menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Lastwatchdog

1w

read

75

img
dot

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

  • The explosion of AI-driven phishing, insider threats, and business logic abuse has forced a shift toward more proactive, AI-enhanced defenses.
  • Gen AI threats and quantum computing exposures must be accounted for as cyber threats increase by 100X.
  • In 2025, adding more tools won’t equate to better security so true visibility requires blending data from multiple tools.
  • Ransomware will grow rapidly with AI for more efficient attacks and targeting outdated systems.
  • Identity is cybersecurity’s biggest challenge as attackers are logging in, not hacking in.
  • Cybercriminals will exploit supply chain vulnerabilities while AI-driven phishing challenges defenses, and AI-driven exploitation will demand real-time responses.
  • As edge infrastructure expands, heightened security measures will be needed to address vulnerabilities at the edge.
  • Resiliency involves four stages, while compromise has three phases, and security leaders must map critical business assets to ensure their resilience.
  • Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation.
  • AI will enhance both cybersecurity defenses and adversaries’ attacks in 2025, enabling advanced malware, deepfakes, and misinformation.

Read Full Article

like

4 Likes

source image

TechJuice

1w

read

88

img
dot

Image Credit: TechJuice

Advanced Cyber Threats Lead to Surge in Pakistan’s Cybersecurity Risks in FY24

  • Pakistan’s cybersecurity landscape is witnessing rapid evolution, marked by a surge in threats targeting critical infrastructure, financial institutions, and government entities.
  • Limited resources, a shortage of skilled cybersecurity professionals, and inadequate collaboration between public and private sectors continue to hinder progress in Pakistan's cybersecurity efforts.
  • Between July 2023 and June 2024, Pakistan experienced a rise in cyber-attacks, including malware, phishing, DDoS attacks, ransomware, and insider threats.
  • Pakistan has made significant advances in cybersecurity, rising to Tier-1 level in the ITU's 2024 Global Cybersecurity Index, but ongoing strategic actions, resource allocation, and international cooperation are emphasized to mitigate risks.

Read Full Article

like

5 Likes

source image

Cybersecurity-Insiders

1w

read

71

img
dot

Image Credit: Cybersecurity-Insiders

The Domino Effect of Cyber Incidents: Understanding the Ripple Impact of Cybersecurity Breaches

  • The domino effect is a concept that describes how a small event, such as a security breach or cyberattack on one organization or system, can lead to a cascading series of negative impacts.
  • The financial repercussions of a cybersecurity incident can be divided into direct and indirect costs.
  • The impact of cyber incidents spreads outward to customers, suppliers, and business partners.
  • Cybersecurity incidents can escalate to threaten critical infrastructure.
  • Breached organizations could be subject to lawsuits from affected customers or partners.
  • Cyber incidents can lead to new cybersecurity laws or requirements for companies to improve their data protection practices.
  • The domino effect of cyber incidents can lead to a broader societal impact.
  • State-sponsored cyberattacks may target not just specific countries but entire regions or industries.
  • Strong security measures and robust incident response plans are crucial to mitigating the risk of breaches and limiting their potential impact.
  • Collaboration across industries and governments is essential to prevent the spread of cyber incidents.

Read Full Article

like

4 Likes

source image

Cybersecurity-Insiders

1w

read

122

img
dot

Image Credit: Cybersecurity-Insiders

USA Incoming Cybersecurity Advisor to release a playbook on Cyber Attacks

  • US President Donald Trump plans to implement a more aggressive stance on cybersecurity and countermeasures against foreign cyber threats.
  • Congressman Mike Waltz, the incoming National Security Advisor, has been instructed to draft a comprehensive cybersecurity playbook.
  • The playbook will focus on countering state-backed cyber actors and impose harsher penalties on cybercriminals targeting critical infrastructure.
  • The Trump administration also plans to introduce more stringent sanctions to economically isolate foreign adversaries responsible for cyberattacks.

Read Full Article

like

7 Likes

source image

TechCrunch

1w

read

477

img
dot

Image Credit: TechCrunch

Prequel is building a community-driven approach to finding software bugs

  • Prequel is building a community-driven approach to finding software bugs.
  • The startup is developing a database of software failure patterns and misconfigurations in Linux workloads.
  • Prequel's software checks for bugs and failures by utilizing the database, contributed by a growing community of engineers and developers.
  • Prequel has secured a $3.3 million seed round for product development and expanding its detection library.

