menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Dev

2w

read

17

img
dot

Image Credit: Dev

Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

  • The article discusses how to automate the summary of Security Hub findings using Bedrock, Slack Notifications, and Zenhub Task Management to create actionable tasks.
  • The author noticed that traditional methods of email notification of security warnings did not deliver actionable results. As a result, the author developed a system that efficiently summarizes Security Hub findings, including suggested countermeasures, and automated notifications.
  • The implementation process involves enabling Security Hub, creating a Slack API, project structure, cost adjustments via environment variables, creating Zenhub tickets, and deploying Lambda with Docker.
  • In this project, environment variables were used to configure Bedrock's model, maximum token count for output, and the severity levels of findings to include for flexible cost management.
  • The create_zenhub_ticket function uses Security Hub findings to create GitHub issues. A personal access token and the GitHub repository name is necessary for successful operations.
  • The author recommends deploying the Lambda function via Docker since external libraries are used.
  • Finally, the author explains how to set up EventBridge, create a new rule, and set the new Lambda function as the target.
  • This implementation has demonstrated the author's ability to develop a system that automatically summarizes security warnings in an actionable way, improving response time and efficiency.
  • The article shows how to configure and leverage Bedrock, Slack, and Zenhub to automate the process, balancing cost and output quality based on needs.
  • The article provides a comprehensive guide to the implementation process and includes code samples, cost adjustments, creating Zenhub tickets, and deploying Lambda with Docker.

Read Full Article

like

1 Like

source image

Dev

2w

read

253

img
dot

Image Credit: Dev

Building a Security System, with motion detection and time based settings using Arduino

  • In this project, we will construct a Motion Sensitive Security System utilizing an Arduino Uno along with a 6-channel relay module that manages lighting and alerts triggered by motion detection.
  • During weekdays, from 6:00 and 18:00; the alarm will be activated if there is any movement detected.
  • During weekends the alarm will relaxed from 8:00 and 18:00; however the lights will continue working after 19:00.
  • PIR motion sensor is used for detecting motion, while the 6-channel relay module controls light and alarm.
  • The time based system actions are managed using RTC module to track time.
  • Future enhancements can be made using mobile app integration, addition of new sensors like window/door sensors to boost overall security and integration of surveillance camera.
  • You will need components like Arduino Uno board, PIR motion sensor, 6-channel relay module, Buzzer or siren, LED lights, RTC module, Jumper wires, Breadboard and Power source.
  • By expanding the setup you can develop a reliable home security system tailored to your individual requirements.
  • The code for this system controls relay based on time interval and motion detected to turn on light or alarm.
  • Using Wi-Fi module and mobile app, notification can be sent to the user’s phone when motion is detected in home mode.

Read Full Article

like

15 Likes

source image

Digitaltrends

2w

read

34

img
dot

Image Credit: Digitaltrends

F-Secure Total review: affordable antivirus solution lets you build custom plan

  • F-Secure Total offers solid antivirus protection for all your devices with flexible subscription plans.
  • You can customize their plans that can cover 1 to 26 devices as per your preference.
  • A three-device plan starts at $65, five devices cost $70, and 10 computers, phones, and tablets is $85.
  • You can add a VPN with unlimited data for $10 more per year. A password manager and identity monitoring also add $10 annually.
  • F-Secure Total has a free malware scan and removal tool for Windows that detects and clears malicious apps that are already active, but won’t protect from future threats.
  • F-Secure Total’s Windows app has a clean and friendly design.
  • F-Secure Total offers good protection from malware, with real-time detection and blocking to prevent infection, and regularly scans for malicious apps.
  • F-Secure also offers a VPN which isn't as fast as the rest but is good and its password manager is basic but functions well.
  • F-Secure’s 24/7 live-chat support excels with quick and helpful communication.
  • F-Secure Total’s high rates of false positives is a major con but overall, it’s a good solution for those who want fine-tuned subscription plans.

Read Full Article

like

2 Likes

source image

Arstechnica

2w

read

278

img
dot

Image Credit: Arstechnica

Yearlong supply-chain attack targeting security pros steals 390K credentials

  • A yearlong supply-chain attack has been targeting security professionals and stealing 390K credentials.
  • The attack infects devices through Trojanized versions of open source software from GitHub and NPM.
  • Multiple methods, including spear phishing and infecting open source repositories, are used in the attack.
  • The attackers aim to collect sensitive information, such as SSH private keys and AWS access keys, and also install cryptomining software.

