menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Securityaffairs

1M

read

348

img
dot

Image Credit: Securityaffairs

Ymir ransomware, a new stealthy ransomware grow in the wild

  • Kaspersky researchers discovered a new ransomware family called Ymir ransomware.
  • Ymir ransomware was deployed after breaching systems via PowerShell commands.
  • The ransomware uses the stream cipher ChaCha20 algorithm to encrypt files.
  • The attack involved the use of RustyStealer malware as a precursor to weaken defenses.

Read Full Article

like

20 Likes

source image

Medium

1M

read

151

img
dot

Image Credit: Medium

AI Integration for Enhanced Private Network Protection

  • AI systems are adept at identifying and classifying sensitive information, inspecting packets and patterns, monitoring data flows across the network, detecting anomalies, and responding to potential threats.
  • Incorporating the latest software-driven crypto acceleration techniques, private network sites can protect sensitive data, ensuring that proprietary information and operational data remain secure against potential breaches without hindering manufacturing operations.
  • In manufacturing settings, data such as operational metrics, machine performance logs, and real-time sensor readings must be continuously monitored. This data comes in various formats and originates from multiple sources, including IoT devices, industrial control systems, and enterprise resource planning software.
  • The implementation of software-driven crypto acceleration techniques must be optimized to ensure there is no latency or bottlenecks in the network.
  • NEXCOM’s DNA 140 is a compact AI-in-a-Box network appliance, built on the newest Intel Atom® x7433RE processor (Codenamed Amston Lake) optimized for Edge computing and software-defined network.
  • Intel Atom® x7433RE features software-driven Intel® QuickAssist Technology (Intel® QAT) that offers greater flexibility compared to hardware-based Intel® QAT in legacy processors.
  • Enabling the NEXBOOT function on DNA 140 allows uninterrupted services and prevents downtime, establishing a secure foundation for operations. This value-added feature enhances the overall stability of private networks in factory settings.
  • With its high frame rate, object detection is possible without motion blur or lag.
  • As the cybersecurity landscape evolves, the ongoing development and integration of AI and software-driven technologies will be pivotal in maintaining robust defenses and supporting the secure growth of smart environments.
  • NEXCOM’s DNA 140 deployed in private networks helps to keep digital domains secure and resilient. Its advanced AI extension capabilities offer flexibility and adaptability to smart threat detection in cybersecurity applications.

Read Full Article

like

9 Likes

source image

Pymnts

2M

read

55

img
dot

Image Credit: Pymnts

Report: Retailers See Tokenization as Investment in Improving the Checkout Experience

  • Network tokens offered by major credit card networks are poised for further growth, with 77% of merchants not currently offering network tokens planning to roll them out.
  • 92% of PSPs that already enable the technology plan to invest in further capability to upgrade areas such as digital wallet card payments, card-on-file payments, and recurring payments.
  • Merchants and PSPs express concerns about service fees and costs, with fees being identified as a top concern. Service providers need to educate potential customers about tokenization's full value proposition.
  • A PYMNTS Intelligence and Mastercard collaboration report explores the adoption rates, use cases, advantages, and expected growth of network tokens, providing crucial information for merchants and PSPs.

Read Full Article

like

3 Likes

source image

Cybersecurity-Insiders

2M

read

188

img
dot

Image Credit: Cybersecurity-Insiders

Rising Threat of Malware and DDoS Attacks on Government Organizations

  • The FBI and CISA have issued warnings about the increasing threat of DDoS attacks on government organizations, including election infrastructure.
  • Attacks on everyday devices with weak security, such as IP cameras, are being used as backdoors to initiate widespread cyberattacks.
  • Potential impacts of these attacks include compromised physical security, delayed voting, and eroded public confidence in election integrity.
  • Mitigation strategies include regular firmware updates, network segmentation, and enforcing strict authentication measures.

Read Full Article

like

11 Likes

source image

Dev

2M

read

377

img
dot

Image Credit: Dev

Preventing SQL Injection (SQLi) Attacks in Drupal

  • SQL Injection (SQLi) is a common and potentially destructive security vulnerability that allows attackers to interfere with an application’s database.
  • Drupal, a popular CMS, is also susceptible to SQLi if not configured properly, making it essential for website administrators to take preventive measures.
  • Drupal has historically been targeted by SQLi attackers, highlighting the critical need for secure coding practices and frequent security audits.
  • To prevent SQLi in Drupal, it is important to use parameterized queries, update Drupal regularly, limit database privileges, and implement web application firewalls.

