menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Siliconangle

19h

read

275

img
dot

Image Credit: Siliconangle

OpenAI tightens internal security amid fears of IP theft by Chinese AI rivals

  • OpenAI is increasing internal security measures to protect its intellectual property from potential theft by Chinese AI competitors.
  • The company has implemented stricter controls over sensitive information, enhanced staff vetting, physical safeguards, and enhanced cybersecurity practices.
  • The security measures include compartmentalizing internal projects, implementing biometric authentication, adopting an air-gapped infrastructure, and hiring cybersecurity experts.
  • While these measures aim to safeguard IP, they have also introduced challenges like hindering cross-team collaboration and slowing development workflows.

Read Full Article

like

12 Likes

source image

Siliconangle

20h

read

55

img
dot

Image Credit: Siliconangle

Report: Marco Rubio impersonator used AI to contact government officials

  • A bad actor impersonated U.S. State Secretary Marco Rubio using AI to contact government officials, including a U.S. governor and foreign ministers.
  • The impersonation campaign involved AI-generated voicemails and text messages to imitate Rubio, aiming to gain access to information or accounts of the officials.
  • The State Department is urging diplomats to warn about impersonation attempts, while CNN reports a second impersonation campaign targeting government employees.
  • Previous incidents include phishing campaigns targeting former government staffers and the hacking of a White House chief of staff's phone to impersonate officials.

Read Full Article

like

3 Likes

source image

VentureBeat

20h

read

230

img
dot

Image Credit: VentureBeat

Chinese researchers unveil MemOS, the first ‘memory operating system’ that gives AI human-like recall

  • Chinese researchers have developed MemOS, a 'memory operating system' for AI systems.
  • MemOS treats memory as a core computational resource, significantly improving performance.
  • The system outperformed existing approaches in reasoning tasks, offering new potential for AI development.
  • MemOS introduces 'MemCubes' for memory management, enhancing long-term relationships in AI interactions.

Read Full Article

like

13 Likes

source image

Mcafee

21h

read

18

img
dot

Image Credit: Mcafee

How to Protect Yourself from Concert and Festival Ticket Scams

  • Concert and festival ticket scams are increasingly prevalent with online fraud on the rise.
  • Scammers exploit the emotional investment in live music events to deceive unsuspecting fans.
  • Common tactics include fake ticket sales, phantom festivals, and payment fraud schemes.
  • Protect yourself by staying vigilant, using secure payment methods, and verifying ticket authenticity.

Read Full Article

like

1 Like

source image

Dev

21h

read

178

img
dot

Image Credit: Dev

My AWS Cloud Resume Challenge

  • The individual completed the AWS Cloud Resume Challenge to showcase their skills by turning their personal website into a complex project, leveraging their AWS Solutions Architect Associate certification.
  • Despite facing distractions, they persevered to complete the project, resulting in a basic-looking webpage with intricate backend functionalities.
  • The individual found working with Terraform to convert their infrastructure into code surprisingly simple and enjoyed the support provided by HashiCorp's tutorials and documentation.
  • Extras included implementing DNSSEC, ensuring no AWS credentials were exposed, and emphasizing the usefulness of AWS billing alerts. The individual encourages others to explore coding and web apps by attempting similar challenges.

Read Full Article

like

10 Likes

source image

Insider

21h

read

305

img
dot

Image Credit: Insider

Travelers won't have to take their shoes off at security in US airports

  • Homeland Security Secretary Kristi Noem announced that travelers in US airports will no longer have to remove their shoes during security checks, a policy in place for nearly 20 years.
  • The Transportation Security Administration (TSA) will begin testing the new approach at airports nationwide, aiming to enhance the travel experience while maintaining safety standards.
  • The requirement for travelers to remove their shoes was implemented by the TSA in 2006, partly in response to the attempted shoe bombing incident by Richard Reid in 2001.
  • Despite previous testing of shoe-scanning technology, it wasn't until Secretary Noem's announcement at Ronald Reagan National Airport that the policy change was officially put into effect.

Read Full Article

like

18 Likes

source image

Securityaffairs

21h

read

134

img
dot

Image Credit: Securityaffairs

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

  • Microsoft released Patch Tuesday security updates for July 2025 addressing 130 vulnerabilities across various Microsoft products.
  • 10 of the vulnerabilities are rated Critical, with the remaining considered Important in severity.
  • One of the flaws fixed is a publicly disclosed zero-day vulnerability, CVE-2025-49719, in Microsoft SQL Server.
  • The updates also addressed critical issues like a wormable RCE flaw in Windows SPNEGO NEGOEX and an RCE vulnerability in Microsoft Office exploitable via the Preview Pane.

Read Full Article

like

8 Likes

source image

TechCrunch

22h

read

367

img
dot

Image Credit: TechCrunch

US government confirms arrest of Chinese national accused of stealing COVID research and mass-hacking email servers

  • The U.S. Justice Department has confirmed the arrest of Chinese national Xu Zewei, an alleged prolific contract hacker accused of cyberattacks for China.
  • Xu, along with another Chinese national Zhang Yu, is accused of hacking and stealing crucial COVID-19 research from U.S. universities in February 2020.
  • The hackers are also accused of mass hacking Microsoft Exchange servers, targeting over 60,000 self-hosted servers in the U.S., leading to the theft of private company data.
  • The hackers, known as Hafnium, have launched a new campaign called Silk Typhoon targeting big companies and government agencies.

