menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

2w

read

276

img
dot

Image Credit: Medium

Who Really Runs the Internet? The ISPs and Networks Behind Every Click

  • The internet is a decentralized network composed of interconnected infrastructures.
  • At the top of the hierarchy are Tier 1 ISPs that own and operate international network infrastructure.
  • Tier 2 ISPs act as intermediaries, purchasing internet access from Tier 1 networks and serving regional markets.
  • ISPs play a crucial role in maintaining internet performance, reliability, and scalability.

Read Full Article

like

16 Likes

source image

Arstechnica

2w

read

159

img
dot

Image Credit: Arstechnica

Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE.

  • Google has announced end-to-end encrypted messages for Gmail, specifically for business users.
  • The new feature encrypts emails inside the sender's chosen browser and remains encrypted until it reaches the recipient's browser.
  • It allows government agencies and businesses to comply with security and privacy regulations, replacing the complex S/MIME standard.
  • The new service aims to streamline regulation-compliant email systems and reduce implementation challenges.

Read Full Article

like

9 Likes

source image

TechCrunch

2w

read

21

img
dot

Image Credit: TechCrunch

OpenAI just made its first cybersecurity investment 

  • Adaptive Security, a New York-based AI cybersecurity startup, has raised a $43 million Series A funding round co-led by OpenAI’s startup fund and Andreessen Horowitz.
  • Adaptive Security's platform simulates AI-generated 'hacks' to train employees to spot and react to threats, covering calls, texts, and emails.
  • The startup focuses on 'social engineering' hacks, which exploit human employees and can lead to significant losses.
  • OpenAI's investment in Adaptive Security reflects the growing concern about AI-powered cyber threats and the need for effective defense strategies.

Read Full Article

like

1 Like

source image

TechCrunch

2w

read

289

img
dot

Image Credit: TechCrunch

Ted Schlein’s Ballistic Ventures is raising $100M for a new fund

  • Venture capital firm Ballistic Ventures, co-founded by Ted Schlein, is raising $100 million for a new fund.
  • The San Francisco-based firm is targeting cybersecurity startups and has a hands-on approach, providing support including board seats, hiring assistance, and customer acquisition.
  • The team brings a strong network of contacts to portfolio companies and has made investments in 59 startups so far.
  • Venture funding in cybersecurity grew 43% year-over-year to $11.6 billion in 2024.

Read Full Article

like

17 Likes

source image

Tech Radar

2w

read

69

img
dot

Image Credit: Tech Radar

Watch out - those PDFs lurking in your inbox could be a major security risk

  • Phishing emails carrying PDF attachments are on the rise, accounting for 22% of all malicious email attachments.
  • Hackers are increasingly using PDFs in social engineering attacks, making them a major security concern.
  • PDF-based attacks have become less common than JavaScript-based attacks, as JavaScript is easier to detect.
  • By using PDFs, attackers can customize links and mimic trusted brands, making the attacks more effective.

Read Full Article

like

4 Likes

source image

Securityaffairs

2w

read

259

img
dot

Image Credit: Securityaffairs

China-linked group UNC5221 exploited Ivanti Connect Secure zero-day since mid-March

  • Ivanti has addressed a critical remote code execution flaw in Connect Secure, which has been exploited by a China-linked group since mid-March 2025.
  • The vulnerability, tracked as CVE-2025-22457, is a stack-based buffer overflow that allows remote unauthenticated remote code execution.
  • The flaw impacts Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA gateways. Ivanti has released security updates to address the vulnerability.
  • The China-linked group UNC5221 has been exploiting the vulnerability to deploy TRAILBLAZE, BRUSHFIRE, and SPAWN malware since March 2025.

Read Full Article

like

15 Likes

source image

Siliconangle

2w

read

34

img
dot

Image Credit: Siliconangle

Smaller AI models redefine what’s possible with Kubernetes

  • Kubernetes is playing a pivotal role in scaling and operationalizing AI, despite challenges in aligning its stateless architecture with AI’s stateful requirements.
  • Organizations are turning to Kubernetes as a foundation for experimental and enterprise-grade AI deployment to achieve real-world performance, cost-efficiency, and sustainability.
  • Kubernetes remains central to democratizing AI infrastructure, with a shift towards lightweight, domain-specific models that provide better results at lower costs.
  • The CNCF, supported by Red Hat, is helping standardize operations and drive convergence on shared benchmarks, ensuring sustainability, performance, and energy efficiency.

Read Full Article

like

2 Likes

source image

Tech Radar

2w

read

341

img
dot

Image Credit: Tech Radar

Businesses still haven’t stopped using weak passwords, and it’s getting super risky

  • Many businesses are still using weak passwords that can be cracked in less than a second.
  • Germany, the US, and China have witnessed the highest number of password breaches.
  • '123456', 'password', and 'qwerty' continue to be commonly used passwords.
  • To enhance security, businesses should implement stronger password creation rules and two-factor authentication.

