menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

1M

read

261

img
dot

Image Credit: Tech Radar

It's official — FBI, CISA, and NSA reveal the most exploited vulnerabilities of 2023

  • The Five Eyes intelligence alliance has revealed the most routinely exploited vulnerabilities for 2023.
  • Zero-day exploits were the primary concern, with CVE-2023-3519 being the top vulnerability.
  • Businesses are urged to patch vulnerabilities to mitigate network exposure.
  • Agencies recommend updating software, implementing patch management, and performing regular backups.

Read Full Article

like

15 Likes

source image

VentureBeat

1M

read

284

img
dot

Microsoft brings AI to the farm and factory floor, partnering with industry giants

  • Microsoft has developed a new suite of specialist AI models created to target specific challenges in agriculture, manufacturing and the financial services industry
  • By collaborating with partners like Siemens, Bayer and Rockwell Automation, Microsoft is aiming to bring advanced AI technologies to sectors that have traditionally relied on more traditional methods and tools
  • This reflects a broader company strategy that seeks to move beyond general purpose AI and into solutions that can offer immediate operational improvements to industries such as agriculture and manufacturing, under increasing pressure to innovate
  • Microsoft’s Phi family of small language models (SLMs) are playing a critical role in this initiative, designed to carry out specific tasks while consuming less computing power
  • This may address the limited computing resources available in sectors such as manufacturing, where companies need efficient AI models that can operate effectively on the factory floor
  • Early adopters of the systems such as Swire Coca-Cola USA have seen great potential for gains in both efficiency and decision-making
  • The initiative also extends into the automotive and finance sectors, with AI models designed to assist car drivers with a voice assistant and to help financial institutions with regulatory compliance
  • The new system is set to introduce industry-specific AI models that can be custom-built to address specific business challenges, a strategy not adopted by rivals like AWS and Google Cloud
  • Microsoft's strategy could accelerate the adoption of AI in sectors like agriculture and manufacturing, facilitating faster AI adoption in sectors that have been slower to embrace new technologies
  • The availability of these AI models through Azure AI Studio and Microsoft Copilot Studio speaks to Microsoft's broader vision of making AI accessible to businesses in every sector, helping to bring AI out of the lab and into the real world

Read Full Article

like

17 Likes

source image

TechBullion

1M

read

82

img
dot

Image Credit: TechBullion

Beware the Blind Spots: The Overlooked Vulnerabilities Endangering Your Data Security

  • Organizations invest millions in vast security infrastructures, but data breaches are still occurring, declaring that security systems are outdated and riddled with blind spots so glaring that cybercriminals are walking right through them.
  • Current encryption solutions often assumed to provide continuous data protection do not, leaving gaps in protection when data is in use or moving between stages in the lifecycle.
  • Other methods of protecting data designed to cover the gaps that traditional encryption leaves exposed are suitable for specific use case scenarios but do not assure data security throughout its lifecycle.
  • Confidential computing is another data protection method but has inherent performance overheads, given its complex hardware and integration requirements. More importantly, secure enclaves can be breached.
  • Data access control and monitoring solutions are inadequate to address today's attacks, such as limiting access controls' granularity in permission and restricting monitoring tools to IT users, creating data silos and hindering cross-team collaboration.
  • Thorough data protection requires data to be encrypted during its entire lifecycle. What businesses need is continuous encryption – Fully Homomorphic Encryption (FHE), a game-changing technology, often considered the holy grail of data protection.
  • FHE can protect data from even the most sophisticated threats, closing the dangerous data gaps left by data-in-transit and data-at-rest encryption. If companies aren't continuously encrypting data, they have encryption gaps.
  • FHE has traditionally been hindered by excessive computational costs, but recent breakthroughs make it performant, massively scalable, and a viable solution for businesses, and they no longer have to choose between security and utility.
  • The blind spots in data security are real and can be costly. It's time to wake-up, face the threat head-on, and embrace the advanced encryption technologies that will genuinely secure the future.

Read Full Article

like

4 Likes

source image

BGR

1M

read

416

img
dot

Image Credit: BGR

Make sure you aren’t using any of the most common passwords of 2024

  • NordPass has shared its list of the 200 most common passwords in the world for the sixth year in a row.
  • The top of the list includes familiar and easy-to-guess passwords that can be cracked in seconds.
  • The most common password in 2024 is '123456,' followed by other weak choices like 'password' and 'qwerty123.'
  • Even corporate passwords show little improvement, with '123456' being the most common choice.

Read Full Article

like

25 Likes

source image

Identityiq

1M

read

82

img
dot

Image Credit: Identityiq

Is Mobile Banking Safe? 8 Mobile Banking Security Tips 

  • Mobile banking allows you to manage your finances from anywhere with just a phone and a network connection, but it’s still important to keep your guard up when it comes to the security of your bank accounts.
  • Here are 8 tips to improve the security of your bank account:
  • Use strong passwords and biometrics.
  • Keep your app and device updated.
  • Download apps from trusted sources.
  • Use secure Wi-Fi connections.
  • Monitor your bank accounts.
  • Log out after every session.
  • Avoid phishing scams.
  • Use app-specific security features.

