menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

2w

read

207

img
dot

Image Credit: Medium

The Used Phone That Taught Me About Digital Ghosts

  • Selling an old smartphone led to a realization about digital privacy and data security.
  • The previous phone owner failed to completely erase personal data, leading to sensitive information being accessible to the new owner.
  • The article highlights the common misconception that deleting data from devices means it's permanently gone, while in reality, data can still be recovered.
  • The importance of understanding digital security and being mindful of the data stored on devices before handing them over to others is emphasized.

Read Full Article

like

12 Likes

source image

Moneyweb

2w

read

215

img
dot

Santam says it paid R652m in weather claims last year

  • Santam paid out R652 million in weather-related claims in 2024, up from R583 million the year before, attributing the increase to climate change-related weather volatility and deteriorating infrastructure.
  • High-impact weather events concentrated in the Western Cape, Eastern Cape, and KwaZulu-Natal resulted in significant payouts for Santam, as outlined in their 2025 Insurance Barometer Report.
  • Santam utilized flood-risk mapping and geocoding tools to save over R300 million and is collaborating with municipalities to enhance climate readiness through various initiatives.
  • Despite concerns over rising living costs, crime, and cyber risks among consumers, many South Africans remain underinsured for cybercrime, highlighting the need for increased awareness and protection measures.

Read Full Article

like

12 Likes

source image

Medium

2w

read

198

img
dot

Image Credit: Medium

How to Protect Kids and Family from Cyber Crime?

  • Cyber crime can occur through various means like hacking and scams, especially targeting children who may not comprehend the risks.
  • Parents should communicate early with their children about internet risks, using simple language and encouraging questions.
  • It's important to set limits on device usage to prevent potential issues and ensure both safety and health.
  • Utilizing parental controls on devices can help block harmful websites and applications, adding an extra layer of security for children.

Read Full Article

like

11 Likes

source image

Insider

2w

read

107

img
dot

Image Credit: Insider

Scale AI locked down Big Tech client documents after BI revealed security holes

  • Scale AI, a company using human gig workers to enhance AI models for Big Tech, locked down client documents after Business Insider revealed security flaws.
  • The security holes in public Google Docs exposed thousands of sensitive files, causing Scale AI to restrict access and leading to confusion and delays for contractors.
  • The lockdown was in response to a BI report highlighting the exposure of confidential client data, including information about projects with Meta and xAI, among others.
  • Scale AI faced challenges granting access to project materials initially, but later resolved many document access issues and began granting individual access to contributors.

Read Full Article

like

5 Likes

source image

The Register

2w

read

336

img
dot

Image Credit: The Register

Citrix bleeds again: This time a zero-day exploited - patch now

  • Citrix issued an emergency patch for a critical vulnerability, CVE-2025-6543, that was exploited as a zero-day before the fix.
  • The vulnerability affects NetScaler ADC and NetScaler Gateway versions before specific updates, leading to denial of service and unintended control flow.
  • Security experts warn that exploitation of this vulnerability may include more than just denial-of-service attacks, possibly involving code execution and backdoors.
  • Organizations are urged to upgrade their NetScaler software to prevent exploitation of CVE-2025-5777, an earlier critical vulnerability that allows the reading of sensitive information from affected devices.

Read Full Article

like

20 Likes

source image

Popsci

2w

read

155

img
dot

Image Credit: Popsci

How listening to light waves could prevent subsea cables sabotage

  • Subsea cables vulnerable to weather and sabotage, prompting interest in advanced surveillance technology.
  • Optics11 develops OptiBarrier system using light waves to monitor underwater threats effectively.
  • The system listens for sound signals by detecting variations in light traveling through cables.

Read Full Article

like

9 Likes

source image

Ars Technica

2w

read

220

img
dot

Image Credit: Ars Technica

Ubuntu disables Intel GPU security mitigations, promises 20% performance boost

  • Ubuntu is disabling Intel GPU security mitigations to provide a potential 20% boost in graphics performance on Intel-based systems.
  • Spectre attacks leverage CPU performance enhancements to leak secrets, leading to the implementation of mitigations that usually degrade CPU performance over time.
  • The decision by Ubuntu to disable these mitigations in the device driver for the Intel Graphics Compute Runtime follows consultations with Intel and aims to enhance performance.
  • The change is expected to improve GPU performance in handling OpenCL framework or OneAPI Level Zero interface workloads, but users employing custom Linux kernels should ensure they keep compute runtime mitigations on.

Read Full Article

like

13 Likes

source image

Medium

2w

read

399

img
dot

Image Credit: Medium

The New Cybersecurity Frontier: Why Generative AI Demands a new AI Security Framework

  • Cybersecurity tools like EDR, SIEM, XDR, and TIP are foundational but not designed for new risks from generative AI.
  • Real-world breaches highlight the immediate risks posed by generative AI across various industries.
  • Generative AI introduces a complex new attack surface that traditional security measures struggle to address.
  • The need for an AI Security Framework is crucial to adapt to the dynamic and evolving nature of AI threats.

