menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

2w

read

430

img
dot

Image Credit: Medium

Difference between Devices and Servers

  • Devices, also known as endpoints or hosts, are tools individuals use to connect to a network.
  • Servers are specialized machines designed to process, store, and distribute information at scale.
  • Devices function as clients, consuming services by sending and receiving data through communication protocols.
  • The client-server architecture defines the interaction, with clients initiating requests and servers processing them.

Read Full Article

like

25 Likes

source image

Hackernoon

2w

read

246

img
dot

Image Credit: Hackernoon

Behind the Canvas: The Hidden Cost of AI-Generated Ghibli Art

  • The rise of AI-generated art, particularly the Ghibli aesthetic, has led to millions of users unknowingly contributing their facial recognition data to platforms like DALL·E, MidJourney, and ChatGPT.
  • Platforms like ChatGPT not only collect visual data but also facial recognition data, capturing emotions and micro-expressions of users as they engage with AI models.
  • Facial recognition technology carries invisible costs, with data potentially being used beyond art creation for purposes like behavior prediction and emotional influence.
  • The ethical concerns surrounding the collection and use of facial data without clear consent raise questions about transparency and user control over personal information.
  • In the context of AI art, facial data could be misused for activities like deepfake creation, impacting trust, privacy, and potentially influencing public opinion.
  • To protect facial data, users are advised to review privacy policies, utilize data management services, and stay vigilant by monitoring and updating privacy settings regularly.
  • While AI-generated art offers creative possibilities, the trade-off between privacy and innovation underscores the importance of user awareness and corporate responsibility in data handling.
  • As the future of AI art unfolds, the need for transparency, user control, and ethical data practices become crucial aspects that shape the balance between creativity and privacy.

Read Full Article

like

14 Likes

source image

Pymnts

2w

read

311

img
dot

Image Credit: Pymnts

Report: Oracle Staff Tell Some Clients Hacker Stole Login Credentials

  • Oracle staff told some clients that a hacker stole some old client login credentials.
  • The hacker accessed usernames, passkeys, and encrypted passwords.
  • Oracle did not immediately reply to PYMNTS’ request for comment.
  • This incident is separate from one in which Oracle notified some users of its patient records management software that hackers stole patient data.

Read Full Article

like

18 Likes

source image

Siliconangle

2w

read

385

img
dot

Image Credit: Siliconangle

Adaptive Security raises $43M for its AI cyberattack simulation platform

  • Adaptive Security, a startup that helps companies test their cybersecurity using simulated social engineering attacks, has raised $43 million in funding.
  • The funding round was led by Andreessen Horowitz and the OpenAI Startup Fund, with participation from executives of Google, Workday, and other major tech firms.
  • Adaptive Security provides a platform that reduces the risk of AI-powered social engineering attacks by launching simulated cyberattacks and offering personalized cybersecurity training.
  • The platform uses large language models to create simulated phishing emails and offers features like Direct Email Injection and interactive training modules.

Read Full Article

like

23 Likes

source image

Medium

2w

read

25

img
dot

Image Credit: Medium

Understanding the TCP and IP protocols

  • TCP (Transmission Control Protocol) and IP (Internet Protocol) are two fundamental protocols that are essential for the functioning of the internet.
  • IP is responsible for routing the data packets to their correct destination, while TCP ensures that all packets arrive intact, in the right order.
  • TCP is reliable and verifies the delivery of packets, while UDP (User Datagram Protocol) prioritizes speed over reliability.
  • Understanding TCP/IP is crucial for those working in the tech industry, as it forms the backbone of the internet.

Read Full Article

like

1 Like

source image

Medium

2w

read

324

img
dot

Image Credit: Medium

Protecting Data in the Age of AI: Follow the Data, Follow the User

  • In the age of AI, data security is crucial as organizations handle sensitive information amidst evolving threats and cyber-attacks.
  • Following the data flow and user interactions is key to identifying vulnerabilities and mitigating security risks effectively.
  • Tools like Microsoft Purview help organizations address challenges posed by AI-driven data interactions by offering visibility and control.
  • Tracking data flows, monitoring user behavior, and implementing robust security measures are essential for safeguarding data assets.
  • Data-centric security approaches help organizations protect valuable data assets, maintain trust, and stay ahead of emerging threats.
  • Monitoring user interactions and AI-driven activities are crucial to detecting and mitigating potential security breaches proactively.
  • AI integration introduces security risks like data oversharing, compliance challenges, and vulnerabilities to new cyber-attacks.
  • Agentic AI systems introduce unique security challenges related to autonomy, transparency, ethical dilemmas, and potential job displacement.
  • Efficient data security measures save organizations from breaches, compliance penalties, and financial losses in the fast-paced AI-driven landscape.
  • Microsoft Purview DSPM for AI offers real-time insights, security recommendations, reports, and policy enforcement to enhance AI data security posture.

