menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

VentureBeat

1w

read

148

img
dot

Image Credit: VentureBeat

See how Google Gemini 2.0 Flash can perform hours of business analysis in minutes

  • Google’s newly released Gemini 2.0 Flash provides business analysts with greater speed and flexibility in defining Python scripts for complex analysis, giving analysts more precise control over the results they generate.
  • Gemini 2.0 Flash also supports multimodal inputs, including images, video, and audio, as well as multimodal output, including natively generated images mixed with text and steerable text-to-speech (TTS) multilingual audio. It can also natively call tools like Google Search, code execution, and third-party user-defined functions.
  • VentureBeat wanted to make the prompt request realistic by having the script encompass an analysis of 13 XDR vendors, also providing insights into how AI helps the listed vendors handle telemetry data.
  • Here is the prompt we gave Gemini 2.0 Flash to execute: Write a Python script to analyze the following cybersecurity vendors who have AI integrated into their XDR platform and build a table showing how they differ from each other in implementing AI.
  • Within seconds, the script ran, and Colab signaled no errors. It also provided a message at the end of the script that the Excel file was done.
  • Analysts, by nature, have a high degree of intellectual curiosity. Helping lift that burden will give analysts a chance to do what they enjoy and do best, which is to use their intuition, intelligence, and insight to deliver exceptionally valuable ideas.
  • The total time needed to get this table done was less than four minutes, from submitting the prompt, getting the Python script, running it in Colab, downloading the Excel file, and doing some quick formatting.
  • Using Google AI Studio, VentureBeat created the following AI-powered XDR Vendor Comparison Python scripting request, with Python code produced in seconds.
  • Automation tools in general, and AI tools specifically, can assist business analysts who need to crunch massive amounts of data and succinctly communicate it.
  • For the many professionals who have worked in a variety of business, competitive, and market analyst roles in their careers, AI is the force multiplier they’ve been looking for to trim hours off of repetitive, monotonous tasks.

Read Full Article

like

8 Likes

source image

Medium

1w

read

29

img
dot

Image Credit: Medium

We are thrilled to welcome Lionel Klein as a new advisor to our NAEST ICO!

  • Lionel Klein, an expert in international cybersecurity, has become a new advisor for NAEST ICO.
  • Lionel is the co-founder of RESILIUM and the future head of the Cyber department at MITEM.
  • His strategic vision and experience make him a valuable asset to the project.
  • NAEST aims to revolutionize transportation and travel through an integrated technology platform.

Read Full Article

like

1 Like

source image

Tech Radar

1w

read

403

img
dot

Image Credit: Tech Radar

US government warns water firms to secure infrastructure at risk online

  • The US government warns water firms to secure their infrastructure at risk online
  • CISA and EPA urge water and wastewater facilities to protect their Human Machine Interfaces (HMIs) and Water and Wastewater Systems (WWS) from cyberattacks
  • Unprotected HMIs can be exploited by unauthorized users to view, make changes and potentially disrupt water and wastewater treatment processes
  • Recent cyberattacks on American Water Works Company and Veolia North America highlight the importance of securing water infrastructure

Read Full Article

like

24 Likes

source image

Tech Radar

1w

read

407

img
dot

Image Credit: Tech Radar

Huge cybercrime attack sees 390,000 WordPress websites hit, details stolen

  • A cybercrime attack targeting WordPress websites resulted in the theft of login credentials for approximately 390,000 accounts.
  • The attack involved a malicious package that was uploaded to the NPM package repository, disguised as an XML-RPC implementation, and later introduced malware via updates.
  • The malware was designed to steal sensitive data, such as SSH keys and bash history, and install cryptojackers on compromised endpoints.
  • Researchers discovered approximately 68 compromised systems actively mining the cryptocurrency Monero.

Read Full Article

like

24 Likes

source image

Tech Radar

1w

read

80

img
dot

Image Credit: Tech Radar

Thousands of Rhode Island citizens have data stolen after social services hit by cyberattack

  • The RIBridges benefits system in Rhode Island has suffered a cyberattack, potentially exposing the data of thousands of citizens.
  • Deloitte, the vendor for the system, confirmed that personally identifiable information (PII) and banking information may have been stolen.
  • The breach likely occurred on December 5 and the system was taken down on December 13.
  • Affected citizens are advised to remain vigilant, be on the lookout for fraud, and change passwords according to cyber hygiene standards.

