menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Ars Technica

1w

read

162

img
dot

Image Credit: Ars Technica

Microsoft changes Windows in attempt to prevent next CrowdStrike-style catastrophe

  • Microsoft introduces changes to Windows security after CrowdStrike disaster in 2024.
  • A broken CrowdStrike update on Windows caused major outages leading to system repairs.
  • Microsoft's new endpoint security platform will allow security solutions to run outside the kernel.
  • Initiative aims to improve system reliability and reduce impact on devices during security issues.
  • Additional Windows security tweaks like quick machine recovery feature planned for future updates.

Read Full Article

like

9 Likes

source image

Tech Radar

1w

read

264

img
dot

Image Credit: Tech Radar

Cybercriminals are abusing LLMs to help them with hacking activities

  • AI tools are being used and abused by cybercriminals in hacking activities.
  • Hackers are exploiting legitimate LLMs and training their own AI models, such as WormGPT and FraudGPT.
  • Jailbroken and uncensored LLMs are being manipulated outside normal constraints for malicious tasks.
  • As AI technology advances, criminals are expected to continue leveraging LLMs to enhance cyber attacks.

Read Full Article

like

15 Likes

source image

Siliconangle

1w

read

130

img
dot

Image Credit: Siliconangle

It’s an agentic world. We just live in it.

  • Companies are heavily investing in AI agents with varied offerings and billions in funding.
  • The AI battle extends into dominating industry verticals with legal and medical startups thriving.
  • Google intensifies AI efforts with new models, protocols, and acquisitions, while rifts emerge in partnerships.
  • Salesforce claims half of company work is AI-driven, facing mixed reactions, as AI continues to transform industries.

Read Full Article

like

4 Likes

source image

TechBullion

1w

read

414

img
dot

Image Credit: TechBullion

Ouinex Prepares to Launch Globally: Bridging Crypto and Traditional Finance for All Traders

  • Ouinex, a crypto and derivatives platform aiming to bridge traditional finance and digital assets, is set to launch globally after months of research and development.
  • Led by CEO Ilies Larbi, Ouinex provides stock derivatives tradable through digital assets, aiming to onboard over 50k traders by the latter half of 2025.
  • The platform offers unique features like a proprietary No-CLOB execution model, allowing for minimal slippage, and enables traders to use crypto as collateral for various financial instruments.
  • With a focus on transparency and security, Ouinex plans to provide low fees for traders using $OUIX token, advanced trading tools, and seamless access to global markets from a crypto wallet.

Read Full Article

like

24 Likes

source image

Tech Radar

1w

read

371

img
dot

Image Credit: Tech Radar

Microsoft Entra ID vulnerability allows full account takeover – and takes barely any effort

  • Semperis has discovered a critical vulnerability in Microsoft's Entra ID, nOAuth, affecting 10% of SaaS applications globally.
  • The flaw allows attackers to perform full account takeovers with minimal effort, bypassing key security measures like MFA and zero-trust architecture.
  • Over 15,000 SaaS apps out of 150,000 globally could be impacted, posing a significant threat to data security and privacy.
  • SaaS vendors are advised to promptly patch affected apps to mitigate the risk of exploitation, as prevention and detection measures are currently challenging.

Read Full Article

like

22 Likes

source image

Tech Radar

1w

read

290

img
dot

Image Credit: Tech Radar

Hackers claim to be selling 61 million Verizon records online, but it might not be what it seems

  • A dataset containing 61 million 'Verizon USA' records has been posted online, with details dating as recent as 2025.
  • Sensitive information such as names, dates of birth, tax IDs, addresses, and phone numbers are included in the exposed data, raising concerns of identity theft.
  • Verizon responded stating that the data is old and not affiliated with the company, reducing the impact on customers.
  • Data breaches like this are becoming more common, emphasizing the need for heightened cybersecurity measures to protect personal information.

Read Full Article

like

17 Likes

source image

Tech Radar

1w

read

47

img
dot

Image Credit: Tech Radar

This new malware has developed a spooky way to tell AI-based detection methods to ignore it

  • A new malware was discovered that attempted to communicate with an AI-based malware detection tool by injecting prompts disguised as innocent instructions.
  • The malicious file included natural language code that prompted the AI to classify it as benign, marking a shift in tactics to bypass AI-based security solutions.
  • Although the attempt to evade detection failed, this incident highlights a potential new trend in malware evasion techniques.
  • Researchers at Check Point identified the malware using prompt injection and emphasized the importance of detecting and understanding emerging evasion methods to enhance cybersecurity defenses.

Read Full Article

like

2 Likes

source image

Securityaffairs

1w

read

158

img
dot

Image Credit: Securityaffairs

OneClik APT campaign targets energy sector with stealthy backdoors

  • A new APT malware campaign named OneClik, likely associated with a China-linked actor, has been discovered targeting the energy sector using stealthy ClickOnce and Golang backdoors.
  • The campaign utilizes advanced evasion techniques, such as “living off the land” tactics, and deploys Golang backdoors through .NET loaders exploiting Microsoft ClickOnce. Communication is obscured behind AWS services to evade detection.
  • The malware campaign abuses Microsoft’s ClickOnce technology to deliver malware through phishing emails, installing the backdoor RunnerBeacon that communicates with C2 servers to execute commands, escalate privileges, and move laterally.
  • The OneClik campaign cleverly uses AWS services to mask its traffic, making detection challenging. The backdoor design resembles Cobalt Strike's Go variant, suggesting a sophisticated and stealthy approach in targeting the energy sector.