Read Full Article

like

19 Likes

source image

Tech Radar

2w

read

385

img
dot

Image Credit: Tech Radar

438 crypto masterminds are responsible for the majority of pump-and-dump crypto coin schemes globally, researchers find

  • 438 crypto masterminds are responsible for the majority of pump-and-dump crypto coin schemes globally
  • Telegram's ease of communication fuels the rise of crypto manipulations
  • Advanced tools like Perseus expose crypto scammers, but regulation remains essential
  • Pump-and-dump schemes account for $3.2 trillion in artificial trading and earn $250 million annually

Read Full Article

like

23 Likes

source image

Siliconangle

2w

read

77

img
dot

Image Credit: Siliconangle

Cyberhaven nabs $100M for its AI-powered data protection platform

  • Data security startup Cyberhaven Inc. has raised $100 million in a Series C funding round, led by StepStone Group.
  • The funding round values Cyberhaven at over $1 billion.
  • Cyberhaven's platform identifies and ranks cybersecurity risks and provides remediation suggestions.
  • The company plans to use the funding to expand its platform's features and invest in go-to-market programs.

Read Full Article

like

4 Likes

source image

Medium

2w

read

268

img
dot

Image Credit: Medium

Dmail Network: Pioneering the Future of Decentralized Communication

  • Dmail Network merges blockchain technology with artificial intelligence to redefine email communication.
  • By integrating blockchain, Dmail enables encrypted messaging, on-chain asset transfers, and NFT domain minting.
  • AI tools like the AI Mail Assistant and AI Personal Agent automate tasks and enhance user experience.
  • Dmail's rapid adoption in the Web3 space is driven by its decentralized infrastructure, AI-driven marketing, and strategic collaborations.

Read Full Article

like

16 Likes

source image

Tech Radar

2w

read

385

img
dot

Image Credit: Tech Radar

Over $1.5 billion of crypto was lost to scams or theft in just three months of 2025

  • More than $1.5 billion of crypto was lost to scams and theft in Q1 2025.
  • The ByBit hack accounted for the majority of the funds lost.
  • Wallet compromise is the most common way people lose their crypto.
  • The total value of funds returned to customers was just 0.4% of the stolen funds.

Read Full Article

like

23 Likes

source image

Pymnts

2w

read

151

img
dot

Image Credit: Pymnts

NICE Actimize Adds Agentic AI to Financial Crime Prevention Platform

  • NICE Actimize has added agentic AI capabilities to its X-Sight ActOne platform for fraud and financial crime prevention.
  • The agentic AI capabilities automate processes, orchestrate workflows, and engage human oversight only when necessary.
  • The AI can autonomously craft investigation plans based on policies and procedures, learn to become more effective, and provide transparency.
  • NICE Actimize aims to enable financial institutions to scale operations and achieve cost and labor efficiencies.

Read Full Article

like

9 Likes

source image

Wired

2w

read

295

img
dot

Image Credit: Wired

Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing, Sources Say

  • Prior to disappearing, cybersecurity professor Xiaofeng Wang faced an inquiry regarding unreported research funding from China, as per sources.
  • Indiana University questioned Wang about a 2017-2018 grant from China, suspecting improper disclosure of funding.
  • Wang had allegedly explained the funding situation to IU and was informed of ongoing inquiry in February.
  • IU faculty board member Alex Tanford assisted Wang amidst allegations of research misconduct around disclosure issues.
  • Wang's research papers listed funding from various US entities, but collaborations with Chinese researchers had proper disclosures.
  • An unsigned statement by Purdue professor Ninghui Li sheds light on Wang's situation, including allegations and administrative steps taken by IU.
  • FBI conducted searches at Wang's homes, IU terminated his job, and Wang's lawyers stated no pending criminal charges against him.
  • IU declined commenting on Wang's case, emphasizing FBI investigation's involvement and confidentiality.
  • Concerns are raised over Wang's abrupt dismissal, potential violations of university policies, and the impact on academic freedom.
  • The FBI's actions and university silence are criticized, echoing past controversies in the treatment of Chinese-born academics in the US.

Read Full Article

like

17 Likes

source image

Sdtimes

2w

read

242

img
dot

Image Credit: Sdtimes

Sonatype reveals 18,000 malicious open source packages in its Q1 Open Source Malware Index

  • Sonatype's quarterly Open Source Malware Index reveals 17,954 malicious open source packages.
  • 56% of the malicious packages were related to data exfiltration.
  • 80% of the packages categorized as sophisticated malware like droppers or code injection malware.
  • The increasing risk of sensitive information being compromised through open source components is emphasized.

Read Full Article

like

14 Likes

source image

Medium

2w

read

372

img
dot

Image Credit: Medium

Are You A Bystander in the Digital Age?

  • The Bystander Effect, where people refuse to get involved in situations of obvious wrong and someone else's need for help, is still relevant in the Digital Age.
  • The internet gives us a window on the world, making it easier to witness the triumphs and struggles of others, but it also makes it easier to remain silent and indifferent in the face of pain and trauma.
  • This discussion applies to cyberbullying, where bystanders may choose not to intervene or even join in, thereby empowering the cyberbully and encouraging their harmful behavior.
  • To avoid being a bystander and to make a positive difference, it is important to intervene safely to support the person being targeted and let the cyberbully know that such behavior is unacceptable.

Read Full Article

like

22 Likes

source image

Medium

2w

read

160

img
dot

Image Credit: Medium

Looking for Parental Control and Security Tools?

  • Parental controls should be seen as aids, not replacements, for active parenting.

Read Full Article

like

9 Likes

For uninterrupted reading, download the app