menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Securityaffairs

6d

read

57

img
dot

Image Credit: Securityaffairs

Nova Scotia Power discloses data breach after March security incident

  • Nova Scotia Power confirmed a data breach after a security incident in April where sensitive customer data was stolen.
  • In April, Nova Scotia Power and Emera experienced a cyber attack affecting their IT systems without causing power outages.
  • The companies shut down affected servers due to unauthorized network access detected on April 25, impacting customer services.
  • The data breach involved theft of customer information including names, contact details, account history, driver’s license numbers, and Social Insurance Numbers.

Read Full Article

like

3 Likes

source image

Medium

6d

read

165

img
dot

Image Credit: Medium

The Great Steam “Hack” of 2025

  • Headlines blared about '89 Million Steam Accounts Hacked', causing a stir in the gaming community.
  • Hackers attempted to sell secret data for $5,000, but the actual 'stolen' data turned out to be expired SMS 2FA codes and unlinked phone numbers.
  • Valve dismissed the incident as no breach, clarifying that only outdated codes were involved.
  • Ultimately, the hackers did not gain access to valuable information like passwords or credit card details, leaving the gaming world relieved.

Read Full Article

like

9 Likes

source image

The Verge

6d

read

12

img
dot

Image Credit: The Verge

Coinbase says ‘rogue’ support agents helped steal customer data

  • Coinbase disclosed that 'rogue' support agents were involved in helping cyber criminals steal customer data and deceive victims into sending money to attackers.
  • As a result of the attack, a 'small subset of users' had their names, addresses, phone numbers, government IDs images, account data, and partial social security numbers compromised.
  • Coinbase received an email from a threat actor demanding $20 million to prevent the exposure of certain Coinbase accounts, but the company refused to pay.
  • Coinbase is collaborating with law enforcement, terminated the involved personnel, and plans to press criminal charges. The attackers did not access login credentials, 2FA codes, or private keys but the company could spend $180 million to $400 million repaying affected customers.

Read Full Article

like

Like

source image

TronWeekly

6d

read

149

img
dot

Image Credit: TronWeekly

Telegram Silently Dismantles $27B Darknet Giant Haowang Guarantee

  • Telegram shut down the darknet marketplace Haowang Guarantee, formerly Huione Guarantee, following its clampdown on associated accounts and channels on May 13.
  • Haowang Guarantee was involved in billions of dollars worth of illicit crypto transactions and was known for enabling online fraud, cybercrimes, and large-scale cryptocurrency laundering.
  • Blockchain company Elliptic identified over $27 billion in contraband crypto-transactions linked to Haowang Guarantee, predominantly processed through Tether stablecoin.
  • Despite the closure of Haowang Guarantee, another darknet market named Xinbi Guarantee has emerged on Telegram, conducting $8.4 billion in crypto transactions primarily through stablecoins.

Read Full Article

like

8 Likes

source image

Embedded

6d

read

37

img
dot

Microchip Introduces MEC175xB Controllers with Hardware-Based Post-Quantum Cryptography for CNSA 2.0 Compliance

  • The National Security Agency (NSA) introduced the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) to establish quantum-resistant cryptography standards.
  • Microchip Technology developed the MEC175xB family of embedded controllers with immutable post-quantum cryptography directly in hardware.
  • MEC175xB controllers support CNSA 2.0-compliant cryptographic techniques approved by NIST and feature secure boot options for enhanced system integrity.
  • The controllers, powered by an Arm Cortex-M4F processor, offer 480 KB of SRAM, I3C host/client functionality, and USB 2.0 interface for versatile connectivity in applications.

Read Full Article

like

2 Likes

source image

Medium

6d

read

136

img
dot

Image Credit: Medium

Strangers in the Sky Club

  • A woman experienced a surreal text exchange with a stranger who mistook her for someone else while sitting in the Delta Sky Club, leading to a series of coincidences and digital overlaps.
  • The man, Jesse, thought he was texting Natalie from A. for a research project meeting, unaware that he had actually contacted a different Natalie who was writing about digital identity and career pivots at the time.
  • Despite the confusion, the encounter felt algorithmic and purposeful, revealing the accidental connections and digital overlaps that shape modern interactions and identities.
  • The incident highlighted how mistaken messages can unexpectedly lead to candid and validating conversations, emphasizing the complex nature of human connection and digital identity in today's age.

Read Full Article

like

8 Likes

source image

Securityaffairs

6d

read

264

img
dot

Image Credit: Securityaffairs

Coinbase disclosed a data breach after an extortion attempt

  • Coinbase disclosed a data breach after rogue contractors stole customer data and demanded a $20M ransom.
  • The breach, affecting under 1% of users, was reported to the SEC after a ransom demand was received on May 11, 2025.
  • The unauthorized access was detected in previous months, leading to termination of involved personnel and implementation of heightened fraud-monitoring measures.
  • Compromised data includes contact details, partial SSNs and bank info, ID images, account history, and limited internal documents but did not expose passwords, private keys, or customer funds.

Read Full Article

like

15 Likes

source image

Siliconangle

6d

read

252

img
dot

Image Credit: Siliconangle

NetApp puts strategy over hype in race to real-world AI outcomes

  • NetApp Inc. prioritizes strategy over hype in approaching AI and data infrastructure challenges.
  • CEO George Kurian emphasizes a commitment to progress that aligns with long-term responsibility.
  • NetApp's Intelligent Data Infrastructure strategy focuses on managing risk, empowering AI, and ensuring performance at scale.
  • Kurian identifies flash, AI, block, and cloud as key market drivers shaping NetApp's strategy.
  • The company's customer-first approach involves deliberate focus and saying 'no' to initiatives that don't align.
  • NetApp provides AI-ready infrastructure that aims to protect data, ensure AI-readiness, and offer intelligent data services.
  • The company supports real-time decision-making through performance, scalability, and security in mission-critical environments.
  • NetApp's partnerships extend to sports entities like the National Football League and the San Francisco 49ers, enhancing data-driven fan experiences.
  • Through collaborations with companies like Intel, NetApp simplifies AI deployment, focusing on outcomes and security for partners and customers.
  • As businesses strive to translate AI ideas into tangible benefits, NetApp's infrastructure and solutions play a key role in delivering practical outcomes.
  • The emphasis on AI and data complexity highlights the need for solution providers to guide businesses toward faster, more efficient outcomes.

