menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Socprime

1M

read

155

img
dot

Image Credit: Socprime

Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant

  • Adversaries employ new Interlock ransomware in big-game hunting and double-extortion attacks.
  • Interlock ransomware variant targets organizations globally in various sectors.
  • Interlock ransomware operators maintain a data leak site and exploit unpatched vulnerabilities.
  • Interlock ransomware encrypts files and demands ransom under threat of data leakage.

Read Full Article

like

9 Likes

source image

Dev

1M

read

357

img
dot

Image Credit: Dev

The Benefits of MedOne and VMware: A Cloud Solution Built for the Future

  • The partnership between MedOne and VMware offers businesses a powerful and flexible cloud solution.
  • Key benefits include seamless virtualization with VMware vSphere, cost savings, simplified IT management, and increased flexibility.
  • Consistent hybrid cloud with VMware Cloud Foundation enables integrated management of on-premise and cloud environments, smooth workload migration, and improved security.
  • Enhanced security and automation are achieved with VMware NSX, providing automated network management, micro-segmentation, and comprehensive security policies.

Read Full Article

like

21 Likes

source image

Siliconangle

1M

read

389

img
dot

Image Credit: Siliconangle

SlashNext warns of ‘GoIssue’ phishing tool targeting GitHub users

  • Phishing protection company SlashNext Inc. warns of a new phishing tool called GoIssue that targets GitHub users.
  • GoIssue allows attackers to extract email addresses from GitHub profiles and send bulk phishing emails to developers.
  • The tool's advanced features enable targeted phishing campaigns, increasing the risk of credential theft.
  • GoIssue is sold for $700 for a customized version, making it accessible to cybercriminals.

Read Full Article

like

23 Likes

source image

Siliconangle

1M

read

344

img
dot

Image Credit: Siliconangle

1Password expands Microsoft collaboration with Sentinel and Entra ID integrations

  • 1Password has joined the Microsoft Intelligent Security Association and integrated its Extended Access Management platform with Microsoft Sentinel and Microsoft Entra ID.
  • The integration enables 1Password to provide Microsoft customers with a comprehensive solution for protecting managed and unmanaged devices and applications.
  • The integration with Microsoft Sentinel allows businesses to monitor and respond to security threats in real time, improving overall threat detection.
  • The integration with Microsoft Entra ID focuses on device compliance and restricts access to sensitive company data based on device health.

Read Full Article

like

20 Likes

source image

Siliconangle

1M

read

399

img
dot

Image Credit: Siliconangle

Operant AI launches 3D Runtime Defense Suite for enhanced AI application security

  • Operant AI Inc. has launched the 3D Runtime Defense Suite.
  • The suite provides real-time discovery, detection, and defense capabilities to protect cloud applications.
  • It addresses the need for real-time defense against unknown threats that traditional security methods often miss.
  • The suite includes enhanced discovery tools, runtime threat detection, and active defense mechanisms to secure AI models and data.

Read Full Article

like

24 Likes

source image

AllTopStartups

1M

read

206

img
dot

Image Credit: AllTopStartups

Understanding the Role of a Managed Security Service Provider in Today’s Cyber Landscape

  • A managed security service provider (MSSP) is a third-party company that handles various aspects of a business’s cybersecurity needs.
  • Key services offered by MSSPs include proactive threat detection and rapid response, comprehensive vulnerability management, and expert-led incident response and mitigation.
  • MSSPs employ advanced monitoring tools, AI-driven analysis, and rapid mitigation protocols to identify and address potential threats in real-time.
  • MSSPs also provide ongoing vulnerability management, regular assessments and testing, and expert-led incident response teams to ensure optimal security.

Read Full Article

like

12 Likes

source image

Mcafee

1M

read

87

img
dot

Image Credit: Mcafee

What Is a Botnet?

