menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Gbhackers

4h

read

190

img
dot

REvil Ransomware Affiliate Sentenced for 13 Years in Prison

  • A Ukrainian national, Yaroslav Vasinskyi, also known as Rabotnik, has been sentenced to 13 years and seven months in prison.
  • Vasinskyi orchestrated over 2,500 ransomware attacks worldwide and demanded over $700 million in ransom payments.
  • The Justice Department's international collaboration led to Vasinskyi's extradition from Poland to the United States.
  • The Department of Justice has obtained the final forfeiture of millions of dollars in ransom payments, further crippling the financial infrastructure supporting cybercrime.

Read Full Article

like

11 Likes

source image

Gbhackers

4h

read

20

img
dot

USB Malware Attacks Targeting Industrial Systems Adapts LOL Tactics

  • Honeywell’s 2024 GARD USB Threat Report reveals a 33% rise in malware detections on USB devices used in industrial settings.
  • 26% of the malware can cause major disruptions to operational technology (OT) systems.
  • USB-based threats are increasingly targeting industrial control systems (ICS) and Internet of Things (IoT) devices.
  • Robust USB security measures are needed to protect critical infrastructure from cyberattacks.

Read Full Article

like

1 Like

source image

Cybersecurity-Insiders

5h

read

341

img
dot

Image Credit: Cybersecurity-Insiders

United Health CEO testifies before senate for ransomware attack

  • In February, Change Healthcare experienced a ransomware attack causing disruptions in medical supply chains and billing procedures.
  • UnitedHealth CEO, Andrew Witty, testified before the Senate regarding the cyber attack.
  • Witty attributed the incident to the absence of multi-factor authentication.
  • Initial estimates suggest a financial loss of $22 million, with concerns of it escalating in the coming months.

Read Full Article

like

20 Likes

source image

Medium

5h

read

41

img
dot

Image Credit: Medium

Decoding Cybersecurity: Unveiling the MITRE ATT&CK Framework and Beyond

  • The MITRE ATT&CK Framework provides a comprehensive approach to understanding and countering cyber threats.
  • The framework consists of tactics, techniques, and procedures (TTPs) used by threat actors.
  • It enables threat hunting based on IOAs and TTPs, making hypothesis-based hunting more effective.
  • In addition to TTPs, the framework provides information on data sources, detections, mitigations, groups, software, and campaigns.

Read Full Article

like

2 Likes

source image

Medium

5h

read

148

img
dot

Image Credit: Medium

Unveiling the Perils of the Dark Web: Why Is It So Dangerous?

  • The dark web is a mysterious and dangerous realm lurking beneath the surface of the internet.
  • It requires specialized software like Tor to access and is known for illegal activities.
  • The dark web is dangerous due to its anonymity and involvement in drug trafficking, cybercrime, human trafficking, and illicit trade of sensitive information.
  • Despite its allure, the dark web poses significant dangers and risks for unsuspecting users.

Read Full Article

like

8 Likes

source image

Ghacks

5h

read

24

img
dot

Image Credit: Ghacks

Bitwarden launches standalone Bitwarden Authenticator app

  • Bitwarden has released a first public version of Bitwarden Authenticator, a two-factor authentication app for Android and iOS.
  • The app generates codes for services, improving account security by requiring a second step of authentication.
  • Bitwarden Authenticator is a standalone app and can be used without the Bitwarden password manager.
  • Upcoming features include import option, sync with Bitwarden account, push-based 2FA, account recovery, and workforce authentication.

Read Full Article

like

1 Like

source image

Medium

6h

read

180

img
dot

Image Credit: Medium

Redlight Cyber Security & IT Management WordPress Themes

  • Redlight Cyber Security & IT Management WordPress theme is designed for cyber security services and IT management.
  • The theme leverages Bootstrap 4 and offers essential elements like testimonials and dynamic services.
  • It is fully responsive and SEO-friendly, with multiple layout designs and compatibility with WooCommerce.
  • Redlight Cyber Security provides a powerful online presence for cyber security professionals and agencies.

Read Full Article

like

10 Likes

source image

Medium

6h

read

166

img
dot

Image Credit: Medium

Open Source Intelligence (OSINT): The Power of Public Information

  • OSINT refers to the collection and analysis of publicly available information from open sources.
  • Social media, news outlets, public records, websites, and forums are common sources of OSINT.
  • OSINT methodologies involve collection, verification, analysis, and dissemination of information.
  • OSINT is used for tracking social unrest, investigative journalism, corporate due diligence, and cyber threat intelligence.