Read Full Article

like

16 Likes

source image

Securityaffairs

2w

read

287

img
dot

Image Credit: Securityaffairs

German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox

  • The German agency BSI has sinkholed a botnet composed of 30,000 devices infected with BadBox malware pre-installed.
  • The BSI blocked communication between the infected devices and the C2 server, isolating the malware.
  • BadBox malware conducts ad fraud, creates email accounts for spreading disinformation, and operates as a residential proxy.
  • At least 74,000 Android-based devices worldwide were shipped with the backdoored firmware.

Read Full Article

like

17 Likes

source image

Pymnts

2w

read

111

img
dot

Image Credit: Pymnts

AI Shopping Bots Race to Fill Online Carts

  • Tech companies are developing artificial intelligence (AI) agents that can shop online independently.
  • These AI shopping agents can browse online stores, make purchases, and use digital credit cards.
  • Companies like Perplexity, Amazon, Google, and HotelPlanner are actively working on AI shopping agents.
  • However, security and payment automation remain significant challenges for AI shopping agents.

Read Full Article

like

6 Likes

source image

Wired

2w

read

407

img
dot

Image Credit: Wired

The New Jersey Drone Mystery May Not Actually Be That Mysterious

  • Reports of mysterious drone sightings across New Jersey and New York have grown in recent weeks, leading to a temporary drone ban being implemented by the US Federal Aviation Administration over the Army's Picatinny Arsenal in Wharton and a Bedminster golf course owned by President-elect Donald Trump.
  • Despite the lack of evidence connecting the drone sightings or suggesting anything unusual, vague and noncommittal statements from state and federal authorities have fuelled public intrigue.
  • Late last week, a joint FBI and Department of Homeland Security statement emphasised that ongoing state and federal investigations have revealed no foreign involvement or threat at all.
  • Furthermore, the FBI and DHS added that none of the sightings have been verified to have been drones at all.
  • Multiple federal agencies have been collaborating with New Jersey State Police on the investigation.
  • The FBI and DHS noted in their statement that, “while there is no known malicious activity occurring in New Jersey, the reported sightings there do, however, highlight the insufficiency of current authorities,”
  • Security specialists state that there is no evidence of a threat.
  • Reports of drone sightings are difficult to conduct, especially given the different levels of law enforcement and aviation authorities involved.
  • In Dec 2018, repeated drone sightings at Gatwick Airport resulted in over 1,000 flight cancellations, chaos, more than $63m of lost revenue for airlines, and nearly $1.3m for the investigation costs.
  • Officials have been countering theories about aliens and Iranian spy drones, though funding is also a significant factor in the speed with which investigations can be carried out.

Read Full Article

like

24 Likes

source image

Medium

2w

read

274

img
dot

Image Credit: Medium

Ambient Intelligence: A Privacy Nightmare or the Key to the Future?

  • Ambient computing has the potential to compromise our fundamental rights as devices constantly collect data about our behaviour, location, and habits.
  • The risks of ambient computing are becoming increasingly apparent. Security breaches in IoT and ambient systems highlight the urgency of addressing these vulnerabilities.
  • Privacy concerns around ambient intelligence environments involve constant data collection, data breaches, and lack of data control.
  • Companies and organizations may have difficulty sharing their methods of continuous data collection, making it challenging for users to understand how their data is collected and for companies to get informed consent from their users.
  • Blockchain-based security frameworks are expected to enhance data transparency and integrity. By decentralizing data storage, blockchain reduces the risk of single points of failure.
  • Introducing stricter legislation that holds corporations accountable for transparency, allows for informed consent in what data is collected and how it is used, and give citizens the ability to opt-out or delete information of theirs that they do not want collected or shared can increase comfort with Ambient Technology.
  • Ambient computing offers incredible opportunities to enhance our lives, but its security challenges cannot be ignored.
  • Smart cities, urban centers around the world that combine Ambient Intelligence and AI with physical infrastructure, create a hub of human interaction, with sustainability, efficiency, convenience, and citizens’ quality of life at the forefront.
  • Innovations like the blockchain are emerging to enhance transparency and security in data management. These developments aim to address concerns while fostering trust among users, which is crucial for sustained adoption.
  • As users, staying informed and advocating for transparency is key to navigating this transformative era responsibly.

Read Full Article

like

16 Likes

source image

Tech Radar

2w

read

4

img
dot

Image Credit: Tech Radar

Hackers are abusing Microsoft tools more than ever before

  • The rise in the abuse of Microsoft’s LOLbins (Living Off the Land binaries) in the first half of 2024 has been significant.
  • Hackers used 187 LOLbins in their attacks, a 51% increase compared to 2023.
  • Commonly abused LOLbins include RDP, PowerShell, cmd.exe, and net.exe.
  • Sophos recommends adopting a multi-layered security approach and mitigating the abuse of LOLbins by restricting access, monitoring usage, implementing EDR solutions, disabling unused LOLbins, and educating employees.