Read Full Article

like

4 Likes

source image

Wired

1w

read

170

img
dot

Image Credit: Wired

The Top Cybersecurity Agency in the US Is Bracing for Donald Trump

  • Donald Trump helped create the US government’s cybersecurity agency during his first term as president. Six years later, employees of that agency are afraid of what he’ll do with it once he retakes office.
  • CISA, which the Trump administration and Congress created in 2018 by reorganizing an existing DHS wing, became a target of right-wing vitriol after its Trump-appointed director rebuffed the president’s election conspiracy theories in 2020.
  • The incidents turned a once-obscure agency with bipartisan credibility into a conservative bogeyman.
  • Now, with Trump returning to office vowing to purge disloyal civil servants and turn DHS into an immigration-crackdown machine, CISA employees are acutely worried about the fate of their still-fledgling agency.
  • CISA is bracing for change in several areas that were key to US president Joe Biden’s cybersecurity agenda.
  • CISA employees and Biden administration officials expect the Trump team to kill Biden’s corporate responsibility initiatives.
  • CISA employees are also watching uneasily to see if Trump officials pressure the cyber agency to water down its draft regulation requiring critical infrastructure operators to report cyber incidents.
  • CISA is also bracing for changes to its election security mission.
  • Trump’s victory could also have serious consequences for other CISA missions.
  • Trump’s promised changes to civil-service rules, which would expose more government workers to politically motivated firings, are also alarming CISA employees.

Read Full Article

like

10 Likes

source image

Socprime

1w

read

297

img
dot

Image Credit: Socprime

How to Deal with the Warning: “No ‘Basic Authorization’ header, send 401 and ‘WWW-Authenticate Basic'”

  • If you’ve worked with OpenSearch or Elasticsearch and encountered "No 'Basic Authorization' header, send 401 and 'WWW-Authenticate Basic'" warning in your logs, you’re not alone.
  • This message typically appears when a client makes a request to the cluster but does not include the required Authorization header.
  • To suppress this warning, you can adjust the logging level for the relevant logger.
  • After executing the above command, check your logs to confirm the warnings are no longer present.

Read Full Article

like

17 Likes

source image

Socprime

1w

read

51

img
dot

Image Credit: Socprime

Fluentd: How to Make Nested Hash from Dot-Separated Keys

  • When a log record has keys like test.test, you can use two methods record_transformer and explode plugin, to process these keys and create a nested structure.
  • Using the record_transformer method, you need to follow several steps to create nested fields, while the explode plugin can achieve this in one step.
  • The explode plugin breaks top-level keys with dots into nested structures, allowing easy manipulation of the fields.
  • To use the explode plugin, you need to install it using the command 'gem install fluent-plugin-explode_filter'.

Read Full Article

like

3 Likes

source image

Silicon

1w

read

68

img
dot

Image Credit: Silicon

Shaping Tomorrow: Top Tech Trends and Opportunities for 2025

  • The technology landscape of 2025 is poised to bring transformative change, reshaping industries, redefining customer expectations, and creating unprecedented opportunities for businesses and individuals.
  • AI is redefining the way businesses interact with customers, delivering more personalised and empathetic experiences. AI-driven personalization and quantum computing breakthroughs are expected to dominate the conversation.
  • The explosion of data, fuelled by AI, presents both opportunities and challenges. Innovations like higher-density hard drives and scalable cloud storage solutions will be critical to addressing this imbalance.
  • Generative AI, a significant driver of innovation, is set to unlock new efficiencies across industries, particularly in supply chain management, predictive maintenance, and customer service.
  • AI observability, a relatively new concept, is gaining traction as organisations seek to ensure the accuracy and security of AI systems. AI is also driving more agile and sustainable supply chains.
  • Upskilling is becoming a necessity as organizations prepare their workforce for an AI-driven future.
  • Small and medium-sized enterprises (SMEs) are also set to benefit from these advancements.
  • The demand for effective leadership in an AI-driven world is growing. Future leaders must combine AI literacy with empathy and ethical judgment to build trust and foster innovation.
  • The technology trends of 2025 highlight a world in transition, where businesses and individuals alike are grappling with the implications of rapid change.
  • From the explosion of AI to the rise of quantum computing and sustainable energy solutions, the opportunities are vast for those willing to adapt and innovate.

