menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Mcafee

1w

read

54

img
dot

Image Credit: Mcafee

Introducing Scam Stories: A McAfee Campaign to End Scam Stigma

  • Actors Chris Carmack and Erin Slaver were scammed while trying to order patio cushions, leading them to share their story as part of the McAfee-led Scam Stories campaign.
  • Scam Stories is a movement aimed at ending the stigma around being scammed, encouraging people to share their experiences, and educating the community on staying safe online.
  • The campaign features real stories of individuals who've fallen victim to scams, highlighting the importance of scam awareness and sharing experiences to prevent others from being scammed.
  • Partnering with FightCybercrime.org, McAfee is donating protection products and funds to support scam survivors and educate the public on cybercrime prevention.

Read Full Article

like

3 Likes

source image

TechBullion

1w

read

250

img
dot

Image Credit: TechBullion

SecurityBridge Partners with Microsoft to Boost SAP Security

  • SecurityBridge has partnered with Microsoft to integrate SAP data into Microsoft Sentinel, enhancing SAP security.
  • The collaboration aims to provide improved visibility to detect and respond to threats across SAP landscapes effectively.
  • Combining SecurityBridge's SAP-native cybersecurity platform with Microsoft Sentinel's capabilities makes complex SAP security events accessible and actionable for all security teams.
  • The collaboration benefits SAP customers by leveraging Microsoft Sentinel's machine learning and SecurityBridge's SAP security insights to enhance threat identification and response capabilities.

Read Full Article

like

15 Likes

source image

Mcafee

1w

read

42

img
dot

Image Credit: Mcafee

Introducing McAfee’s Scam Detector – Now Included in All Core Plans

  • McAfee has introduced Scam Detector, advanced scam detection technology included in all core plans for customers in the U.S., UK, and Australia.
  • Scam Detector is designed to detect scams in text messages, emails, and videos using AI-powered detection, educational guidance, and multi-platform coverage.
  • Features include smarter text scam detection across messaging apps, AI-based scam analysis for email, deepfake detection for videos, on-demand scam check, custom sensitivity settings, and safe browsing layer.
  • Privacy-focused Scam Detector utilizes on-device AI, and is included at no extra cost in McAfee's core plans without the need for additional purchases.

Read Full Article

like

2 Likes

source image

Tech Radar

1w

read

371

img
dot

Image Credit: Tech Radar

SAP patches recently exploited zero-day in wake of NetWeaver server attacks

  • SAP has patched a critical-severity zero-day vulnerability, CVE-2025-42999, in NetWeaver server.
  • This vulnerability was chained with CVE-2025-31324, fixed in April, and poses a risk to Fortune 500 companies.
  • The flaw allows a privileged user to upload content that could compromise confidentiality, integrity, and availability.
  • Several firms observed attacks exploiting the vulnerability in which web shells were dropped on vulnerable servers.

Read Full Article

like

22 Likes

source image

Tech Radar

1w

read

292

img
dot

Image Credit: Tech Radar

Extensive investment scam that stole €3 million tackled by Europol

  • Europol, in collaboration with other agencies, has dismantled an organised crime group involved in an extensive investment scam.
  • The group defrauded over 100 victims of a combined amount of €3 million through a fake online investment platform.
  • The criminals used cyber trading and promised substantial profits to victims, convincing them to transfer more funds that were directly stolen by the group.
  • The scam was reported by a couple in Germany, leading to the seizure of evidence, including documents, electronic devices, and cash, uncovering an extensive criminal network.

Read Full Article

like

17 Likes

source image

Securityaffairs

1w

read

342

img
dot

Image Credit: Securityaffairs

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days

  • Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws, including five zero-day vulnerabilities.
  • Of the vulnerabilities fixed, 12 are rated Critical and the rest are rated Important in severity.
  • Microsoft confirmed that five zero-day vulnerabilities were actively exploited in the wild, including issues related to Scripting Engine Memory Corruption and Elevation of Privilege in various Windows components.
  • Microsoft urged users to apply the security updates to protect their systems from potential cyber attacks.