Read Full Article

like

4 Likes

source image

Digitaltrends

1M

read

261

img
dot

Image Credit: Digitaltrends

If you use one of these passwords, hackers will love you

  • NordPass' annual list reveals the most common and easiest passwords used.
  • Passwords like '123456' and 'password' remain popular choices.
  • Other weak passwords include 'iloveyou', 'monkey', and 'dragon'.
  • It is important to create stronger passwords to ensure online security.

Read Full Article

like

15 Likes

source image

TechBullion

1M

read

416

img
dot

Image Credit: TechBullion

Business Security Solutions: How Cameras Enhance Safety and Improve Operations

  • Business security cameras play a crucial role in ensuring the safety of both employees and customers.
  • A comprehensive business security system typically includes cameras, recorders, and software to monitor and store footage.
  • Business security cameras offer more robust features, durability, and flexibility compared to residential security cameras.
  • Installing business security cameras offers several benefits including improved safety and optimized operational efficiency.

Read Full Article

like

25 Likes

source image

TronWeekly

1M

read

311

img
dot

Image Credit: TronWeekly

Ross Ulbricht Anticipates Trump’s Pardon After Serving Over 10 years In Jail

  • Ross Ulbricht, the founder of Silk Road, is anticipating a presidential pardon from Donald Trump after serving over 10 years in jail.
  • Trump's commitment to pardon Ulbricht could impact his support among Libertarian voters.
  • The outcome of Ulbricht's pardon may set a significant legal precedent for digital rights and cyber law enforcement.
  • Ulbricht's case raises important debates on fairness of the sentence, online privacy, and the balance between law enforcement and individual rights.

Read Full Article

like

18 Likes

source image

Tech Radar

1M

read

302

img
dot

Image Credit: Tech Radar

GitHub users targeted by dangerous new phishing threat

  • GitHub users are being targeted in a new phishing campaign.
  • Researchers have discovered a tool called Golssue that is being sold on the dark web for $700.
  • Golssue can extract email addresses from public GitHub profiles and send targeted phishing emails.
  • This tool could potentially lead to dangerous supply chain attacks.

Read Full Article

like

18 Likes

source image

TechBullion

1M

read

197

img
dot

Image Credit: TechBullion

The Future of Banking: Simplifying International Transactions with Biometric Security

  • Biometric authentication is transforming the landscape of banking, enhancing security and streamlining processes that have historically been cumbersome and slow.
  • International banking transactions have become an essential part of our daily lives, and the current process can often feel cumbersome and fraught with delays.
  • Biometric security offers a revolutionary approach that promises to simplify cross-border banking and enhance security like never before.
  • Financial institutions can leverage biometrics for seamless transactions, while enhancing security measures, further fostering trust in cross-border banking.
  • Biometric authentication offers numerous advantages for international transactions. It enhances security, fosters trust in cross-border banking, is faster than traditional methods, and is more convenient, offering a smoother experience for customers globally.
  • Despite its advantages, biometric security faces several challenges in the banking sector, including concerns around privacy and the reliability of biometric systems.
  • The future of biometric authentication in cross-border transactions holds immense promise; as technology evolves, we can expect more sophisticated methods that enhance security and streamline operations.
  • Biometric authentication simplifies the banking experience for customers globally, offering smoother transactions that are just a fingerprint or facial scan away.
  • As more people embrace global travel and commerce, biometrics will redefine accessibility in international banking, ultimately paving the way for the future of global transactions.
  • With continuous advancements in biometric technologies, we are on the brink of reimagining what secure international banking looks like.

Read Full Article

like

11 Likes

source image

Securityaffairs

1M

read

87

img
dot

China’s Volt Typhoon botnet has re-emerged

  • The China-linked Volt Typhoon’s botnet has resurfaced using the same infrastructure and techniques, per SecurityScorecard researchers.
  • Microsoft reported that the Volt Typhoon APT infiltrated critical infrastructure organizations in the U.S. and Guam without being detected.
  • The group managed to maintain access without being detected for as long as possible.
  • The APT group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.
  • In December 2023, the Black Lotus Labs team at Lumen Technologies linked a small office/home office (SOHO) router botnet to the operations of China-linked threat actor Volt Typhoon.
  • The U.S. government neutralized the Volt Typhoon botnet taking over its C2 and deleting the bot from infected devices. However, despite the botnet disruption, Volt Typhoon remains active.
  • In February, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) assessed that People’s Republic of China (PRC) state-sponsored cyber actors warned that the APT group had been pre-positioning itself on IT networks.
  • SecurityScorecard warned that the botnet is back, and it is composed of compromised Netgear ProSafe, Cisco RV320/325 and Mikrotik networking devices.
  • While Volt Typhoon doesn’t use ransomware, its ecosystem benefits from Ransomware-as-a-Service (RaaS), where ransom payments fund advanced tools.
  • Volt Typhoon is both a resilient botnet—and a warning. Without decisive action, this silent threat could trigger a critical infrastructure crisis driven by vulnerabilities left unresolved.