Read Full Article

like

22 Likes

source image

Medium

22h

read

153

img
dot

Image Credit: Medium

Selfdestruct Vulnerabilities in Solidity: Bypassing ETH Caps to Lock Contracts

  • The article discusses a selfdestruct vulnerability in Solidity where contracts can be locked by bypassing ETH caps.
  • A Capture The Flag challenge involved finding a way to prevent VIP users from withdrawing tokens when the contract balance is low.
  • The selfdestruct function in Solidity allows for the deletion of a contract and transferring remaining Ether, even without a receive() function defined.
  • An example exploit using selfdestruct to lock a contract and prevent VIP withdrawals is demonstrated, highlighting the importance of internal verification processes.

Read Full Article

like

9 Likes

source image

Tech Radar

23h

read

3

img
dot

Image Credit: Tech Radar

UK Police wants to spend $100 million to turn millions of hours of VHS footage into digital format — now that's something AI could help with

  • The UK police service plans to spend up to 100 million to digitize VHS and other analog media archives to support investigations through a framework managed by Bluelight Commercial.
  • The digitization aims to facilitate the transition to digital evidence management by converting outdated formats into electronic files and ensuring the correct metadata attachment and secure handling of sensitive material.
  • The procurement process will be split into three lots, covering in-house conversion, outsourcing options, and niche media formats such as microfiche, DVDs, and CDs, with the total work valued at up to 120 million including VAT.
  • AI tools could assist in aspects like tagging and sorting large volumes of footage, but the primary task of converting analog tapes into digital files still relies on specialized hardware and real-time playback.

Read Full Article

like

Like

source image

TechCrunch

23h

read

26

img
dot

Image Credit: TechCrunch

Activision took down Call of Duty game after PC players hacked, says source

  • Activision has taken down the 'Call of Duty: WWII' game after hackers exploited a flaw in a specific PC version of the game, leading to players' computers being hacked.
  • The company announced the offline status of the Microsoft Store version of the game due to investigating reports of an issue, which was later revealed to be related to hacks.
  • Players complained on social media about being hacked while playing the game, with reports of a remote code execution exploit affecting the safety of playing the game on PC.
  • Activision took down the Microsoft Store and Game Pass versions of the game due to an old flaw not patched on these versions, contrasting with the Steam version, with the online status still down as the company works on a fix.

Read Full Article

like

1 Like

source image

Tech Radar

1d

read

33

img
dot

Image Credit: Tech Radar

Be careful where you click in Google search results - it could be damaging malware

  • Cybersecurity researchers warn of a malicious campaign using fake landing pages to distribute Oyster malware, impersonating popular Windows tools PuTTY and WinSCP.
  • The fake landing pages are optimized for SEO and aimed at tricking IT, cybersecurity, and web development professionals into downloading the malware loader.
  • Oyster is a stealthy malware loader that can deliver additional malicious payloads through techniques like process injection and command-and-control via HTTPS.
  • IT professionals are advised to be cautious when downloading software, ensuring they use trusted sources and type in addresses directly to avoid falling for such malicious campaigns.

Read Full Article

like

2 Likes

source image

Droid-Life

1d

read

134

img
dot

Image Credit: Droid-Life

July 2025 Android Update Available for Google Pixel Devices

  • The July 2025 Android update, the first monthly patch after Android 16 release, is now available for Pixel phones.
  • The update (BP2A.250705.008) is for Pixel 6a through Pixel 9 Pro Fold devices and includes a battery performance update for Pixel 6a.
  • Bug fixes in the July update focus on improvements in display, graphics, and Wi-Fi connectivity stability.
  • The update is rolling out gradually and users can check for it in Settings>System>Software updates>System update.

Read Full Article

like

8 Likes

source image

Medium

1d

read

120

img
dot

Image Credit: Medium

Why Governance Is the Job Everyone Should Be Talking About

  • Governance, particularly in the tech industry, is crucial as it involves the intersection of technology, risk, and human behavior to prevent system failures.
  • The increasing popularity of smart and connected electric vehicle chargers has raised cybersecurity concerns, emphasizing the importance of governance to address vulnerabilities.
  • Governance goes beyond compliance and ethics, shaping responsible technology by ensuring systems are secure, visible risks are identified, and accountability is established.
  • The field of governance is rapidly evolving and expanding into various sectors like health, finance, energy, and transportation, making it a critical job in the tech industry.

Read Full Article

like

7 Likes

source image

Securityaffairs

1d

read

121

img
dot

Image Credit: Securityaffairs

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

  • Italian police arrested a Chinese national, Zewei Xu (33), linked to Silk Typhoon APT group at Milan’s Malpensa Airport on a U.S. warrant.
  • Xu is accused of cyberespionage, including attacks on U.S. government entities and 2020 attacks on U.S. COVID-19 vaccine research.
  • Xu's family claims he is innocent and works as an IT manager in Shanghai. His wife opposes extradition, citing his Italian visa as evidence of no wrongdoing.
  • Xu faces extradition proceedings in Italy for charges including wire fraud, ID theft, and unauthorized computer access, with a potential 20-year prison sentence.

Read Full Article

like

6 Likes

For uninterrupted reading, download the app