Read Full Article

like

23 Likes

source image

Microsoft

2w

read

263

img
dot

Image Credit: Microsoft

Removing Azure Resource Manager reliance on Azure DevOps sign-ins

  • Azure DevOps will no longer depend on Azure Resource Manager (ARM) resource during sign-ins or token refreshes, starting July 28, 2025.
  • This change allows for more effective management of Azure DevOps access by implementing Azure DevOps-specific Conditional Access Policies (CAPs) instead of relying on ARM-based CAPs.
  • Users who set up Conditional Access Policies for Azure resources like ARM, Azure portal, Azure Data Lake, etc., need to create new Azure DevOps-specific CAPs for continued coverage.
  • Notable exceptions include billing administrators and service connection creators who still require ARM access for specific tasks within Azure DevOps.

Read Full Article

like

15 Likes

source image

Silicon

2w

read

90

img
dot

Image Credit: Silicon

Russia Frees REvil Hackers, Despite Guilty Pleas

  • Russia has released four members of the REvil hacking gang, despite sentencing them to 5 years in prison.
  • The hackers, who had pled guilty to fraud and malware distribution charges, were freed after spending time in detention.
  • The gang was known for cyberattacks on high-profile targets like Colonial Pipeline and JBS Foods.
  • US warnings led to Russian arrests, but the court ruled the hackers had served enough detention time.

Read Full Article

like

5 Likes

source image

Securityaffairs

2w

read

354

img
dot

Image Credit: Securityaffairs

Hackers deploy fake SonicWall VPN App to steal corporate credentials

  • Hackers have deployed a fake version of the SonicWall NetExtender SSL VPN app to steal user credentials for corporate networks.
  • The trojanized app, known as SilentRoute, tricks users into exposing their data, allowing attackers to gain unauthorized access and steal sensitive information.
  • The malicious version of NetExtender bypasses digital certificate checks and sends stolen VPN credentials to a remote server.
  • SonicWall and Microsoft have taken down the fake sites hosting the trojanized app and users are advised to download software only from official sources.

Read Full Article

like

21 Likes

source image

Tech Radar

2w

read

276

img
dot

Image Credit: Tech Radar

Towards the Giga IOPS pipedream: How Nvidia wants to reach 100 million IOPS - even if it means inventing totally new types of memory

  • Nvidia aims to push storage to match AI demands by targeting 100 million IOPS for small-block random reads, a huge goal according to Silicon Motion CEO.
  • AI inference often involves small, scattered data bits, making 512B random reads crucial but challenging to accelerate.
  • Current PCIe 5.0 SSDs reach around 14.5GB/s and 2-3 million IOPS, but Nvidia seeks faster storage solutions to keep up with AI advancements.
  • Industry players like Kioxia are developing new memory technologies, such as XL-Flash, to meet ultra-fast storage demands, but further innovation is needed to achieve 100 million IOPS cost-effectively.

Read Full Article

like

16 Likes

source image

VentureBeat

2w

read

254

img
dot

Image Credit: VentureBeat

Anthropic just made every Claude user a no-code app developer

  • Anthropic turns Claude into app platform, enabling users to create shareable applications easily.
  • Claude's intelligence embedded in creations allows for real-time adaptation and independent functionality.
  • Move signals shift to dynamic, interactive AI experiences, competing with OpenAI's Canvas feature.
  • Users can create smart tutors, data analyzers, and games without coding; moderation safeguards in place.

Read Full Article

like

15 Likes

source image

Pymnts

2w

read

345

img
dot

Image Credit: Pymnts

Zama Raises $57 Million for End-to-End Encryption Solution for Blockchains

  • Zama has raised $57 million in a Series B funding round to expand its end-to-end encryption solutions for public blockchains, enabling developers to build secure, scalable, and compliant on-chain financial applications.
  • The company plans to use the funding to support its mainnet launch, ecosystem adoption, and research efforts to scale financial transactions using Fully Homomorphic Encryption (FHE) to thousands of transactions per second.
  • Zama’s Series B funding round, led by Blockchange Ventures and Pantera Capital, brings its total funding to $150 million and its valuation to $1 billion.
  • Zama’s FHE solutions are expected to benefit public blockchains and industries using cloud computing that require greater confidentiality and compliance, as it offers an innovative approach to data processing and encryption.

Read Full Article

like

20 Likes

source image

Amazon

2w

read

285

img
dot

Image Credit: Amazon

Implement secure hybrid and multicloud log ingestion with Amazon OpenSearch Ingestion

  • Implement secure log ingestion with Amazon OpenSearch Ingestion for hybrid or multicloud environments.
  • Amazon OpenSearch Service offers real-time search, analytics, and log management across infrastructure.
  • Configuring Fluent Bit to securely send logs to OpenSearch Ingestion using IAM Roles Anywhere.
  • This setup ensures improved security, simplified operations, and enhanced log visibility and troubleshooting.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app