menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Socprime

1w

read

62

img
dot

Image Credit: Socprime

Noodlophile Stealer Detection: Novel Malware Distributed Through Fake AI Video Generation Tools 

  • Adversaries are using fake AI-powered tools to distribute the Noodlophile information-stealing malware through fake Facebook groups and viral posts, targeting over 62,000 users.
  • Defenders are facing the challenge of detecting Noodlophile Stealer, a new malware spread through fake AI generation tools that steal sensitive data from compromised systems.
  • Security engineers can utilize the SOC Prime Platform to access Sigma rules for Noodlophile Stealer detection, enriched with actionable metadata and AI-powered Uncoder AI for advanced capabilities.
  • The Noodlophile Stealer malware is distributed through fake AI-generated videos, targeting users seeking AI-based video and image editing tools, and combines browser credential theft, wallet exfiltration, and optional remote access deployment.

Read Full Article

like

3 Likes

source image

Global Fintech Series

1w

read

287

img
dot

Image Credit: Global Fintech Series

Kyriba Unveils Agentic AI TAI to Transform Finance with Security, Compliance & Trust

  • Kyriba introduced its agentic AI solution, TAI, to enhance finance operations with safe and compliant generative AI use.
  • TAI simplifies workflows, identifies risks, and improves decision-making across treasury, payments, risk management, and working capital.
  • Kyriba's TAI aims to bridge the 'Trust Gap' in AI-driven financial transformation by prioritizing data privacy and empowering leaders to make informed decisions.
  • TAI was showcased at Kyriba's annual customer conference, emphasizing transparency, security, and human oversight in leveraging AI for finance and treasury operations.

Read Full Article

like

8 Likes

source image

Tech Radar

1w

read

369

img
dot

Image Credit: Tech Radar

ASUS DriverHub driver management tool targeted by RCE vulnerability

  • ASUS DriverHub, the driver management tool, had a critical vulnerability allowing remote code execution, now patched.
  • Security researcher found the flaw that could run malicious code remotely, affecting ASUS devices.
  • ASUS released a patch for the vulnerabilities (CVE-2025-3462 and CVE-2025-3463), urging users to update DriverHub.
  • Although the flaw only affects motherboards and not laptops or desktops, ASUS strongly recommends applying the update.

Read Full Article

like

22 Likes

source image

Siliconangle

1w

read

289

img
dot

Image Credit: Siliconangle

Orca Security acquires Opus to expand AI-driven cloud security automation

  • Orca Security Ltd. has acquired Opus Security Inc. to expand AI-driven cloud security automation.
  • Opus, founded in 2022, focuses on autonomous vulnerability management through intelligent AI security agents.
  • Opus's platform integrates with over 100 security tools, offering a multilayered prioritization framework to focus on critical vulnerabilities.
  • Orca plans to integrate Opus' expertise to autonomously identify, prioritize, remediate, and prevent cloud security risks at scale.

Read Full Article

like

17 Likes

source image

Arstechnica

1w

read

344

img
dot

Image Credit: Arstechnica

New attack can steal cryptocurrency by planting false memories in AI chatbots

  • A new attack has been discovered that can steal cryptocurrency by planting false memories in AI chatbots.
  • The attack involves causing AI-powered bots to redirect payments to an account controlled by the adversary through simple text input.
  • The exploit targets ElizaOS, an open source framework that uses large language models to facilitate blockchain-based transactions for users through predefined rules.
  • The framework, previously known as Ai16z, is seen as a potential tool for automating interactions within decentralized autonomous organizations (DAOs).

Read Full Article

like

20 Likes

source image

Siliconangle

1w

read

268

img
dot

Image Credit: Siliconangle

Cato Networks launches AI-driven Autonomous Policies to streamline SASE management

  • Cato Networks has launched Cato Autonomous Policies, an AI capability in the Cato SASE Cloud Platform aiming to automate policy management.
  • Autonomous Policies are designed to optimize and enhance all SASE policies, offering AI-driven recommendations for security, access, and networking improvements.
  • This innovation streamlines policy management, reduces risk, eliminates manual upkeep, simplifies compliance, and paves the way for proactive governance in SASE.
  • The first use case is firewall-as-a-service, targeting firewall rule bloat to ensure accurate, efficient, and compliant policy management across different deployment scenarios.