Read Full Article

like

4 Likes

source image

Tech Radar

1w

read

382

img
dot

Image Credit: Tech Radar

Schools are facing greater cybersecurity threats than ever before

  • 74% of parents are confident in school's cybersecurity measures
  • Only 14% of schools provide mandatory cybersecurity training
  • Cyberattacks are financially impacting schools, parents, and students
  • 32% of breached schools suffered data theft

Read Full Article

like

23 Likes

source image

Tech Radar

1w

read

357

img
dot

Image Credit: Tech Radar

Deepfakes and AI attacks are worker's biggest security worries

  • 86% of workers in UK SMBs are increasingly concerned about cyber breaches, but only a third say they’re confident in spotting such threats.
  • 63% of workers believe they would be unable to spot a cybersecurity issue, despite increased concern compared with last year.
  • 34% of internet users have experienced scams, fraud, and phishing, whereas 43% have experienced a deepfake in the first half of 2024 alone.
  • 43% of workers have not received any cybersecurity training in the past year.

Read Full Article

like

21 Likes

source image

Global Fintech Series

1w

read

361

img
dot

Image Credit: Global Fintech Series

Deconstructing Digital Wallets: Designing for Interoperability and User Privacy

  • Digital wallets have transformed payments, identity verification, and asset management into seamless, accessible experiences. They allow users to store and manage digital assets, including money, identification, loyalty cards, and even cryptocurrencies.
  • Digital wallets often face challenges related to interoperability and privacy. These issues stem from differences in platform design, regulatory requirements, and evolving user expectations.
  • Interoperability refers to the ability of digital wallets to work seamlessly across platforms, networks, and devices. It is a critical factor in ensuring user convenience and broader adoption.
  • Achieving interoperability involves technical, regulatory, and business challenges. On the technical front, wallet providers must ensure compatibility across diverse systems, including various operating systems, application programming interfaces (APIs), and payment protocols.
  • Digital wallets inherently deal with sensitive user information, including financial data, personal identifiers, and transaction histories. Addressing privacy concerns is no longer optional; it's a fundamental design requirement.
  • To address these privacy challenges, wallet providers must adopt privacy-by-design principles such as end-to-end encryption, decentralization, minimal data collection, user control, and transparency.
  • Interoperability and privacy are often seen as competing priorities. However, these objectives can coexist when approached thoughtfully. For example, zero-knowledge proofs (ZKPs) can enable interoperability while preserving privacy.
  • By prioritizing user-centric design and leveraging cutting-edge technologies, wallet providers can strike a balance between interoperability and privacy, delivering solutions that meet both business and consumer needs.
  • Digital wallets can become more than just a tool—they can serve as a cornerstone of the digital economy, empowering users worldwide.

Read Full Article

like

21 Likes

source image

Cybersafe

1w

read

59

img
dot

Image Credit: Cybersafe

Clop Ransomware claims responsibility for Cleo Data Breaches

  • The Clop ransomware gang has claimed responsibility for the recent data breaches targeting Cleo's file transfer platforms.
  • Cleo, a provider of managed file transfer solutions, had patched a vulnerability (CVE-2024-50623) in October.
  • However, the patch was incomplete and cybercriminals continued to exploit the flaw to steal data using a JAVA backdoor.
  • The Clop ransomware group has been increasingly targeting secure file transfer platforms to conduct data theft.

Read Full Article

like

3 Likes

source image

Socprime

1w

read

148

img
dot

Image Credit: Socprime

Essential Dev Tools Commands for Elasticsearch & OpenSearch Administrators

  • Node and Disk Allocation: Check the distribution of shards and disk usage across nodes.
  • Field Data Statistics: View memory usage for field data to diagnose performance issues.
  • Cluster Health Overview: Get a basic summary of cluster health, number of nodes, and shards.
  • Indices Overview: List indices with storage size and primary store size sorted by index name.

Read Full Article

like

8 Likes

source image

Medium

1w

read

395

img
dot

Image Credit: Medium

Nesa: Redefining AI with Privacy and Security at It’s Core

  • Nesa is redefining AI to address the balance between innovation and privacy.
  • Nesa creates a decentralized infrastructure for AI, eliminating vulnerabilities and ensuring private and secure AI inference.
  • The Nesa team achieved a milestone at NeurIPS with their research on secure and private AI framework.
  • Nesa's solutions offer a robust framework for privacy and security in AI, setting a standard for the industry.

Read Full Article

like

23 Likes

For uninterrupted reading, download the app