Read Full Article

like

5 Likes

source image

Tech Radar

1M

read

343

img
dot

Image Credit: Tech Radar

US grocery stores hit by cybersecurity outage at food giant

  • Ahold Delhaize confirms being hit by cyberattack
  • Multiple retail stores across the US were affected by the attack
  • Delivery delays and other issues reported
  • Further details about the cyberattack are currently unknown

Read Full Article

like

20 Likes

source image

Droid-Life

1M

read

169

img
dot

Image Credit: Droid-Life

Google Play Protect Gets Live Threat Detection of Dangerous Apps

  • Google Play Protect introduces live threat detection for dangerous apps.
  • The real-time scanning of apps can identify malicious behavior and notify users.
  • Initially, the focus is on stalkerware that collects personal data without user consent.
  • The feature is available on Pixel 6 and newer devices through Google Play Protect.

Read Full Article

like

10 Likes

source image

Wired

1M

read

41

img
dot

Image Credit: Wired

These Guys Hacked AirPods to Give Their Grandmas Hearing Aids

  • Rithwik Jayasimha and two friends, Arnav Bansal and Rithvik Vibhu, built a rudimentary, signal-blocking Faraday cage on top of a microwave with aluminum foil to bypass Apple’s location restrictions and enable their hearing aids in Bangalore.
  • Apple released hearing aid features in AirPods Pro 2 earbuds but it is not available in India where Jayasimha and his family live.
  • The researchers designed a less ingenious, but simpler and more reliable Faraday cage to make their manipulation more practical.
  • The trio demonstrated that they could bypass Apple’s geographic restrictions with a set of AirPods Pro 2 connected to a 10th generation Wi-Fi-only iPad.
  • They discovered that it would be possible for Apple to close the loophole they discovered fairly easily, but they haven’t heard from the company.
  • Apple offers the hearing aid features in more than 100 countries, but it has great promise as a tool for making hearing aid tech more accessible.
  • Big Tech companies’ power and people’s rights have become an issue, with increasing hacking into the products people buy.
  • The researchers believe that it is likely Apple’s hearing aid features will officially come to the country in the coming months, but they plan in the meantime to help the dozens of people they say have reached out to them about their own headphones.
  • The team has a mix of hardware and software skills and detailed their hack as part of a technology collective to help grandmas in India use their AirPods as hearing aids.
  • The researchers first looked at ways iOS establishes where a device is in the world and found there are different checks, including region settings, Apple Store region and associated IP address location.

Read Full Article

like

2 Likes

source image

Siliconangle

1M

read

41

img
dot

Image Credit: Siliconangle

How GitLab and Google Cloud Marketplace streamline deployment and improve customer satisfaction

  • Google LLC and GitLab Inc. have partnered to reshape developer productivity and security by combining tools and resources, creating a streamlined experience that reaches customers faster, and simplifies deployment.
  • The collaboration enhances the developer experience by simplifying procurement and optimizing deployment through these cloud-based security solutions on Google Cloud Marketplace.
  • The partnership accelerates GitLab’s time-to-market and elevates customer satisfaction by providing an integrated, seamless experience that eliminates productivity interruptions.
  • Google Cloud Marketplace is designed to streamline software procurement, making it easier for customers to find and purchase cloud-based security solutions. It aims to foster an ecosystem where innovation can reach the market faster.
  • The collaboration between Google Cloud and GitLab centers around speed, flexibility, and ease of integration. By combining resources, they allow developers to leverage GitLab capabilities directly on Google’s infrastructure, streamlining workflows.
  • Google Cloud Marketplace opens new opportunities for GitLab by expanding its reach and visibility among potential customers. The partnership offers simplified transactions, using Google Cloud credits for GitLab purchases; this helps increase visibility and convenience.
  • GitLab’s partnership with Google Cloud is grounded in delivering a comprehensive development, security, and operations experience, enhancing cloud-based security solutions, and streamlining workflows through deep integrations.
  • Combining Google Cloud’s AI capabilities and GitLab’s expertise, the two companies enhance developer experiences, speed up delivery times, and offer cloud-based security solutions.
  • The collaboration allows developers to work seamlessly without leaving their preferred environment, and embeds GitLab into Google Cloud’s Developer Console. It keeps developers happy together and allows fast-paced transformations across diverse enterprise operations.
  • Airwallex, an Australian fintech company, achieved faster deployments and feature delivery by leveraging the partnership between GitLab and Google Cloud. They consolidated GitLab and Google services which led to quicker deployments.

Read Full Article

like

2 Likes

For uninterrupted reading, download the app