Read Full Article

like

22 Likes

source image

Lastwatchdog

2M

read

316

img
dot

GUEST ESSAY: The promise and pitfalls of using augmented reality– ‘AR’ — in cybersecurity

  • Augmented reality (AR) can be applicable in various cybersecurity domains, especially for AR-based training simulations that can simulate cyber attacks.
  • AR-enabled threat detection interfaces can also aid professionals in monitoring security protocols quickly and efficiently.
  • The implementation of AR in cybersecurity infrastructure is expensive and must be considered, although the convergence of these technologies could enhance its impact.
  • Privacy risks are a major area of concern associated with AR technology, especially as devices collect vast amounts of data, and hijacking overlays could lead to individuals being monitored without their knowledge.
  • AR technology could become a funnel for live cyberattacks, and criminals could exploit it to create convincing deepfakes to deceive gullible victims.
  • The immersive nature of AR can significantly improve cybersecurity training and make it more effective by providing hands-on, real-time experience and interactive simulations.
  • AR can provide proactive threat detection with predictive capabilities for identifying potential attack vectors before they occur.
  • The future of AR technology in cybersecurity looks promising as AR technology continues to evolve, but developers must address the security risks associated with it and mitigate them.
  • The use of AR technology in cybersecurity can have both positive and negative consequences, and organizations must weigh their benefits and security risks associated with the technology before integrating them into their cybersecurity infrastructure.
  • AR technology has the potential to redefine how organizations approach threat management, incident response, and training, offering professionals powerful tools to address dynamic cybersecurity challenges.

Read Full Article

like

19 Likes

source image

Cybersecurity-Insiders

2M

read

215

img
dot

Image Credit: Cybersecurity-Insiders

5 Identity Theft Challenges Every Business Needs to Tackle

  • Business identity theft is increasing posing a problem for a company’s bottom line reputation and customer trust.
  • In 2024, over one-third of online merchants experienced business identity theft.
  • Business identity theft is far more complex than consumer identity theft. It often involves grand scale financial fraud, tax evasion and supply chain manipulation.
  • Business identity theft carries heavy financial consequences, from direct losses to the costs of recovering stolen funds.
  • The fallout from business identity theft goes beyond financial loss. When fraud occurs, it can shake the confidence of customers, partners and suppliers, undermining trust in the business.
  • Businesses must strike a delicate balance between enhancing security and maintaining a smooth customer experience.
  • Fighting fraud requires a lot of work. Given the complexity of identity theft and the increasingly sophisticated tactics used by criminals, businesses can benefit from partnering with external fraud prevention experts.
  • To ensure end-of-year sales are safeguarded during the busy holiday season, companies must recognize business identity theft is present, complex and can have long-standing impacts on customer trust and public reputation.
  • By offering seamless, consistent and financially secure experiences, businesses can boost buyer loyalty and order values for the holidays and beyond.
  • Leveraging partners with fraud prevention tools and expertise can also help quickly combat suspicious transactions, while allowing business leaders to focus on driving revenue and meeting buyer payment preferences.

Read Full Article

like

12 Likes

source image

Cybersecurity-Insiders

2M

read

445

img
dot

Image Credit: Cybersecurity-Insiders

Best Practices in Penetration Testing: Ensuring Robust Security

  • Penetration testing is a cybersecurity strategy to identify and address vulnerabilities in systems, networks, and applications.
  • Clear objectives and scope, a certified skilled testing team, and a phased approach are crucial for a successful penetration test.
  • Red Teaming takes testing a step further by simulating full-scale, real-world cyber-attacks to better understand the overall cybersecurity readiness.
  • Comprehensive penetration testing involves testing across several attack vectors, like web application testing, network testing, and social engineering.
  • Penetration testing must adhere to legal and ethical standards, and consent to the testing must be obtained.
  • Continuous communication and collaboration, thorough reporting, and actionable remediation plans are key to a successful testing strategy.
  • Retesting after remediation is vital to ensure that the fixes have been properly applied and no new vulnerabilities have been introduced.
  • Regular penetration testing, along with a strong security culture, will help organizations stay ahead of evolving threats in the ever-changing digital landscape.
  • Following these best practices can significantly enhance an organization's security posture and reduce the risk of data breaches, financial loss, and reputation damage.