Read Full Article

like

20 Likes

source image

Dev

2w

read

69

img
dot

Image Credit: Dev

WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

  • A recent warning has been issued regarding a malicious repository attack targeting cryptocurrency developers on Upwork.
  • The attack involves creating convincing client profiles with detailed job histories, posting targeted job listings, engaging with developers, and asking them to complete a coding challenge.
  • The malicious code hidden in a repository contains obfuscated code that, when executed by the freelancer, compromises their system and attempts to steal cryptocurrency and personal information.
  • Developers with cryptocurrency/blockchain expertise, freelancers with valuable digital assets, and those with established reputations on Upwork are being specifically targeted.

Read Full Article

like

4 Likes

source image

Dataprivacyandsecurityinsider

2w

read

302

img
dot

Image Credit: Dataprivacyandsecurityinsider

CISA Issues Malware Analysis Report on RESURGE Malware

  • The Cybersecurity and Infrastructure Security Agency (CISA) has released a Malware Analysis Report (MAR) on RESURGE malware.
  • RESURGE malware is associated with the product Ivanti Connect Secure.
  • It contains capabilities of the SPAWNCHIMERA malware variant but has distinctive commands that alter its behavior.
  • CISA recommends users to follow specific recovery steps, reset credentials, and monitor related accounts.

Read Full Article

like

18 Likes

source image

Medium

2w

read

302

img
dot

Image Credit: Medium

Anthropic’s Model Context Protocol (MCP): MCP and DMail.ai: Bridging AI with Email Innovation

  • Anthropic’s Model Context Protocol (MCP) is an open-source standard designed to bridge AI systems with the data and tools they need.
  • MCP operates through a client-server architecture, providing a universal framework for connecting large language models (LLMs) to external data sources.
  • With MCP, AI systems can access live data, enabling dynamic applications and enhanced AI capabilities.
  • For platforms like DMail.ai, MCP brings unified data access, workflow automation, and increased security and compliance.

Read Full Article

like

18 Likes

source image

Medium

2w

read

319

img
dot

Image Credit: Medium

Generation Z Lives A Lonely Life Online: Where They Get The Validation They Need And It’s Never…

  • A recent survey by health service company Cigna found that Generation Z, ages 18 to 22, is the loneliest group.
  • Teenagers who use social media excessively may experience feelings of loneliness and inadequacy, according to mental health experts.
  • It is important for young people to have offline experiences and validation beyond social media likes and follows.
  • Teaching teens to build their own self-worth and disconnect from social media can help combat feelings of loneliness and low self-esteem.

Read Full Article

like

19 Likes

source image

Medium

2w

read

349

img
dot

Image Credit: Medium

The “Ready Player One” Tech Talk

  • The book "Ready Player One" is set in the year 2045 and revolves around a virtual utopia known as the OASIS.
  • Wade Watts, a teenager, dedicates his life to studying puzzles within the OASIS that promise power and fortune to the one who solves them.
  • As Wade stumbles upon the first clue, he finds himself facing players who are willing to kill to obtain the ultimate prize.
  • The book is filled with 80's pop culture references and also explores cyber safety and ethics themes, making it a great choice for fans of the genre.

Read Full Article

like

21 Likes

source image

Tech Radar

2w

read

77

img
dot

Image Credit: Tech Radar

Why you should replace your Kaspersky antivirus

  • The Biden administration banned the use of Kaspersky software, citing concerns of potential Russian government influence and disruption.
  • Kaspersky customers were offered UltraAV as a replacement, but its effectiveness is in question.
  • Continuing to use Kaspersky puts devices at risk, as the software won't receive new updates to counter emerging malware and threats.
  • It is recommended to check and activate the default antivirus on devices, and consider additional security tools such as VPNs, parental control apps, and password managers.

Read Full Article

like

4 Likes

source image

Tech Radar

2w

read

108

img
dot

Image Credit: Tech Radar

Tuta Mail could soon be your default iOS mail app – but only after filing a complaint against Apple

  • Tuta Mail, an encrypted email service, filed a complaint against Apple on April 2, 2025, for failing to enable Tuta among the default mail apps on iOS
  • The complaint was withdrawn less than 24 hours later as Apple finally got in touch with Tuta's developers
  • The Digital Market Act requires Apple to allow users to choose third-party services as their default email app
  • Tuta Mail's complaint highlighted Apple's gatekeeping position and called for responsible behavior from large technology companies

Read Full Article

like

6 Likes

For uninterrupted reading, download the app