Read Full Article

like

Like

source image

TechJuice

1w

read

370

img
dot

Image Credit: TechJuice

PTA Report: Telecom Investments and FDI Decline Amid Economic Uncertainty

  • Pakistan's telecom industry experienced a significant drop in FDI and overall investments during the fiscal year 2023-24, as per the PTA's annual report.
  • Foreign direct investment (FDI) was down 21% to $46mn, which is a third consecutive year of decline.
  • Investments in the industry have surpassed $3.63bn in the last five years, but fell from $770mn in 2023-24 to $765mn in the most recent year.
  • ARPU in Pakistan hit Rs 276 ($1.75) per month in 2023-24, up from 229 rupees ($1.45) the year before.
  • Broadband and digital services are becoming increasingly important in boosting profitability.
  • Key hurdles to 5G deployment in Pakistan are detailed in the PTA report, including high investment costs, low return on investment and a lack of available phones.
  • The telecom sector saw a significant spike of 173% in phishing assaults in 2023–24, making it the seventh most targeted sector globally for phishing attacks.
  • Despite these obstacles, the PTA's chairman emphasized their commitment to supporting technological progress in Pakistan.
  • Efforts to create a digitally inclusive Pakistan were also highlighted by the state minister of information technology and the chairman of the Senate.
  • The PTA will not blacklisted VPNs and does not know what to say about shutting down the internet for national security reasons.

Read Full Article

like

22 Likes

source image

Dev

1w

read

303

img
dot

Image Credit: Dev

Cybersecurity in the Digital Age: Safeguarding Data in an Interconnected World

  • The growing importance of cybersecurity in the digital age cannot be overemphasized. Cybersecurity is no longer just an IT concern but is now a global necessity to protect individuals, organizations, and nations from crippling cyber threats.
  • Several key cybersecurity threats pose significant challenges to cybersecurity, including data breaches, ransomware attacks, phishing and social engineering, identity theft, DDoS attacks, and IoT vulnerabilities.
  • As technology evolves, new challenges continuously arise for cybersecurity experts, such as Artificial Intelligence (AI) in Cybercrime, cloud security, remote work vulnerabilities, supply chain attacks, and nation-state cyber warfare
  • To combat cyber threats, individuals, businesses, and governments need to adopt comprehensive cybersecurity strategies. These strategies include implementing robust security protocols, regular software updates and patch management, Zero Trust Architecture, employee training and awareness, multi-factor authentication (MFA), cybersecurity frameworks, incident response plans, and investment in AI and Machine Learning.
  • Governments play a crucial role in ensuring cybersecurity at a national and global level, enacting regulations, developing security policies, and investing in infrastructure to counter cyber threats.
  • While advanced tools and strategies strengthen cybersecurity, awareness among individuals is equally vital. Cybersecurity is not just the responsibility of IT professionals but a shared effort across all users of digital systems.
  • As technology continues to advance, innovation and resilience will shape the future of cybersecurity. Cyber resilience is emerging as a priority where systems are designed to not only prevent attacks but also recover quickly from breaches.
  • Creating a digital world that is more trustworthy and safe can be accomplished through the promotion of awareness, the investment in technology, and the implementation of preventative measures.
  • Because of our collaborative dedication to protecting the digital landscape, the future is dependent on our continued efforts.
  • Therefore, cybersecurity is an essential component of data safeguarding, privacy, and essential infrastructure in this age of digital technology. It involves more than just protection but also fostering confidence in the technologies that we use on a daily basis.

Read Full Article

like

18 Likes

source image

Siliconangle

1w

read

606

img
dot

Image Credit: Siliconangle

Arctic Wolf acquires BlackBerry’s Cylance endpoint security unit for $160M+

  • Arctic Wolf Networks Inc. plans to acquire BlackBerry Ltd.'s Cylance unit for $160 million in cash and 5.5 million Arctic Wolf shares.
  • Cylance, a software platform for protecting endpoints, is known for its lightweight agent and artificial intelligence assistant.
  • Arctic Wolf is a major provider of managed cybersecurity services and will integrate Cylance's technology into its Aurora platform.
  • BlackBerry expects the sale to close by the end of February.

