menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

6h

read

180

img
dot

Image Credit: Tech Radar

Deepseek faces ban in Germany as privacy watchdog reports the app to Google and Apple as "illegal content"

  • Germany urges Apple and Google to ban DeepSeek over privacy concerns.
  • Berlin watchdog cites alleged privacy violations, deems app 'unlawful'.
  • Italy already blocked DeepSeek over similar data privacy issues.

Read Full Article

like

10 Likes

source image

Medium

6h

read

204

img
dot

Image Credit: Medium

How secure are biometric systems for payments and privacy?

  • Biometric systems are commonly used for identity verification in payment systems, using physical traits like fingerprints, face scans, or eye recognition.
  • Despite their convenience, concerns about the security of biometric systems exist, as once biometric data is compromised, it cannot be changed like a password.
  • Biometric data is often stored in external servers or the cloud, making it susceptible to hacking and unauthorized access, with no option to reset the compromised data.
  • There are instances of biometric systems being tricked by fake fingerprints or face masks, highlighting potential vulnerabilities in these systems that could lead to unauthorized access and misuse.

Read Full Article

like

12 Likes

source image

Tech Radar

6h

read

62

img
dot

Image Credit: Tech Radar

US arrests Silk Typhoon hacker accused of stealing Covid research and mass email hacking

  • Italian authorities have arrested a 33-year-old Chinese national, Zewei Xu, accused of spying for the Chinese government and part of Silk Typhoon hacking collective.
  • Xu is wanted by the FBI for allegedly engaging in cyber-espionage operations to steal data related to anti-COVID vaccines at the University of Texas in 2020.
  • If convicted, Xu could face decades in jail, with charges including wire fraud, aggravated identity theft, and unauthorized access to protected computers.
  • Silk Typhoon is a state-sponsored threat actor involved in cybercriminal activities targeting critical infrastructure and government organizations.

Read Full Article

like

3 Likes

source image

TechCrunch

6h

read

278

img
dot

Image Credit: TechCrunch

How to protect your cell phone number from SIM swap attacks

  • In 2025, cell phone numbers are extensively used for online accounts and services, making them valuable targets for hackers to hijack identities.
  • SIM swapping attacks involve hackers impersonating victims with cell carriers to transfer phone numbers to different SIM cards, granting unauthorized access.
  • Major carriers like AT&T, T-Mobile, and Verizon have introduced security features to combat SIM swap attacks by preventing unauthorized number transfers and SIM swaps.
  • Users are advised to proactively enable these security features provided by their carriers to protect their phone numbers from being hijacked.

Read Full Article

like

16 Likes

source image

TechBullion

7h

read

61

img
dot

Image Credit: TechBullion

Beyond the Burn: How FUNToken’s Deflationary Engine Powers Real Utility

  • FUNToken implements a unique deflationary engine for sustained utility and engagement.
  • Revenue-backed token burns are integrated into a gaming ecosystem, boosting utility and value.
  • The project executed its largest burn, removing 25 million tokens to reinforce scarcity.

Read Full Article

like

3 Likes

source image

The Register

7h

read

483

img
dot

Image Credit: The Register

Qantas begins telling some customers that mystery attackers have their home address

  • Qantas revealed that a cyberattack on a third-party platform exposed personal information of 5.7 million individuals.
  • Affected data includes names, email addresses, frequent flyer numbers, customer tiers, status credits, and points balances.
  • Additional data accessed by cybercrooks in about one million cases included addresses, dates of birth, phone numbers, genders, and meal preferences.
  • Qantas has increased security measures, notified affected customers, and is monitoring for potential dark web data leaks.

Read Full Article

like

5 Likes

source image

Ars Technica

7h

read

87

img
dot

Image Credit: Ars Technica

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

  • A critical vulnerability in Citrix's network management devices has been actively exploited for more than a month, despite the vendor's advisories stating otherwise.
  • The vulnerability, tracked as CVE-2025-5777, is similar to a previous flaw known as CitrixBleed, which led to the compromise of 20,000 Citrix devices two years ago.
  • Citrix disclosed the newer vulnerability and released a patch on June 17 but stated they were 'currently unaware of any evidence of exploitation', while researchers found evidence of active exploitation since at least June 23.
  • Security firms have criticized Citrix for withholding indicators that could help customers determine if their networks are under attack, stating that merely patching vulnerable devices is not enough and that customers should look for signs of compromise.

Read Full Article

like

5 Likes

source image

Softwaretestingnews

7h

read

189

img
dot

Image Credit: Softwaretestingnews

How to strengthen cyber defences

  • Unresolved security flaws accumulate as 'security debt' and invite cyberattacks on businesses.
  • Many organizations struggle with unresolved critical flaws, leading to increased risk of cyberattacks.
  • Prioritizing fixing critical flaws and implementing AI can help reduce security debt efficiently.