Read Full Article

like

20 Likes

source image

Tech Radar

1w

read

192

img
dot

Image Credit: Tech Radar

Intel still vulnerable to Spectre data-leak vulnerabilities, researchers say

  • Researchers from ETH Zurich found a way around Spectre mitigations on Intel.
  • Intel released a microcode patch to address the vulnerabilities discovered.
  • ARM and AMD chips are not affected by the newly identified vulnerabilities.
  • The new vulnerabilities named Branch Prediction Race Conditions (BPRC) impact Intel products from the 7th to 9th generation CPUs.

Read Full Article

like

11 Likes

source image

Wired

1w

read

175

img
dot

Image Credit: Wired

North Korean IT Workers Are Being Exposed on a Massive Scale

  • North Korean IT workers from Laos and Russia, identified by researchers as 'Naoki Murano' and 'Jenson Collins,' raise money for North Korean regime through cyber activities.
  • North Korea poses a severe cyber threat by stealing intellectual property, looting crypto, and employing IT workers to infiltrate companies.
  • DTEX discloses North Korean cyber activity and publishes over 1,000 email addresses linked to North Korean IT workers.
  • North Korean IT workers operate with a goal of funding the regime and developing weaponry, functioning like a crime syndicate.
  • IT workers use stolen identities and false personas, primarily targeting multiple companies and tricking them into hiring them remotely.
  • DTEX's report highlights the involvement of IT workers like Murano and Collins in crypto projects and revenue generation for Pyongyang.
  • US government sanctions North Korean companies employing IT workers, highlighting the billions earned to fund the regime.
  • As more North Korean IT workers are identified, they adapt tactics like face-changing software during interviews to evade detection.
  • North Korean IT workers face close surveillance by the regime, are set earnings quotas, and operate through various military and intelligence organizations.
  • IT workers generate income through various projects for North Korea, with some involved in AI organizations and revenue generation schemes.

Read Full Article

like

10 Likes

source image

Global Fintech Series

1w

read

300

img
dot

Image Credit: Global Fintech Series

Using Technology to Plug the UK Finance Skills Gap

  • The UK finance skills gap poses challenges for businesses striving for efficiency in financial processes and talent retention.
  • Technology, such as business process automation, is essential to elevate finance professionals into strategic roles within organizations.
  • Automating processes like accounts payable can eliminate late payments, errors, and enhance supplier relationships.
  • Implementing powerful technology solutions leads to increased productivity and a more satisfying work environment for finance talent.
  • Developing diversity, equality, and inclusion in finance teams can attract a wider talent pool and improve retention rates.
  • AI and agentic AI are transforming financial operations, requiring finance professionals to acquire new skills in data analysis and AI understanding.
  • Investing in effective technologies enables organizations to retain analytical finance talent and achieve greater profitability.

Read Full Article

like

18 Likes

source image

Dev

1w

read

158

img
dot

Image Credit: Dev

Fine-Tuning SSL Protocols and Ciphers in SafeLine WAF

  • SafeLine WAF allows full control over SSL protocols and cipher suites for securing web applications.
  • You can configure SSL certificates, select supported protocol versions, and customize cipher suites based on security needs.
  • Options include enabling HTTPS access by uploading SSL certificates, choosing SSL/TLS versions like TLSv1.3, and customizing cipher suites.
  • SafeLine supports various encryption algorithms and configurations to ensure secure and optimized encryption tailored to specific environments.

Read Full Article

like

9 Likes

source image

Hackernoon

1w

read

79

img
dot

Image Credit: Hackernoon

The 5 Lessons RSAC 2025 Forced Me to Learn About Modern Cybersecurity

  • Attending RSA Conference 2025 provided a firsthand look at the transformation in the cybersecurity industry.
  • The event showcased the overwhelming scope of cybersecurity, with over 400 exhibitors covering various aspects.
  • Despite the industry's growth in response to increasing threats, vendors are shifting towards a deeper purpose of helping customers.
  • AI played a prominent role at RSAC 2025, with a focus on practical applications rather than hype.
  • The industry is witnessing a split between consolidating platform vendors and emerging specialized startups.
  • Identity emerged as a crucial focus at the conference, with discussions on passwordless authentication and continuous profiling.
  • The return to community and trust was highlighted, emphasizing the human aspect of cybersecurity alongside technology.
  • The shift from 'fear-driven marketing' to 'trust-driven operations' signals a change in industry approach.
  • In navigating this evolving landscape, clarity, ethics, and tangible impact are now paramount.
  • The industry is called to deliver more transparency, effectiveness, and value to meet the demands of the modern cybersecurity landscape.

