menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

2w

read

339

img
dot

Image Credit: Tech Radar

AWS customers hit by major cyberattack which then stored stolen credentials in plain sight

  • Misconfigured AWS instances were exploited in a major cyberattack
  • Researchers discovered vulnerabilities in public sites, leading to exfiltration of data
  • Sensitive information like credentials and source code were sold on the dark web
  • AWS responded to the issue and took actions to mitigate the risk

Read Full Article

like

20 Likes

source image

Arstechnica

2w

read

239

img
dot

Image Credit: Arstechnica

New BadRAM attack neuters security assurances in AMD Epyc processors

  • A new attack called BadRAM has the ability to breach the security assurances in AMD Epyc processors.
  • Traditionally, physical access to a device meant compromising its security, but in the age of cloud computing, this is not always true.
  • Chipmakers have implemented protections in their silicon to safeguard sensitive data in virtual machines.
  • BadRAM attack poses a significant risk to the security of sensitive information stored on servers.

Read Full Article

like

14 Likes

source image

Pymnts

2w

read

326

img
dot

Image Credit: Pymnts

Gen Digital to Add Financial Wellness Tools With MoneyLion Acquisition

  • Gen Digital plans to add financial wellness tools to its offerings by acquiring MoneyLion.
  • The proposed acquisition is expected to close in the first half of Gen's fiscal year 2026.
  • Gen's cyber safety brands include Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner.
  • MoneyLion's tools include a personal finance platform, an AI recommendation platform, and a digital ecosystem for consumer finance.

Read Full Article

like

19 Likes

source image

The Fintech Times

2w

read

321

img
dot

LexisNexis Risk Solutions to Acquire IDVerse in Fight Against AI-Generated Fraud

  • LexisNexis Risk Solutions is set to acquire IDVerse, an AI-powered automated document authentication and fraud detection solutions provider.
  • IDVerse's technology uses AI to combat fraud and deepfakes by verifying the authenticity of identity documents and matching consumer's faces with photos on documents.
  • The acquisition will integrate IDVerse's capabilities across all solutions and enhance customer readiness for future fraud threats through advanced AI-powered solutions.
  • The transaction is expected to close in early 2025, subject to customary regulatory consents.

Read Full Article

like

19 Likes

source image

Pymnts

2w

read

317

img
dot

Image Credit: Pymnts

How Data-Sharing Consortium Approaches Are Beating Back Bank Fraud

  • Sharing data across financial institutions is becoming a key approach to combating bank fraud and cybercrime.
  • Data-sharing consortiums combine anonymized data to identify suspicious patterns and predict fraudulent activity faster.
  • Sharing data comes with challenges, including privacy concerns and regulatory compliance, but financial institutions are working to address them.
  • By collaborating and sharing insights, financial institutions are not only protecting themselves but also strengthening the overall financial ecosystem against vulnerabilities.

Read Full Article

like

19 Likes

source image

TechCrunch

2w

read

360

img
dot

Image Credit: TechCrunch

US Senator announces new bill to secure telecom companies in wake of Chinese hacks

  • U.S. Senator Ron Wyden has introduced a new bill, the Secure American Communications Act, in response to Chinese government hacks on telecom providers.
  • The bill aims to secure American telephone networks and communications by implementing specific cybersecurity requirements.
  • Telecom providers would be required to perform annual vulnerability tests, hire independent auditors to ensure compliance, and submit documentation and statements of compliance.
  • Senator Wyden emphasized the need for mandatory security rules to protect against hackers and espionage.

Read Full Article

like

21 Likes

source image

Tech Radar

2w

read

99

img
dot

Image Credit: Tech Radar

Top US heart surgery device maker hit by ransomware attack

  • Artivion, a major US heart surgery device maker, has confirmed suffering a ransomware attack.
  • The company took certain systems offline and initiated an investigation to assess and contain the incident.
  • While disruptions to order and shipping processes have been mitigated, the attack has incurred expenses for the company.
  • Artivion has not disclosed the identity of the attackers or whether any sensitive information has been stolen.

Read Full Article

like

6 Likes

source image

TechBullion

2w

read

408

img
dot

Image Credit: TechBullion

Payment Processing & Acquiring: Technology Behind Retail Transactions

  • Payment processing involves completing a purchase using digital payment methods like credit cards or mobile wallets.
  • Acquirers or acquiring banks connect merchants to card networks, enabling businesses to accept payments.
  • Advanced technologies such as NFC, mobile wallets, chipped cards, cloud technology, AI, and blockchain power modern payment systems.
  • Security measures like encryption, tokenization, PCI compliance, and fraud detection are crucial in payment technology.