Read Full Article

like

11 Likes

source image

Global Fintech Series

7h

read

238

img
dot

Image Credit: Global Fintech Series

Finastra Appoints Adam Banks to Board of Directors

  • Finastra announced the appointment of Adam Banks to its Board of Directors, bringing deep transformation expertise in financial services, cybersecurity, and infrastructure sectors.
  • Banks has extensive experience in digital transformation, having held senior roles at influential companies such as A.P. Moller–Maersk, where he led technology transformation post-cyberattack.
  • As a technology leader, Banks has also worked at companies like FINkit and Visa, providing advisory services to a diverse portfolio of firms, from top corporations to startups.
  • His appointment through Vista Equity Partners creates a pathway for talented board candidates to drive results for Finastra and other portfolio companies, marking a pivotal time for Finastra's future growth.

Read Full Article

like

13 Likes

source image

Devopsonline

7h

read

344

img
dot

Image Credit: Devopsonline

Gain the edge over security debt and strengthen cyber defences

  • Unresolved security flaws lead to 'security debt' and invite cyber-attacks on businesses.
  • Research shows that many organizations struggle with unresolved critical security flaws.
  • Accumulation of security debt can be reduced with AI solutions and proactive strategies.

Read Full Article

like

20 Likes

source image

Shinyshiny

8h

read

84

img
dot

Image Credit: Shinyshiny

Think your hotel room is safe? 5 ways hackers can target you on vacation

  • Cybercriminals can target travelers in hotel rooms, making vacations risky for personal data.
  • Ways devices can be hacked on vacation include hotel Wi-Fi vulnerabilities, USB charging ports for 'juice jacking,' insecure smart TVs, automatic connections to insecure networks, and phishing scams.
  • Safety precautions: Confirm correct Wi-Fi network, use mobile data, avoid public USB charging ports, unplug smart TVs, disable auto-connect features, and be vigilant against phishing.
  • Travelers are advised to prioritize digital security measures to protect their personal information while on vacation.

Read Full Article

like

5 Likes

source image

Tech Radar

8h

read

123

img
dot

Image Credit: Tech Radar

Many workers wouldn't tell their bosses if they'd been hit by a cyberattack

  • Two in five office workers in the UK would not inform their company's cybersecurity teams if they suspected a cyberattack at work, citing worries of being blamed or getting into trouble.
  • Despite a good understanding of cyberattacks, with 43% of UK workers knowing about ransomware, workers often choose to remain silent about potential cyber threats.
  • Factors like embarrassment over being blamed (17%) or causing a fuss (15%) contribute to workers not reporting cyber incidents, despite data showing the high cost and risks associated with delays in incident response.
  • Cohesity stresses the importance of a workplace culture that encourages employees to speak up about cyber threats, supported by cybersecurity training and a holistic approach to cyber resilience.

Read Full Article

like

7 Likes

source image

Medium

8h

read

199

img
dot

Image Credit: Medium

The Daily Tech Digest: 09 July 2025

  • Join our diverse community on various platforms for updates and content.
  • AI and Machine Learning see advancements with OpenAI's aggressive talent acquisition.
  • Grok chatbot generates antisemitic content, emphasizing algorithmic ethics and oversight needs.
  • Generative AI revolutionizes shopping experience during Prime Day sales.

Read Full Article

like

9 Likes

source image

Tech Radar

9h

read

256

img
dot

Image Credit: Tech Radar

M&S thinks it might finally know what caused cyberattack - but still won't say if it paid a ransom

  • M&S believes the recent cyberattack was carried out by the group DragonForce, originating from Asia or Russia.
  • M&S Chairman Archie Norman emphasized the need for greater transparency regarding cyberattack reporting at a UK Parliament hearing.
  • The initial breach involved social engineering, with an attacker impersonating an M&S worker to reset an employee's password.
  • 150GB of data was stolen in the cyberattack, recovery efforts ongoing with full recovery expected by October or November 2025.

Read Full Article

like

14 Likes

source image

The Verge

9h

read

231

img
dot

Image Credit: The Verge

Activision pulls Call of Duty game after PC players are hacked

  • Activision has removed Call of Duty: WWII from the Microsoft Store and PC version of Game Pass due to reports of PC players being hacked after playing the game.
  • The outage only affects PC versions of the game from Microsoft's storefront and Game Pass, but the game remains playable on Steam, Xbox, and other platforms.
  • Reports on social media suggest that players had their PCs compromised, showing signs of remote code execution vulnerabilities after playing.
  • The issue may stem from different versions of the game with an old flaw being added to the Microsoft Store and subscription service in June. As of now, the game has not yet been reinstated.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app