Read Full Article

like

15 Likes

source image

Infoblox

6d

read

388

img
dot

Image Credit: Infoblox

Blocking Shadow AI Using Protective DNS—Simple yet Powerful

  • Generative AI applications are being widely adopted by organizations, leading to unique risks in areas such as security, privacy, and organizational reputation.
  • Approximately 50% of employees use unapproved AI tools, known as 'Shadow AI,' despite security risks and corporate policies prohibiting their use.
  • Organizations need to implement preemptive cyber defense approaches to manage the risks associated with unsanctioned AI usage, such as identifying and blocking such applications.
  • Using a Protective DNS solution like Infoblox Threat Defense can help organizations identify and block unsanctioned AI applications based on DNS activity, providing a simple yet powerful method to enhance security.

Read Full Article

like

23 Likes

source image

Dataprivacyandsecurityinsider

6d

read

314

img
dot

Employees Hiding Use of AI Tools at Work

  • One out of three workers secretly use artificial intelligence tools in the workplace for various reasons including seeking a competitive advantage and uncertainty about job security.
  • By 2025, 42% of employees are projected to use generative AI tools at work, with significant percentages reporting feelings of resentment and presenteeism.
  • The secret use of AI tools poses risks such as unauthorized data disclosure, cybersecurity vulnerabilities, bias, and intellectual property misappropriation.
  • The study underlines the importance of organizations adopting an AI Governance Program to ensure employees feel comfortable using approved AI tools and to mitigate risks associated with unauthorized tool use.

Read Full Article

like

18 Likes

source image

Pymnts

6d

read

148

img
dot

Image Credit: Pymnts

Proofpoint to Acquire Hornetsecurity and Expand Human-Centric Security Solution Worldwide

  • Proofpoint plans to acquire Hornetsecurity Group to enhance human-centric security for small- to medium-sized businesses worldwide through managed service providers (MSPs).
  • The definitive agreement for the acquisition is expected to close in the second half of the year, subject to customary closing conditions.
  • The deal will add Hornetsecurity Group’s AI-powered Microsoft 365 security, data protection, and compliance services in Europe to Proofpoint’s cybersecurity and compliance solutions globally.
  • Upon acquisition closing, Proofpoint intends to offer the Hornetsecurity platform to MSPs and their customers worldwide to improve security across digital channels.

Read Full Article

like

8 Likes

source image

Medium

6d

read

210

img
dot

Image Credit: Medium

Outdated + Reliable = Freedom

  • Big companies are blending devices and services to categorize users based on online behavior for targeted advertisements and recommendations.
  • Advancements in AI enable detailed tracking of user data from various sources, leading to effective manipulation for commercial gains.
  • Concerns arise about the loss of choice in technology consumption, as individuals are pressured to adopt the latest gadgets with reduced features and increased cloud dependency.
  • Some professionals are advocating for maintaining older software and hardware as a backup to counter the erosion of personal privacy and choice in the tech industry.

Read Full Article

like

12 Likes

source image

Tech Radar

6d

read

219

img
dot

Image Credit: Tech Radar

Google removes Chrome admin privileges to reduce threat posed by dodgy extensions

  • Google is removing Chrome admin privileges to reduce the threat posed by malicious extensions.
  • A Microsoft developer has submitted an update to Chromium, which will de-elevate Chrome to run without admin privileges by default.
  • This move aims to enhance user protection from suspicious extensions, risky websites, and other potentially malicious activities.
  • Microsoft advises users not to launch their browsers with admin rights to prevent malware and data theft.

Read Full Article

like

13 Likes

source image

Neuways

6d

read

334

img
dot

Image Credit: Neuways

Quishing scams in 2025: How to stay secure

  • Quishing scams involving fake QR codes have surged in 2025, leading to a significant increase in phishing attacks using QR codes to trick people into visiting malicious websites.
  • Organised crime groups are heavily involved in these scams, targeting high-traffic areas like car parks and restaurants by using fake QR codes that look identical to legitimate ones.
  • Businesses using QR codes should be cautious as they can become part of the problem if the right security measures are not in place, risking data theft, payment fraud, and reputational damage.
  • Red flags to watch for in QR code scams include unusual URLs, requests for app downloads outside of trusted stores, and suspicious payment or verification requests.

Read Full Article

like

20 Likes

source image

Medium

6d

read

384

img
dot

Image Credit: Medium

Who Holds the Key to the Houthi PC Small Group?

  • Jeffrey Goldberg, editor-in-chief of The Atlantic, found himself added to a Signal group chat where senior U.S. military officials were discussing confidential details about an upcoming operation in Yemen.
  • The incident highlights the cyber risks faced by organizations, including the escalating number of cyberattacks targeting everyone from governments to small businesses.
  • Small and medium-sized enterprises (SMEs) are particularly vulnerable to cyber threats, posing risks to entire supply chains and hindering the adoption of technology like generative AI solutions due to security concerns.
  • Recent events, such as Apple being fined for prioritizing user privacy and governments pushing for backdoors into encrypted systems, raise questions about who should have control over digital privacy and security in today's complex landscape.

Read Full Article

like

23 Likes

For uninterrupted reading, download the app