Read Full Article

like

16 Likes

source image

Tech Radar

1w

read

167

img
dot

Image Credit: Tech Radar

New ClickFix campaign spotted hitting both Windows and Linux machines

  • ClickFix, a malware attack that tricks users into running console commands, has now been observed targeting Linux devices by cybersecurity researchers.
  • The attack involves showing popups on compromised websites instructing users to update their browsers or complete CAPTCHA tests, leading them to run malicious commands.
  • The particular attack linked to a Pakistani threat actor named APT36 redirects Linux victims to a CAPTCHA page that prompts them to run a shell command, posing as an innocuous process so far.
  • The attack, still in its experimental phase, has not caused significant harm yet. It downloads only a harmless JPEG file, but the potential risks remain concerning.

Read Full Article

like

10 Likes

source image

TechCrunch

1w

read

87

img
dot

Image Credit: TechCrunch

Marks & Spencer confirms customers’ personal data was stolen in hack

  • Marks & Spencer confirms customers’ personal data was stolen in a recent hack, including names, dates of birth, addresses, phone numbers, and more.
  • The company is resetting online account passwords as a precautionary measure.
  • Marks & Spencer is facing disruptions and outages across its stores, leading to empty grocery shelves and online ordering system remaining offline.
  • Ransomware gang DragonForce claimed responsibility for cyberattacks on Marks & Spencer, Co-op, and Harrods in the U.K., with Co-op confirming customer data theft.

Read Full Article

like

4 Likes

source image

Securityaffairs

1w

read

41

img
dot

Image Credit: Securityaffairs

Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies

  • A 45-year-old foreign man was arrested in Moldova for participating in ransomware attacks on Dutch companies in 2021.
  • The arrest was a result of a joint international operation involving Moldovan and Dutch authorities, with the suspect wanted for cybercrimes including ransomware attacks and money laundering.
  • The suspect was linked to a ransomware attack on the Netherlands Organization for Scientific Research, resulting in €4.5 million in damages, attributed to the DoppelPaymer ransomware operation.
  • In a related development, Europol announced an international operation targeting key members of the DoppelPaymer ransomware group in March 2023.

Read Full Article

like

2 Likes

source image

Siliconangle

1w

read

415

img
dot

Image Credit: Siliconangle

ClearVector raises $13M to expand identity-driven threat detection platform

  • ClearVector Inc. has secured $13 million in funding to expand its identity-driven threat detection platform that focuses on real-time detection of threats by monitoring identity behaviors across different environments.
  • The cybersecurity startup aims to redefine cybersecurity by shifting from traditional threat detection to identity-driven security, addressing issues with existing security approaches that struggle to deal with identity-based attacks.
  • ClearVector's platform utilizes identity graph technology to monitor behaviors of human, machine, third-party, and AI identities within an organization, allowing for visibility, attribution, and anomaly detection to indicate malicious activity.
  • The Series A funding round was led by Scale Venture Partners LP, with participation from Okta Ventures, Inner Loop Capital, and Menlo Ventures LP, highlighting the industry's recognition of the value of ClearVector's approach to cybersecurity.

Read Full Article

like

25 Likes

source image

Securityaffairs

1w

read

71

img
dot

Image Credit: Securityaffairs

APT group exploited Output Messenger Zero-Day to target Kurdish military operating in Iraq

  • A Türkiye-linked group, Marbled Dust, exploited a zero-day vulnerability in Output Messenger (CVE-2025-27920) to spy on Kurdish military targets in Iraq since April 2024.
  • Marbled Dust, active since 2017, primarily targets organizations in Europe and the Middle East, with a history of using DNS hijacking in campaigns.
  • The group targeted various entities, including government entities, Kurdish political groups, telecommunication, ISPs, NGO, and Media & Entertainment sectors.
  • The exploit allowed the group to upload malicious files, gain access to user communications, steal data, compromise credentials, and deploy backdoors for exfiltration.

