate set of measures for disrupting organized crime.
  • This year alone, Meta has taken down over two million accounts associated with scam centers in Cambodia, Myanmar, Laos, the United Arab Emirates and the Philippines.
  • Meta is working with law enforcement agencies around the globe to share its insights into how this criminal industry operates and help law enforcement protect communities from these scams.
  • Teams across Meta are constantly rolling out new product features to help protect people on its apps from known scam tactics at scale.
  • Meta will continue sharing regular updates about its work to counter scams more broadly, including safety tips and product updates rolled out across its apps.

Read Full Article

like

17 Likes

source image

Wired

1M

read

427

img
dot

Image Credit: Wired

Meta Finally Breaks Its Silence on Pig Butchering

  • Meta, for the first time, has shared information about its approach to combating forced-labor compounds that fuel pig butchering scams on its platforms and across the web. The company said it has been collaborating with global law enforcement and other tech companies. It has done takedowns of more than 2 million accounts connected to scam compounds so far this year. Longtime pig butchering researchers say that Meta has been slow to publicly and directly acknowledge the problem and the role its many platforms play in connecting scammers with potential victims.
  • More than 200k people have been trafficked and held in compounds where they are forced to play the role of an online scammer. People have been trafficked from over 60 countries around the world, often after seeing online ads promising them jobs that are too good to be true.
  • Pig butchering scams drive financial theft, but they start with either cold communication between scammers and potential victims or contact that originates from social media groups. It is inevitable that scammers will gravitate towards them because Meta's services are recognizable and trusted around the world.
  • Some pig butchering activity can skirt tech company standards—even when they are doing a large number of takedowns—because the content isn’t explicit enough to meet the criteria for removal.
  • Meta is focused on combatting scam compounds using its policies around dangerous organizations and individuals, as well as wider safety policies.
  • Scammers are now able to easily generate understandable content in many languages using AI translation tools for the scripts and messages they send potential victims, as well as job advertisements luring prospective workers into scam compounds.
  • Meta says one recent scam compound that it took action against followed a tip from OpenAI threat researchers who had spotted the criminal operation using ChatGPT to translate messages that could be used in pig butchering.
  • The pig butchering crisis has escalated into a multibillion-dollar global crisis of pig butchering scams.
  • Meta declined to share how many accounts it had removed prior to this year but said it had been working with law enforcement for more than two years.
  • Scammers have also been making efforts to evade law enforcement and technology clampdowns by using artificial intelligence tools, integrating deepfakes into their campaigns, and using malware to expand their capabilities.

Read Full Article

like

25 Likes

For uninterrupted reading, download the app