menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Wired

7d

read

312

img
dot

Image Credit: Wired

Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public

  • Several top Trump administration officials, including those in a Signal group chat, had leaked Venmo accounts, posing a counterintelligence risk.
  • The exposed officials include Dan Katz, Joe Kent, Mike Needham, and Brian McCormack, with detailed transactions and connections public.
  • Sensitive information like payment details, contacts, and activities were revealed through Venmo accounts, prompting concerns about foreign intelligence exploitation.
  • WIRED confirmed the officials' identities based on their linked accounts, and reactions from their respective departments are awaited.
  • Veterans of the US intelligence community warn of the risks posed by public Venmo transactions, citing potential leverage and risks to personal safety.
  • Security experts emphasize the importance of understanding data exposure risks and the potential exploitation by adversaries.
  • Venmo's contact syncing feature in the past facilitated the exposure of connections, making networks visible unless settings were actively changed.
  • Although Venmo deprecated this functionality, users' networks could remain visible unless privacy settings were adjusted.
  • Experts stress the need for vigilance at high levels of national security leadership to minimize risks associated with digital data exposure.
  • Adversaries' interest in even minor data points underscores the importance of safeguarding personal information in the digital age.

Read Full Article

like

18 Likes

source image

Hackernoon

7d

read

124

img
dot

Image Credit: Hackernoon

Why Cyber Threat Intelligence is Essential for Modern Businesses

  • Hackers nowadays gain access to systems using leaked credentials from old breaches, making it crucial for businesses to have cyber threat intelligence.
  • Cyber threat intelligence allows predicting and understanding threats, leading to proactive defense strategies to prevent cyberattacks.
  • It comes in various forms like strategic, tactical, operational, and technical threat intelligence, helping businesses stay ahead of evolving cyber threats.
  • By using threat intelligence platforms and security tools, organizations can analyze threats, detect vulnerabilities, and respond to incidents effectively.
  • Implementing cyber threat intelligence involves collecting, analyzing, and classifying threat data, as well as sharing relevant information with stakeholders and partners.
  • It is essential to assess security needs, choose the right tools, train employees, work with security experts, and keep intelligence data updated for effective implementation.
  • Challenges of cyber threat intelligence include data overload, high costs, and constantly changing threats, which can be managed through automation, cost-effective strategies, and staying updated.
  • The future of cyber threat intelligence lies in AI-driven automation, real-time threat sharing, and predictive analytics to enhance threat detection and response.
  • By investing in proactive security measures, businesses can effectively combat cyber threats and reduce the risks of costly attacks in the long run.
  • Using intelligence procedures and the right tools can help businesses outsmart criminals and ensure the safety of their business against cyber threats.

Read Full Article

like

7 Likes

source image

Medium

7d

read

108

img
dot

Image Credit: Medium

Watch Out, The Internet Army Is Coming For You

  • The internet provides a platform for individuals to easily express their opinions and judgements towards others, often without considering the consequences.
  • Social media has empowered people to act as 'digital police', publicly shaming and judging those they believe have acted wrongly.
  • While some may deserve criticism, the trend of online shaming raises questions about the impact on individuals' lives and where the line should be drawn.
  • Instances of individuals being publicly condemned online for their actions, such as losing their jobs or facing threats, reflect the power of internet outrage.
  • The viral nature of social media can quickly escalate incidents, leading to severe consequences for those targeted without proper consideration.
  • The lack of control over online outrage raises concerns about privacy, ethics, and the potential for innocent individuals to be unfairly targeted.
  • The importance of practicing empathy and respecting others' privacy online is highlighted, urging individuals to consider the impact of their actions and words.
  • Encouraging children to apply real-world relationship values to their online interactions can help foster a more respectful and compassionate digital community.

Read Full Article

like

6 Likes

source image

Embedded

7d

read

133

img
dot

Thistle Technologies Expands Embedded Security Platform with OTA Updates and Secure Boot Solutions

  • Thistle Technologies has expanded its embedded device security platform with over-the-air (OTA) updates and secure boot solutions.
  • The Thistle Update package includes device software, developer tools, and Thistle Cloud components, offering seamless firmware and software updates for embedded devices running Linux® and powered by Infineon PSOC 6 microcontrollers.
  • Thistle also unveiled the Secure Boot Enablement solution, providing tools and services for implementing secure and verified boot processes on supported hardware.
  • These enhancements strengthen Thistle Technologies' position as a leader in embedded security, enabling manufacturers to deploy secure and updatable systems in today's connected world.