Read Full Article

like

4 Likes

source image

Idownloadblog

1w

read

248

img
dot

Image Credit: Idownloadblog

Security researcher releases S5Late bootrom exploit for iPod Nano 7th generation

  • A hardware-based bootrom exploit has been released for the iPod Nano 7th generation.
  • Hardware-based bootrom exploits are rare and cannot be fixed with a software update.
  • The S5Late bootrom exploit is tethered, requiring DFU mode for device boot-up.
  • The exploit allows for jailbreaking of the iPod Nano 7th generation.

Read Full Article

like

14 Likes

source image

Securityaffairs

1w

read

75

img
dot

Image Credit: Securityaffairs

ConnectOnCall data breach impacted over 900,000 individuals

  • ConnectOnCall, a telehealth platform, disclosed a data breach impacting over 900,000 individuals.
  • The breach occurred between February 16, 2024, and May 12, 2024, and an unknown third party accessed personal and medical information.
  • ConnectOnCall took its product offline, hired cybersecurity experts, and notified law enforcement.
  • Potentially exposed information includes names, phone numbers, Social Security numbers, and health-related information.

Read Full Article

like

4 Likes

source image

Pymnts

1w

read

193

img
dot

Image Credit: Pymnts

Rhode Island Urges Residents to Protect Personal Information Amid Data Breach

  • Rhode Island is urging residents to protect their personal information amid a data breach of RIBridges, a system that handles social services programs.
  • The state's vendor, Deloitte, reported a high probability that a cybercriminal obtained personally identifiable information from the system.
  • Rhode Islanders are advised to freeze their credit, contact credit bureaus, set up multiple levels of security, and stay alert.
  • The breached information may include names, addresses, dates of birth, Social Security numbers, and certain banking information.

Read Full Article

like

11 Likes

source image

VentureBeat

1w

read

227

img
dot

Slack’s AI agents promise to reshape productivity with contextual power

  • Slack will integrate Salesforce's Agentforce AI agents into its workplace collaboration platform, focusing on contextual intelligence.
  • The integration aims to enhance AI agents' effectiveness by leveraging the conversational and organizational data in Slack channels.
  • Slack's implementation stands out due to its position as a searchable log of all communication and knowledge, making it the central nervous system of modern enterprises.
  • The platform will offer customizable AI agents that can perform various tasks, while emphasizing user trust and data governance.

Read Full Article

like

13 Likes

source image

Pymnts

1w

read

227

img
dot

Image Credit: Pymnts

How the Math Powering Payments Adds Up in the Quantum Era

  • Math forms the foundation of the entire payments ecosystem, driving innovation, security, and trust.
  • Google's creation of the Willow quantum chip poses a challenge to encryption algorithms used in payments.
  • Quantum computing presents both a threat and an opportunity for payment systems.
  • Developers and organizations are already working on quantum-resistant solutions in the payments space.

Read Full Article

like

13 Likes

source image

Dev

1w

read

8

img
dot

Image Credit: Dev

Firewall Testing 101: How to Secure Your Network and Block Cyber Threats

  • A firewall is the first line of defense for securing home or business networks.
  • The general rule for firewalls is to deny everything in and allow anything out.
  • The article discusses the importance of firewall testing to ensure network security.
  • Regular testing and verification are crucial for maintaining a robust defense against threats.

Read Full Article

like

Like

source image

Securityaffairs

1w

read

295

img
dot

Image Credit: Securityaffairs

Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware

  • Researchers warn of previously undetected surveillance spyware, named NoviSpy, that was found infecting a Serbian journalist’s phone.
  • Amnesty International discovered that Serbian authorities used the Cellebrite tool to unlock and extract data from the journalist's device without consent.
  • They also found the presence of NoviSpy spyware, which can extract personal data and activate the device's microphone and camera.
  • The spyware deployment utilized the Cellebrite unlocking process and is linked to the Serbian intelligence agency and government.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app