  • A botnet is a group of internet-connected devices that can be hijacked by bad actors for malicious purposes like distributed denial-of-service (DDoS) attacks, stealing data, and sending spam.
  • Smart home devices and IoT are increasingly becoming targets of cybercriminals as many of them lack sophisticated security measures and ship with default usernames and passwords.
  • A cybercriminal can compromise a vulnerable IoT device by scanning the internet and using brute-force password attacks to take control of it.
  • A botnet can cause large-scale cyberattacks like the Mirai botnet attack of 2016, which caused disruptions across the US.
  • To secure IoT and smart home devices, manufacturers must develop security measures for their devices, and consumers can protect their devices by using online protection software, changing default passwords, using multi-factor authentication, upgrading routers, and setting up separate network access for IoT devices wherever possible.
  • Consumers should also read trusted reviews to purchase secure smart home devices that provide regular updates, security and privacy features.
  • As more and more connected devices make their way into our homes, it is important to ensure that they are secure to prevent their involvement in botnet attacks.
  • Smart home devices make up a $30-plus billion marketplace in the US alone despite still being a relatively young marketplace.
  • Security vulnerabilities lie in the unchanged factory usernames and passwords of many IoT devices that are often published online and not compatible with multi-factor authentication.
  • Cybercriminals are highly automated and use bots to add vulnerable IoT devices to their networks, that can potentially affect the entire home network they are in and all other devices and data on it.

Read Full Article

like

5 Likes

source image

Socprime

1M

read

59

img
dot

Image Credit: Socprime

SOC Prime Threat Bounty Digest — October 2024 Results

  • 81 new detection rules were released on the SOC Prime Platform in October.
  • Some rules didn’t pass the verification and were not published for monetization.
  • Top five popular detection rules in October include identifying Chinese APT group activity, detecting BruteRatel and Latrodectus malware, and identifying SmartLoader and LummaStealer activity.
  • Davut Selcuk was recognized as an Outstanding Contributor for achieving 100 successful releases in 2024.

Read Full Article

like

3 Likes

source image

Hackernoon

1M

read

27

img
dot

Image Credit: Hackernoon

The Security Pyramid of pAIn

  • The Security Pyramid of pAIn offers a framework for assessing AI-driven security risks and prioritizing mitigation strategies.
  • The pyramid is structured in five layers, escalating in complexity and severity, starting with AI model output manipulation and ending with AI supply chain attacks.
  • AI model output manipulation represents the easiest-to-address attacks, while AI supply chain attacks are the most challenging and damaging threat.
  • Data poisoning represents a more significant threat than output manipulation, and model evasion/bypass occurs when attackers craft inputs that escape detection by AI-powered security systems.
  • Model inversion attacks are more sophisticated and involve extracting sensitive information from AI models. This is difficult to detect and mitigate.
  • Model theft or reverse engineering gives attackers insight into potential vulnerabilities, and AI supply chain attacks can compromise entire AI ecosystems.
  • Mitigating these risks requires securing the entire AI development pipeline, from sourcing third-party tools to auditing open-source components.
  • Recognizing the Security Pyramid of pAIn can help create a comprehensive approach towards AI security.
  • AI-driven systems and processes are increasing in frequency across industries, making it crucial to assess the security risks unique to these systems.
  • By understanding and addressing the unique security risks and vulnerabilities of AI systems, security teams can better protect the integrity, confidentiality, and availability of AI assets.

Read Full Article

like

1 Like

source image

Securityaffairs

1M

read

91

img
dot

Image Credit: Securityaffairs

Apple indeed added a feature called “inactivity reboot” in iOS 18.1 that reboots locked devices

  • Apple iOS supports a new feature that reboots locked devices after extended inactivity, aiming to enhance data security for users.
  • The new feature was introduced with the release of iOS 18.1 at the end of October.
  • The auto-reboot feature erases sensitive data from memory to prevent unauthorized extraction.
  • Law enforcement warns that securely stored iPhones awaiting forensic examination are mysteriously rebooting, making them harder to unlock.

Read Full Article

like

5 Likes

source image

Tech Radar

1M

read

376

img
dot

Image Credit: Tech Radar

"WireGuard is the future:" Mullvad VPN begins to axe OpenVPN support

  • Mullvad VPN has decided to phase out OpenVPN to focus on improving WireGuard in the future.
  • The removal of OpenVPN has begun and is expected to be completed by January 15, 2026.
  • Less than 7% of Mullvad users currently use OpenVPN, and the number is expected to drop further.
  • WireGuard, a faster and lighter protocol, is being embraced by Mullvad as the future of VPN security.