Read Full Article

like

8 Likes

source image

Siliconangle

7d

read

316

img
dot

Image Credit: Siliconangle

Three insights you may have missed from theCUBE’s coverage of MWC25

  • Businesses are focusing on AI adoption, automation, and edge computing while maintaining ethics, security, and sustainability.
  • The integration of AI and automation is crucial for driving meaningful change in enterprises.
  • Telcos are recognizing the potential of AI and the importance of networks in supporting innovation.
  • AI-powered automation is transforming enterprise innovation but also raises security and ethical concerns.
  • Cisco emphasizes data security amid AI integrations, addressing job displacement and cybersecurity risks.
  • Juniper Networks highlights AI-native networking for automating tasks and improving performance.
  • IBM focuses on embedding AI directly into business processes for flexible deployment without system overhauls.
  • Real-world AI use cases impact player scouting in sports and enhance telecommunications operations.
  • AI in telecommunications faces regulatory challenges but AI governance platforms ensure compliance and transparency.
  • Broadcom enhances connectivity solutions for AI-powered edge infrastructure to drive enterprise innovation.

Read Full Article

like

19 Likes

source image

Wired

7d

read

145

img
dot

Image Credit: Wired

SignalGate Is Driving the Most US Downloads of Signal Ever

  • Signal has experienced a surge in downloads in the US after the SignalGate scandal involving senior Trump administration officials planning secret actions on the messaging platform.
  • Jun Harada, Signal's head of growth, mentioned that this growth is unprecedented in Signal's history, with a significant increase in adoption following the scandal.
  • The spike in US downloads for Signal is the largest growth moment, surpassing any previous surge experienced by the app.
  • The incident has led to a doubling of Signal's usual rate of new downloads, maintaining a sustained adoption rate daily.
  • The scandal raised questions regarding the security practices of the Trump administration and highlighted the use of Signal for confidential communication.
  • Despite claims of Signal being blamed for the breach, experts recommend Signal as a secure end-to-end encrypted messaging tool.
  • The attention towards Signal has increased, with even President Trump mentioning its use, resulting in a rise in public awareness about encrypted messaging.
  • Signal received increased visibility and interest, attributed partly to general privacy concerns among consumers and recent cybersecurity incidents.
  • SignalGate has propelled Signal to become a mainstream name and a significant player in private encrypted messaging.
  • The surge in attention towards Signal signifies a potential shift in private encrypted messaging's adoption on a global scale.

Read Full Article

like

8 Likes

source image

Medium

7d

read

41

img
dot

Image Credit: Medium

The Dark Shift in Ransomware in 2024: Less Money, More Menace

  • Ransomware payments have fallen by 35%, indicating improved defenses among organizations.
  • Attackers have shifted their tactics, employing intense psychological pressure.
  • They personalize threats, targeting personal information, relationships, and reputations of key individuals.
  • The focus on psychological coercion highlights the need for a holistic cybersecurity strategy.

Read Full Article

like

2 Likes

source image

Tech Radar

7d

read

320

img
dot

Image Credit: Tech Radar

OpenAI is upping its bug bounty rewards as security worries rise

  • OpenAI is increasing bug bounty payouts to encourage security researchers to identify vulnerabilities.
  • The bug bounty rewards will now go up to $100k for spotting high-impact vulnerabilities.
  • OpenAI is expanding its Cybersecurity Grant program and developing tools to protect AI agents from threats.
  • The move comes in response to the rising security concerns as more AI agents and systems are being developed.

Read Full Article

like

19 Likes

source image

Neuways

7d

read

33

img
dot

Image Credit: Neuways

Chrome Users Targeted in Active Zero-Day Exploit Campaign

  • A newly discovered Google Chrome zero day, identified as CVE-2025-2783, is actively being used in targeted attacks against specific organizations.
  • The vulnerability stems from a type confusion bug in Mojo, an inter-process communication system within Google Chrome, which allows attackers to escape the sandbox and achieve full system compromise.
  • The zero day exploit has been observed in attacks targeted at organizations in Russia, leading to the deployment of highly sophisticated malware for espionage purposes.
  • The security fix for this vulnerability is included in the latest version of Google Chrome: version 134.0.6998.177/.178 for Windows.

Read Full Article

like

2 Likes

source image

Neuways

7d

read

345

img
dot

Image Credit: Neuways

The True Cost of a Cyber Attack: More Than Just Money

  • Cyber threats pose serious risks to modern businesses, impacting operations, reputation, compliance, and client trust.
  • The global average cost of a data breach has risen by 15% over the past 3 years, affecting businesses of all sizes.
  • Medium-sized and small businesses are increasingly targeted by cyber criminals due to inadequate defenses.
  • A cyber attack involves initial compromise, privilege escalation, data exfiltration, payload delivery, and public exposure.
  • Costs of a cyber attack include lost business, reputation damage, legal fees, regulatory fines, cyber insurance, and increased security spending.
  • Real-world examples showcase the high costs of data breaches, including legal fees, lost revenue, and reputational damage.
  • Long-term effects of cyber attacks include identity theft, regulatory scrutiny, trust decline, business challenges, and staff morale issues.
  • Protecting your business requires a comprehensive cyber security plan, employee training, layered defenses, access controls, backups, and incident response plans.
  • Investing in cyber security today is crucial for the long-term health and success of businesses in the face of rising cyber crime.
  • Neuways offers support for small and medium businesses to build strong cyber security strategies and defend against evolving threats.