Read Full Article

like

Like

source image

Dev

2w

read

47

img
dot

Image Credit: Dev

Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

  • Kubernetes has become the standard for managing containerized workloads, but it also introduces security vulnerabilities when misconfigured.
  • Common vulnerabilities in Kubernetes include misconfigured RBAC, container runtime security issues, and network policy gaps.
  • Different Kubernetes distributions have their own security implications, making consistent security postures challenging.
  • Modern approaches to Kubernetes security include continuous security validation and automated testing.

Read Full Article

like

2 Likes

source image

Tech Radar

2w

read

115

img
dot

Image Credit: Tech Radar

Apple forced to patch iOS and macOS security flaw that could have leaked your private info

  • Apple has patched a security flaw in iOS and macOS that could have been exploited to steal sensitive data.
  • The vulnerability was found in the FileProvider framework, which allows apps to manage and access files on remote servers or locally.
  • The bug bypassed Apple's Transparency, Consent, and Control (TCC) framework, allowing unauthorized access to files, folders, health data, and more.
  • Apple fixed the bug in iOS 18, iPadOS 18, and macOS Sequoia 15 with improved validation of symbolic links.

Read Full Article

like

6 Likes

source image

Stackexchange

2w

read

352

img
dot

Image Credit: Stackexchange

Your Bitcoin was successfully turned into USD.Requesting your agreement.. Transaction IDXXXXXXXXX

  • The user received multiple emails about Bitcoin being transferred into USD and requesting authorization.
  • The emails contain links and partial wallet addresses.
  • The user does not recall setting up an account for the funds to be transferred to.
  • The user suspects they may have been a victim of theft by fraud and seeks guidance.

Read Full Article

like

21 Likes

source image

Wired

2w

read

309

img
dot

Image Credit: Wired

Why the US Military Can't Just Shoot Down the Mystery Drones

  • Unidentified drones have been spotted by residents above New Jersey since November 2021.
  • Despite growing concern, the US military appears relatively unimpressed.
  • US law severely limits how the US military can respond to these mysterious drones.
  • Officials at North American Aerospace Defense Command (NORAD) had received reports of nearly 600 incursions above domestic US military installations since 2022.
  • The Pentagon has been working overtime to field fresh counter-drone capabilities to US forces deployed overseas, including low-tech interception techniques.
  • US military officials indicated that the types of counter-drone capabilities that the Pentagon may be able to bring to bear for domestic defense may be limited due to legal constraints.
  • Congress included language calling upon the Pentagon to generate recommendations on how policy changes could reduce the amount of burdensome bureaucratic coordination between federal agencies required to address the growing number of drone incursions.
  • The US military’s renewed approach to counter-drone defense can’t come soon enough.
  • Drones have been in military use for generations for surveillance and reconnaissance.
  • With a potential conflict with China over Taiwan looming, the Pentagon is in the midst of a major surge in both unmanned capabilities and technology to defend against weaponized drones belonging to foreign adversaries.

Read Full Article

like

18 Likes

source image

Tech Radar

2w

read

330

img
dot

Image Credit: Tech Radar

Civil societies warn against EU plans to make digital devices monitorable at all times

  • A coalition of 55 civil society groups and tech companies, including Tuta and Proton, warns against the EU's plan to make digital devices monitorable at all times.
  • Experts express concerns about the proposal being developed 'behind closed doors' and without involvement from civil society.
  • The goal of the EU's plan is to enable law enforcement access to data on all digital devices and online platforms.
  • Critics argue that this plan poses risks of mass surveillance, compromises security and privacy, and undermines fundamental rights.

Read Full Article

like

19 Likes

source image

Cybersecurity-Insiders

2w

read

331

img
dot

Image Credit: Cybersecurity-Insiders

Krispy Kreme Doughnut Cyber Attack might affect Christmas sales

  • Krispy Kreme, the American doughnut chain, experienced a cyber attack in November 2024 that disrupted its online ordering platform during the Christmas season.
  • There are concerns that the cyber attack may negatively impact Krispy Kreme's Christmas sales.
  • The company is actively addressing the situation and working on mitigating the risks.
  • The incident highlights the importance of robust cybersecurity measures in the face of rising cyber threats.

Read Full Article

like

19 Likes

For uninterrupted reading, download the app