Read Full Article

like

22 Likes

source image

Wired

1M

read

22

img
dot

Image Credit: Wired

The WIRED Guide to Protecting Yourself From Government Surveillance

  • As the incoming Trump administration and Republicans in Congress are likely to use the American government’s vast surveillance machinery more than any administration in US history, individuals must upgrade their data security and surveillance resistance.
  • Top-down legal and policy limits on data collection and bottom-up technological protections can protect from surveillance.
  • Securing communications is the first step for data security. End-to-end encrypted messengers and devices can help protect messages and phone calls.
  • Encrypting devices involves enabling full disk encryption and setting strong alphanumeric passwords.
  • Cloud services can be secured and the amount of data in the cloud should be limited to confidential information. End-to-end encrypted data backups and storage schemes can also be used to protect cloud data.
  • Personal information is revealed through internet usage, but anonymity can be ensured through Tor Browser, VPN, and private browsing features.
  • Location data can be protected through limit tracking on mobile apps and operating systems, putting devices in airplane mode, and shutting them down when not in use. Burner phones and cash transactions offer other protection measures.
  • It is possible for digital evidence from individuals’ past to be dug up and used to track and target them, but there are precautions people can take to protect their digital privacy.
  • Individuals should start taking precautions to protect their digital privacy, as the incoming Trump administration is committed to targeting their enemies with every tool available.

Read Full Article

like

1 Like

source image

HRKatha

1M

read

178

img
dot

Image Credit: HRKatha

Amazon employee data breach exposes contact information

  • Amazon confirmed a data breach affecting employee information due to a vulnerability in a third-party vendor's system.
  • The breach exposed work-related contact details such as employee emails, desk phone numbers, and building locations.
  • Sensitive information like Social Security numbers and financial data remained secure, and Amazon's core systems were unaffected.
  • This incident highlights the challenges of managing cybersecurity across third-party services and the need for comprehensive security practices within vendor networks.

Read Full Article

like

10 Likes

source image

Siliconangle

1M

read

307

img
dot

Image Credit: Siliconangle

New AI tool from Immersive Labs automates cyberthreat scenario creation

  • Immersive Labs has launched AI Scenario Generator, a tool that enables organizations to create threat scenarios for cybersecurity training
  • Users can input prompts to generate customized cyber exercises to improve skills against various attack types
  • The tool reduces the time required for creating custom scenario content and supports personalized learning
  • Immersive Labs has raised $189 million in funding and offers over 2,500 hands-on exercises and labs developed by cybersecurity experts

Read Full Article

like

18 Likes

source image

Wired

1M

read

73

img
dot

Image Credit: Wired

The Real Problem With Banning Masks at Protests

  • Government officials across the US are pushing mask bans to hold protestors accountable to law enforcement, but privacy experts and activists warn that mask bans could chill free speech and open protesters up to identification and harassment by political opponents.
  • Protesting anonymously is as old as America itself, but Americans’ ability to do so appears to be in jeopardy as government officials across the country push mask bans to hold protesters accountable to law enforcement.
  • The earliest mask bans date back to the 1840s, when New York prohibited face coverings after roving bands of protesters terrorized landlords in the Hudson Valley.
  • Many activists also worry about “doxxing,” publishing someone’s personal information online with malicious intent.
  • Mask bans seemingly make it easier for political opponents to identify and dox people while adding little value for police.
  • The legal landscape surrounding how law enforcement can use surveillance technologies has been hazy, largely because the law hasn’t kept up with the pace with technological development.
  • Phone manufacturers have also been making strides with regard to technological solutions to subvert surveillance methods.
  • Determining when police use surveillance technology can be difficult.
  • There's been a big shift in how we need to think about what it means to have an expectation of privacy in a public space.
  • Privacy experts and activists believe that the US government is compromising free speech and privacy through the implementation of mask ban laws.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app