Read Full Article

like

4 Likes

source image

Medium

1w

read

394

img
dot

Image Credit: Medium

Hotels are Always Watching

  • Hotels, similar to airports and banks, extensively use surveillance cameras in their public areas like lobbies, entrances, and elevators.
  • Guests often overlook the extent of surveillance in hotels, from the front desk to public spaces, raising questions about privacy boundaries.
  • Security cameras are commonly found in all public areas, leading to concerns about the extent of monitoring guests are subject to.
  • Understanding the prevalence of surveillance in hotels sheds light on the balance between security measures and guests' privacy.

Read Full Article

like

23 Likes

source image

Securelist

1w

read

29

img
dot

Image Credit: Securelist

Using a Mythic agent to optimize penetration testing

  • Researchers are using post-exploitation frameworks like Mythic to enhance penetration testing practices to stay ahead of threat actors.
  • A proactive approach in learning new technologies and techniques employed by threat actors is crucial for security professionals.
  • Kaspersky emphasizes detecting tools and techniques used by threat actors in real-world attacks for enhanced security.
  • Behavioral analysis, exploit prevention, and fileless threats protection are integral in countering sophisticated attacks.
  • Layered security solutions like EDR, NDR, and XDR are essential for quick detection and response to potential threats.
  • Pentesters face challenges due to the detectability of popular tools by security solutions.
  • Open-source pentesting frameworks like Sliver and Havoc have limitations in payload size and stability.
  • Balancing in-house solutions and open-source tools is crucial for effective pentesting.
  • Pentesting payloads are divided into modules to manage execution and maintain covert communications.
  • The Stage 1 module of the pentesting payload requires dynamic functionality, minimal system traces, and compliance with OPSEC principles.

Read Full Article

like

1 Like

source image

Tech Radar

1w

read

198

img
dot

Image Credit: Tech Radar

Suspect arrested with links to €4.5M DoppelPaymer ransomware attacks

  • A 45-year-old foreign national was arrested in Moldova on suspicion of mounting multiple cyberattacks, including a ransomware attack causing €4.5 million in damages.
  • The suspect is wanted for committing cybercrimes such as ransomware attacks, blackmail, and money laundering on companies based in the Netherlands.
  • The ransomware attack targeted the Dutch Scientific Research Organization, leading to substantial material damage and data exposure when a ransom payment was not met.
  • During the arrest, authorities seized various electronic devices and cash from the suspect, who is currently awaiting extradition.

Read Full Article

like

11 Likes

source image

Global Fintech Series

1w

read

403

img
dot

Image Credit: Global Fintech Series

Federated Learning for AML: Fighting Money Laundering

  • Federated Learning (FL) presents a groundbreaking approach to AML, allowing multiple institutions to collaborate on AI-driven detection models without sharing customer data.
  • FL enhances AML systems by improving detection accuracy while maintaining data privacy and regulatory compliance.
  • Traditional AML systems struggle with limited data sharing, high false positives, evolving laundering techniques, and regulatory compliance challenges.
  • FL facilitates collaborative AML model training without sharing raw data and enhances detection through exposure to diverse money laundering patterns.
  • FL reduces false positives and compliance costs by training AI models on broader datasets and adapting to emerging laundering tactics.
  • Challenges in implementing FL for AML include standardization, computational costs, security risks, and balancing privacy with regulatory oversight.
  • Future implications of FL in AML include AI-powered regulatory sandboxes, cross-border collaboration, integration with blockchain, and real-time detection systems.
  • FL revolutionizes AML efforts by enabling secure collaboration, reducing false positives, and ensuring compliance with data privacy laws.

Read Full Article

like

24 Likes

For uninterrupted reading, download the app