Read Full Article

like

9 Likes

source image

Macdailynews

1w

read

350

img
dot

Image Credit: Macdailynews

Germany asks Apple and Google to remove Chinese AI startup DeepSeek from app stores

  • Germany's data protection commissioner has asked Apple and Google to remove the Chinese AI startup DeepSeek from their app stores due to data privacy concerns.
  • DeepSeek is accused of illegally transferring users' personal data to China, with concerns raised about the protection of German users' data in China.
  • Attempts were made to request DeepSeek to meet non-EU data transfer requirements or withdraw the app voluntarily, but the company did not comply.
  • Several countries, including Italy and the Netherlands, have taken actions against DeepSeek, citing concerns about personal data use, while U.S. lawmakers plan to introduce a bill to ban AI models from China for government use.

Read Full Article

like

21 Likes

source image

Medium

1w

read

38

img
dot

Millions Urged to Update Passwords After Massive Data Leak Found Online

  • A massive data leak containing about 16 billion login records has been reported, with duplicate entries making it unclear how many unique accounts are compromised.
  • Exposed information was related to popular services like Google, Facebook, and Apple, but no direct data breach has been reported by these companies.
  • Cybersecurity expert Bob Diachenko led the investigation and found the exposed data due to poor server security, with plans to alert affected parties after accessing the files briefly.
  • While experts suggest that the leaked data may not be new, the incident highlights the ongoing cybersecurity challenges faced by internet users.

Read Full Article

like

2 Likes

source image

Medium

1w

read

320

img
dot

Image Credit: Medium

What happened to UC Browser?

  • UC Browser, developed by UCWeb, a subsidiary of Alibaba Group, was a popular mobile browser known for its speed and small file size.
  • The browser faced issues related to privacy concerns and data leakage to Chinese servers, jeopardizing user data security.
  • In June 2020, the Indian government banned UC Browser and 58 other Chinese apps over national security concerns, leading to a significant decline in its user base.
  • While still available in some countries, UC Browser's usage has plummeted, showcasing the impact of trust issues on user retention and app popularity.

Read Full Article

like

19 Likes

source image

Tech Radar

1w

read

316

img
dot

Image Credit: Tech Radar

SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers

  • Russian cybersecurity firm, Kaspersky, warns of rising cyberattacks impersonating productivity tools like Zoom, Microsoft Office, and ChatGPT targeting small and medium-sized businesses.
  • Cybercriminals are using techniques like phishing campaigns and presenting fake offers to steal data or distribute malware by impersonating popular software tools.
  • Kaspersky tracked over 4,000 unique malicious files targeting SMBs, with a 115% rise in ChatGPT spoofing incidents.
  • To safeguard against such attacks, businesses are advised to establish clear software adoption procedures, define access rules, and conduct regular backups.

Read Full Article

like

19 Likes

source image

TechJuice

1w

read

388

img
dot

Image Credit: TechJuice

NCERT Warns of Cyber Threats from Email Misconfigurations (Do This ASAP)

  • National CERT warns of cyber threats stemming from email misconfigurations, emphasizing the need for immediate security measures.
  • Email misconfigurations can lead to phishing attacks, business email compromise, and credential theft, posing risks to confidentiality and operational integrity.
  • The advisory highlights major impacts like operational disruptions, credential theft, nationwide phishing campaigns, and loss of public trust due to misconfigured email systems.
  • Recommendations include using strong passwords, enabling multi-factor authentication, enforcing email security protocols, and training on email-based threats to mitigate risks.

Read Full Article

like

23 Likes

source image

Medium

1w

read

12

img
dot

Image Credit: Medium

Decentralized Wireless Networks: Are They Sustainable?

  • Decentralized wireless networks, known as DeWi, aim to democratize network access and challenge traditional telcos.
  • Pioneers like Helium, Pollen Mobile, and XNET are implementing unique approaches to spectrum, scalability, and user incentives.
  • Challenges arise in sustaining the networks due to issues like token rewards attracting excessive hardware deployment and insufficient data demand.
  • Security concerns, such as fraudulent activities like signal manipulation and identity spoofing, threaten the integrity and sustainability of DeWi networks.

Read Full Article

like

Like

source image

Tech Radar

1w

read

423

img
dot

Image Credit: Tech Radar

British man behind ‘IntelBroker’ hacker group charged with stealing millions

  • A British man named Kai West has been charged by US law enforcement for allegedly hacking numerous organizations worldwide as part of the 'IntelBroker' cybercrime group, causing over $25 million in damages.
  • West faces potential sentences of up to 20 years in prison for wire fraud and conspiracy to commit computer intrusions. The IntelBroker group targeted around 40 victims globally, including well-known firms such as AMD, Apple, and CISCO.
  • The group's scheme, which allegedly ran from December 2022 to February 2025, involved selling stolen data to collect approximately $2 million. West, arrested in France, is currently facing extradition to the US.
  • Authorities traced West to IntelBroker through a purchase of stolen data, linking his real identity via a cryptocurrency transaction and his Gmail account. This case highlights the FBI's efforts to combat cybercriminals globally.

Read Full Article

like

25 Likes

For uninterrupted reading, download the app