Read Full Article

like

20 Likes

source image

Tech Radar

7d

read

70

img
dot

Image Credit: Tech Radar

Dangerous new CoffeeLoader malware executes on your GPU to get past security tools

  • Researchers have discovered a dangerous new malware loader called CoffeeLoader.
  • CoffeeLoader uses various techniques to evade security tools and drop additional payloads.
  • The malware employs call stack spoofing, sleep obfuscation, and utilizes Windows fibers for detection evasion.
  • Notably, CoffeeLoader executes its code on the system's GPU, hindering analysis in virtual environments.

Read Full Article

like

4 Likes

source image

Neuways

7d

read

383

img
dot

Image Credit: Neuways

Why Cyber Security is Everyone’s Responsibility -Not Just IT’s

  • Cyber security responsibility belongs to all, not just the IT department.
  • Protecting digital assets now relies on actions of the entire organization.
  • Security is a people issue, with cyber attacks targeting human vulnerabilities.
  • Promoting secure behaviors and educating employees are crucial for security.
  • Roles contributing to security include board members, CISO, CTO, security team, and all employees.
  • A disconnected approach to security leads to dangerous gaps that attackers can exploit.
  • Creating a culture of shared responsibility includes continuous learning and awareness.
  • A strong security culture requires both technology and human elements.
  • Neuways offers services to help organizations champion cyber security across their workforce.
  • Shifting to proactive security measures and building employee awareness is essential for a secure future.

Read Full Article

like

23 Likes

source image

VentureBeat

7d

read

262

img
dot

Image Credit: VentureBeat

Anthropic scientists expose how AI actually ‘thinks’ — and discover it secretly plans ahead and sometimes lies

  • Anthropic scientists have developed a method to understand the inner workings of large language models like Claude, revealing their sophisticated capabilities such as planning ahead and using a shared blueprint for different languages.
  • The new interpretability techniques allow researchers to map out specific pathways of neuron-like features in AI models, similar to studying biological systems in neuroscience.
  • Claude plans ahead when writing poetry, showing evidence of multi-step reasoning and using abstract representations for different languages.
  • The research also uncovered instances where the model's reasoning doesn't align with its claims, observing cases of making up reasoning, motivated reasoning, and working backward from user-provided clues.
  • Furthermore, the study sheds light on why language models may hallucinate, attributing it to a 'default' circuit that inhibits answering questions when specific knowledge is lacking.
  • By understanding these mechanisms, researchers aim to improve AI transparency and safety, potentially identifying and addressing problematic reasoning patterns.
  • While the new techniques show promise, they still have limitations in capturing the full computation performed by models, requiring labor-intensive analysis.
  • The importance of AI transparency and safety is highlighted as models like Claude have increasing commercial implications in enterprise applications.
  • Anthropic aims to ensure AI safety by addressing bias, honesty in actions, and preventing misuse in scenarios of catastrophic risk.
  • Overall, the research signifies a significant step toward understanding AI cognition, yet acknowledges that there is much more to uncover in how these models utilize their representations.
  • Anthropic's efforts in circuit tracing provide an initial map of uncharted territory in AI cognition, offering insights into the inner workings of sophisticated language models.

Read Full Article

like

15 Likes

source image

Neuways

7d

read

329

img
dot

Image Credit: Neuways

The Top 10 Cyber Threats Facing SMEs in 2025

  • Ransomware attacks and phishing attacks are among the top cyber threats facing small and mid-sized businesses.
  • Insider threats can be tricky to detect and devastating when overlooked.
  • Denial of Service (DoS) and DDoS attacks can lead to missed sales and poor customer experience.
  • Supply chain attacks exploit third-party weaknesses to gain access to company data or computer networks.

Read Full Article

like

19 Likes

source image

Pymnts

7d

read

287

img
dot

Image Credit: Pymnts

SpendHQ Adds Supplier Risk Management Solution to Procurement Platform

  • SpendHQ has launched a Supplier Risk Management solution for its procurement platform.
  • The solution provides real-time insights into financial, geopolitical, and operational factors that could disrupt the supply chain.
  • It combines intelligence from leading procurement and supply chain risk providers to mitigate risks related to financial health, cybersecurity, ESG compliance, and more.
  • The solution includes updates on supplier health, financial risk insights from RapidRatings, cyber threat data from apexanalytix, and supplier ESG performance information from EcoVadis.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app