Read Full Article

like

24 Likes

source image

Secureerpinc

2w

read

417

img
dot

Travel Safely: Shielding Mobile Brands from Scams

  • Travel-related scams targeting mobile brand users are on the rise.
  • Hackers use fake websites and phishing tactics to steal sensitive information.
  • To protect customers, businesses should educate employees, update security measures, and use built-in mobile brand protection.
  • Travel safety tips, such as booking through trusted apps, should be shared with consumers.

Read Full Article

like

25 Likes

source image

Cybersecurity-Insiders

2w

read

195

img
dot

Image Credit: Cybersecurity-Insiders

Ransomware related news trending on Google

  • Cipla has become a victim of the Akira ransomware attack which stole 70GB of sensitive data. Reports suggest stolen data includes financial documents, customer contact information, and employee details.
  • Electrica Group, the company responsible for Romania's electricity distribution, has reported a ransomware attack that targeted its IT infrastructure and SCADA systems.
  • Black Basta ransomware group has been launching sophisticated social engineering attacks. The group floods victims with high volume of emails, often containing malicious attachments or links.
  • Artivion, a cardiac equipment manufacturer, has suffered a ransomware attack. The firm manufactures heart valves, stents, and prosthetics.
  • The recent surge in ransomware attacks highlights the growing threat to industries, such as healthcare, energy, and global supply chains.
  • Businesses should prioritise security and invest in advanced threat detection systems.
  • Employees must be continuously trained to recognise and respond to cyber threats to limit the security risks.
  • Collaboration between private organisations, government agencies, and cybersecurity experts will be crucial in the face of evolving threats.

Read Full Article

like

11 Likes

source image

Tech Radar

2w

read

347

img
dot

Image Credit: Tech Radar

Recycled racks and spare part servers: Amazon reveals major data center sustainability push

  • Amazon is focusing on recycling and reusing data center components to meet its sustainability goals.
  • In 2024, over 99% of all Amazon Web Service (AWS) securely decommissioned racks were diverted from landfills.
  • 13% of spare parts used by AWS are sourced from its own reuse inventory.
  • Amazon aims to design better, extend the lifetime of hardware, and develop a comprehensive circular economy roadmap.

Read Full Article

like

20 Likes

source image

Medium

2w

read

313

img
dot

Image Credit: Medium

How Chat GPT Turned Me In To A Hacker

  • ChatGPT, an advanced AI language model by OpenAI, has changed the perception of hacking by providing a more accessible and conversational learning experience.
  • Before ChatGPT, resources for learning hacking were limited and often required sifting through overwhelming amounts of information.
  • ChatGPT simplified the learning process by allowing direct questions and clear explanations, making technical concepts easier to understand.
  • This new approach helped me unlock my potential in the world of hacking and cybersecurity.

Read Full Article

like

18 Likes

source image

Socprime

2w

read

117

img
dot

Image Credit: Socprime

How to Enable and Manage AWS WAF Logging with CloudWatch Logs

  • AWS WAF allows you to log traffic of your web ACLs, providing detailed insights such as the request details, matched rules, and timestamps.
  • To enable logging, navigate to the AWS WAF console, select the desired web ACL, and enable logging with Amazon CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose as the destination.
  • Manage logs by applying field redaction to protect sensitive data and use log filtering to focus on specific web requests based on criteria like rule action or labels.
  • Analyze logs to gain insights into incoming web requests, matched rules and their actions, and details like IP address, HTTP method, and headers. Use Amazon CloudWatch to set alarms and create dashboards for monitoring and visualization.

Read Full Article

like

7 Likes

source image

Medium

2w

read

100

img
dot

Image Credit: Medium

You Know Less About Yourself Than the Internet Does

  • Personal data extends far beyond the obvious like name, email, or phone number.
  • Various types of data are collected, analyzed, and stored without knowledge or consent.
  • Lost or stolen documents, biometric data, and identifiers pose privacy and security risks.
  • Exposure of personal information can lead to fraud, discrimination, or manipulation.

Read Full Article

like

6 Likes

source image

Socprime

2w

read

356

img
dot

Image Credit: Socprime

Optimizing Elasticsearch Master Node for Cluster Stability

  • The master node is responsible for lightweight cluster-wide actions such as creating or deleting an index and tracking cluster membership.
  • Optimizing the master node is crucial for cluster stability and performance.
  • Recommendations include using dedicated master nodes, allocating sufficient resources, configuring heap size, optimizing network communication, managing cluster state, monitoring garbage collection, ensuring high availability, limiting indices and shards, and using monitoring tools.
  • Following these best practices will help maintain a stable and robust Elasticsearch cluster.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app