Read Full Article

like

10 Likes

source image

Medium

6h

read

128

img
dot

Image Credit: Medium

Wifi Tools: Scripts & Programs

  • Wifi Network Scanner: Scans and detects Wifi networks.
  • Wifi Password Extractor: Extracts Wifi passwords.
  • Wifi Jammer: Disrupts Wifi signals.
  • Wifi Access Point Setup: Sets up Wifi access points.
  • Wifi Signal Strength Monitor: Monitors Wifi signal strength.
  • Wifi Intrusion Detection: Detects Wifi network intrusions.
  • Wifi Channel Analyzer: Analyzes Wifi channels.
  • Wifi Network Speed Test: Tests Wifi network speed.
  • Wifi MAC Address Filtering: Filters Wifi networks based on MAC addresses.
  • Wifi Network Performance Logger: Logs Wifi network performance.
  • Wifi Network Disassociation: Detaches devices from Wifi networks.
  • Wifi Rogue Access Point Detection: Detects rogue Wifi access points.
  • Wifi Network Traffic Analysis: Analyzes Wifi network traffic.
  • Wifi Password Cracker: Cracks Wifi passwords.
  • Wifi Network Mapper: Creates maps of Wifi networks.
  • Wifi Network Traffic Sniffer: Sniffs Wifi network traffic.
  • Wifi Network Connection Manager: Manages Wifi network connections.
  • Wifi Network Traffic Limiter: Limits Wifi network traffic.
  • Wifi Network Security Checker: Checks Wifi network security settings.

Read Full Article

like

7 Likes

source image

Cryptonews

6h

read

287

img
dot

Image Credit: Cryptonews

MicroStrategy Unveils Enterprise Platform ‘Orange’ for Decentralised Identity Applications On BTC

  • MicroStrategy has launched its Bitcoin-based digital identity platform called MicroStrategy Orange.
  • The platform leverages the Bitcoin blockchain to verify users' identities and enhance security.
  • MicroStrategy aims to integrate the platform with messaging platforms and explore use cases in decentralised identity systems.
  • In Q1 2024, MicroStrategy acquired an additional 25,250 BTC, bringing their total holdings to 214,400 BTC.

Read Full Article

like

17 Likes

source image

Medium

6h

read

316

img
dot

Image Credit: Medium

Nurturing Cyber Guardians: The Rise of Ethical Hacking and Cyber Security Institute in Rohtak City

  • The rise of an ethical hacking and cybersecurity institute in Rohtak City showcases the growing demand for cybersecurity expertise.
  • The institute offers diverse courses catering to varying skill levels, emphasizing ethical hacking as a means to understand and combat cyber threats.
  • Real-world application is a key component of the institute's curriculum, with hands-on practical exercises and simulations mirroring industry challenges.
  • The institute aims to cultivate ethical mindsets among students, equipping them with the knowledge and skills to safeguard digital assets for the greater good.

Read Full Article

like

19 Likes

source image

Medium

6h

read

233

img
dot

Image Credit: Medium

Infetech WordPress Template Kits

  • Infetech WordPress Template Kits is a collection of IT Solutions and Services templates designed for Agency, Apps, SaaS & Software, Start-ups, and more.
  • The template is easy to use, customizable, and powered by Hello Theme for optimal performance.
  • It requires Elementor and can be installed through the Envato Elements plugin or Elementor directly.
  • The kit includes demo images from Envato Elements, which need to be licensed or replaced with your own images.

Read Full Article

like

14 Likes

source image

readwrite

6h

read

496

img
dot

Image Credit: readwrite

Scam alert for Android users as ‘Brokewell’ malware threatens users’ bank accounts

  • Android users are being warned about a severe malware called 'Brokewell' that threatens their bank accounts.
  • Brokewell is a new virus with Device Takeover capabilities, designed to install an Android application through a fake browser update page.
  • The malware poses a significant threat to the banking industry as it provides hackers with remote access to mobile banking assets.
  • Brokewell uses overlay attacks to steal user information and can perform Device Takeover attacks with remote control capabilities.

Read Full Article

like

1 Like

source image

Medium

7h

read

66

img
dot

Image Credit: Medium

Data Security Icons Graphics

  • Icon Pack: Privacy, Encryption, Cybersecurity, Authentication, Firewall, Biometrics, Intrusion, Detection, Authorization, Vulnerability, Compliance, Confidentiality, Integrity, Access Control, Malware, Patching, Phishing, Incident, Forensics, Breach, Risk Management, Audit, Encryption, Authentication, Firewall, Intrusion, Compliance, Vulnerability, Confidentiality, Malware, Phishing, Forensics, Breach, Risk, Audit, Biometrics, Patching, Incident, Access Control, Detection.
  • Exceptional Features of the Icon Pack: Versatile File Formats: Available in PSD, SVG, and Transparent PNG for your convenience.
  • Top-notch Quality: These icons are meticulously designed in RGB format at 300 dpi, ensuring sharp and vivid imagery.
  • Seamless Compatibility: Created using Illustrator and Photoshop CC 2023, these icons are compatible with a range of software versions.

Read Full Article

like

3 Likes

source image

Geek Wire

7h

read

568

img
dot

Image Credit: Geek Wire

Former Microsoft engineers raise $3M for cybersecurity startup StepSecurity

  • Seattle-area startup StepSecurity has raised $3 million in a seed round led by Runtime Ventures.
  • Founded by former Microsoft engineers Ashish Kurmi and Varun Sharma, StepSecurity focuses on helping developers secure their projects, with a specific focus on CI/CD (continuous integration and continuous delivery) processes.
  • The startup targets developers using GitHub Actions and plans to expand its support to other similar tools like GitLab CI, Harness, and Azure DevOps.
  • StepSecurity has paying customers in industries such as crypto, healthcare, and cybersecurity, and aims to address the lack of security in CI/CD pipelines following high-profile security breaches.

Read Full Article

like

6 Likes

For uninterrupted reading, download the app