Read Full Article

like

26 Likes

source image

Cybersecurity-Insiders

2M

read

50

img
dot

Image Credit: Cybersecurity-Insiders

The Growing Threat of Ransomware in 2024: What You Need to Know

  • Ransomware attacks are increasingly becoming a top of mind challenge for organizations as they are causing operational disruptions and other material harms.
  • Between Q1 and Q2 of 2024, there has been a 20% surge in the number of organizations featured on ransomware leak sites, demonstrating the escalating threat of ransomware attacks.
  • Phishing attacks along with malware delivering ransomware are some of the common ways ransomware infiltrates an organization’s systems.
  • Remote Access Trojans (RATs) or Loaders are used to deliver ransomware, and the use of legitimate file-sharing websites makes it harder to differentiate between benign and malicious behavior.
  • Ransomware is most often delivered through the use of Initial Access Brokers (IABs), which sell access to infected computers across organizations, making it important for organizations to focus on how they procure IT resources from third-party vendors.
  • Companies and cybersecurity teams should examine real-world examples of malware that bypass Secure Email Gateways (SEGs) to gain a deeper understanding of the current threat landscape.
  • Implementing security awareness training that instills a sense of suspicion when it comes to online interactions and activities is one of the most effective steps a company can take to bolster proactive defenses.
  • Some of the notable ransomware groups observed bypassing SECs in the past six months include LockBit 3.0, BlackCat, BianLian, Akira, and BlackSuit.
  • Preventive measures and early detection are important to minimize the impact of an attack.
  • Ensuring security standards are met throughout supply chains and that third party access is tightly controlled is vitally important to mitigating risks.

Read Full Article

like

3 Likes

source image

Cybersecurity-Insiders

2M

read

32

img
dot

Image Credit: Cybersecurity-Insiders

Apple iPhone inactivity reboot data security feature and Amazon data breach 2024

  • Apple introduces 'Inactivity Reboot' security feature to protect iPhones from theft and data breach.
  • The feature automatically triggers a restart after a specified period of inactivity, ensuring higher security by locking the device out.
  • Amazon confirms data breach involving 2.8 million employee records via MoveIT vendor.
  • While the stolen data does not contain highly sensitive information, it still poses a significant threat to privacy and can be used for targeted cybercrime.

Read Full Article

like

1 Like

source image

Tech Radar

2M

read

129

img
dot

Image Credit: Tech Radar

Watch out, that Excel document could be infected with dangerous malware

  • Hackers are distributing a fileless version of the Remcos RAT, a Remote Access Trojan.
  • Phishing emails with a malicious Excel file are used to exploit a remote code execution vulnerability in Office.
  • The file downloads and runs Remcos RAT, which can steal sensitive files, log keystrokes, and execute commands.
  • Phishing via email remains a popular and effective method for malware distribution.

Read Full Article

like

7 Likes

source image

Cybersecurity-Insiders

2M

read

142

img
dot

Image Credit: Cybersecurity-Insiders

2025 Global State of API Security Report – New Data Shows API Breaches Continue to Rise Due to Fraud, Bot Attacks, and GenAI Risks

  • The 2025 Global State of API Security Report reveals that 57% of organizations have experienced API-related breaches in the past two years.
  • Traditional security measures like WAFs and API gateways are inadequate for API protection, with only 19% of organizations considering their defenses highly effective.
  • Generative AI applications pose serious risks to APIs, with 65% of organizations perceiving them as a significant threat.
  • Bot attacks and fraud are widespread, with over 50% of organizations encountering such incidents targeting their APIs.

Read Full Article

like

8 Likes

source image

Cultofmac

2M

read

763

img
dot

Image Credit: Cultofmac

iPhone does a trick that makes it harder to hack

  • iPhone running iOS 18.1 has a new feature called 'inactivity reboot' which restarts the device after four days of inactivity to make it harder to hack.
  • An iPhone that hasn't been unlocked since the last reboot is difficult to hack, while one that has been unlocked is easier to crack.
  • This new feature affects police and repressive regimes trying to access seized iPhone units or target activists and journalists.
  • Apple's commitment to privacy and security is evident in its continuous efforts to protect user data and embed privacy protections in their products.

Read Full Article

like

12 Likes

source image

Pymnts

2M

read

330

img
dot

Image Credit: Pymnts

Grocery Giant Ahold Delhaize Reports Cybersecurity Issue Within US Network

  • Ahold Delhaize, the grocery giant, has reported a cybersecurity issue within its U.S. network.
  • Some of Ahold Delhaize USA brands and services were affected when the company took systems offline to protect them.
  • Pharmacies and eCommerce operations of the company were impacted by the issue and subsequent mitigating actions.
  • Ahold Delhaize's security teams are investigating with external experts and have notified law enforcement.

Read Full Article

like

19 Likes

source image

Medium

2M

read

293

img
dot

Image Credit: Medium

Level 1: Directed Security Operations

  • Directed Security Operations using AI is gaining traction in the cybersecurity landscape for small to medium-sized businesses (SMBs).
  • Directed AI acts as an assistant, following human direction to execute specific tasks, such as generating AWS Web Application Firewall (WAF) rules.
  • Benefits of Directed AI for SMBs include increased efficiency, cost savings, and risk mitigation.
  • A practical use case example demonstrates how OpenAI's API can be used to generate a suggested AWS WAF rule based on user input.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app