Read Full Article

like

4 Likes

source image

Securityaffairs

1w

read

4

img
dot

Image Credit: Securityaffairs

Fortinet fixed actively exploited FortiVoice zero-day

  • Fortinet has fixed a critical remote code execution zero-day vulnerability, CVE-2025-32756, actively exploited in attacks targeting FortiVoice enterprise phone systems.
  • The vulnerability affects FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera, allowing remote unauthenticated attackers to execute arbitrary code via malicious HTTP requests.
  • Threat actors exploiting the flaw scanned networks, erased crash logs, and deployed malware on compromised servers. They also added credential-stealing cron jobs and used scripts to scan victim networks.
  • Fortinet recommends disabling the HTTP/HTTPS administrative interface as a workaround. The attackers were identified using several IP addresses and enabling the 'fcgi debugging' setting on compromised systems.

Read Full Article

like

Like

source image

Pymnts

1w

read

292

img
dot

Image Credit: Pymnts

From Faked Invoices to Faked Executives, GenAI Has Transformed Fraud

  • Generative artificial intelligence, including deepfakes and advanced voice synthesis, has revolutionized fraud in payments and cybersecurity.
  • Cyberfraud using generative AI, such as deepfake videos and voice cloning, has become more prevalent and sophisticated, posing challenges for businesses to detect fraudulent activities.
  • AI-driven attacks now involve impersonation of executives through deepfake technology, leading to increased instances of fraudulent fund transfers and cyber scams.
  • To combat the rising threat of AI-driven fraud, businesses are adopting advanced fraud detection systems and emphasizing employee training and collaboration to enhance cybersecurity measures.

Read Full Article

like

16 Likes

source image

Global Fintech Series

1w

read

376

img
dot

Image Credit: Global Fintech Series

Unibeam Elevates the Trust Anchor, Debuts SIM-Level Authentication to Block Transaction Fraud

  • Unibeam introduced the world's only SIM-native authentication platform for business transactions to enhance mobile security and eliminate vulnerabilities of traditional methods.
  • Unlike other solutions claiming to be 'SIM-based', Unibeam's platform verifies identity directly inside the SIM's secure enclave, making it resistant to spoofing, SIM swap fraud, and AI-powered attacks.
  • Unibeam's 'On-SIM' solution is considered untouchable by fraud and has the potential to revolutionize the OTP market in the future, according to Ariel Cohen of AnD Ventures.
  • By moving the trust anchor inside the SIM, Unibeam ensures dynamic identifiers are created within the SIM, enabling fraud detection on all SIM and eSIM-enabled devices without the need for apps, SDKs, or network involvement.

Read Full Article

like

22 Likes

source image

Nordicapis

1w

read

234

img
dot

A Complete Guide to Access Tokens

  • Access tokens play a crucial role in enabling secure access in decentralized systems and are recommended as a best practice in security workflows.
  • Different types of access tokens have emerged, including bearer tokens, sender-constrained tokens, and ID tokens that prove the user's identity.
  • ID tokens, issued as JWTs in Base64URL format, contain various user-associated properties configured by the authorization server.
  • Access token formats include opaque tokens generated by the authorization server to prevent PII exposure and JWTs that can be inspected for an opaque token.
  • Combining JWTs with opaque tokens in a phantom token pattern or using the split token pattern can maximize the benefits of each format.
  • Token handlers, such as those for SPAs, offer hybrid design patterns to manage access tokens effectively and address privacy concerns with browsers.
  • Best practices for dealing with access tokens include storing them in memory, using HTTPS for transmission, and managing expired tokens with refresh tokens.
  • Proper encryption like AES or RSA adds a layer of security during token transmission and storage to prevent unauthorized access.
  • Ensuring seamless token refreshes and managing expired tokens aids in maintaining data security while minimizing user disruption.
  • Understanding access tokens is crucial in the API-driven world to enhance data security, especially with the rise of AI and potential cybersecurity threats.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app