menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

2w

read

69

img
dot

Image Credit: Tech Radar

Top gig platform service may have leaked over 14 million user files

  • Yoojo, a European service marketplace, left a major database open and exposed for about 10 days.
  • The exposed database contained approximately 14.5 million files, including sensitive customer information.
  • The leaked information could be used for personalized phishing attacks, identity theft, or wire fraud.
  • Yoojo has since locked down the database, but no official statement has been made.

Read Full Article

like

4 Likes

source image

Socprime

2w

read

73

img
dot

Image Credit: Socprime

CVE-2025-1449: Rockwell Automation Verve Asset Manager Vulnerability Enables Adversaries to Gain Access to Run Arbitrary Commands

  • A vulnerability identified as CVE-2025-1449 allows admin-level threat actors to run arbitrary commands within Rockwell Automation Verve Asset Manager products.
  • The flaw, with low attacker complexity, arises from improper input validation in Verve's deprecated Legacy Agentless Device Inventory feature.
  • CVE-2025-1449 impacts product versions 1.39 and earlier, but the vendor has released a fix in version 1.40.
  • Mitigation measures include restricting network exposure, using firewalls, and applying secure remote access methods like VPNs.

Read Full Article

like

4 Likes

source image

Tech Radar

2w

read

425

img
dot

Image Credit: Tech Radar

Great news everyone! Google is going to let you transfer your passkeys to a new phone

  • Google is working on passkey import and export feature for its password manager.
  • The potential update will make it easier to transfer passkeys between devices.
  • Passkey import/export is built on a new FIDO Alliance protocol.
  • Passkeys are considered the successor to passwords, providing a more secure login method.

Read Full Article

like

25 Likes

source image

SiliconCanals

2w

read

312

img
dot

Image Credit: SiliconCanals

Utrecht-based Florbs secures €1M to strengthen its cloud data protection platform: Know more

  • Dutch cybersecurity company Florbs has raised €1M in seed funding to support the expansion of its cloud data protection platform for Google Drive.
  • The funding comes from founders of successful companies with expertise in regulated industries where data security and compliance are crucial.
  • Florbs enables businesses to audit file access, assess risks, and provide security recommendations to prevent unauthorized access.
  • The platform automates security workflows, helping businesses maintain compliance with frameworks such as ISO, GDPR, and NIS2.

Read Full Article

like

18 Likes

source image

Siliconangle

2w

read

290

img
dot

Image Credit: Siliconangle

SolarWinds expands AI capabilities across observability and IT management portfolio

  • SolarWinds expands AI capabilities across observability and IT management portfolio.
  • The enhancements aim to help businesses achieve greater IT operational resilience.
  • Key updates include SQUADCAST Incident Response, expanded hybrid IT awareness, and AI-powered Log Insights.
  • Other enhancements include SolarWinds AI Query Assist and AI-powered capabilities in the Service Desk.

Read Full Article

like

17 Likes

source image

Siliconangle

2w

read

277

img
dot

Image Credit: Siliconangle

Prowler raises $12.5M to advance its open-source driven cloud security platform

  • Prowler, an open cloud security platform startup, has raised $12.5 million in funding.
  • Prowler began as an open-source project on GitHub and expanded to include support for multiple cloud platforms.
  • The company's main solution, Prowler Cloud, offers continuous monitoring and detailed security insights.
  • Prowler actively supports the Open Cloud Security movement, emphasizing openness, transparency, and collaboration.

Read Full Article

like

16 Likes

source image

Lastwatchdog

2w

read

117

img
dot

SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset

  • IAM is evolving to ensure the right individuals, machines, and AI-driven agents can operate securely in the digital world.
  • Forrester's report highlights the need for a fundamental reset in IAM due to AI, automation, and other shifts.
  • Traditional IAM frameworks may struggle to handle deepfake fraud, agentic AI, and machine identity challenges.
  • Foundational IAM security principles remain crucial amidst growing identity-based attacks.
  • AI can aid in proactive identity security by enabling centralized visibility and real-time threat protection.
  • To counter deepfake fraud, organizations can prioritize technical methods like liveness detection and behavioral analysis.
  • AI-driven IAM agents pose unique security risks, requiring proper governance and human oversight.
  • Shared risk signals can transform IAM from reactive to proactive security models.
  • Enterprises face challenges in fully embracing decentralized identity due to interoperability issues and regulations.
  • Widespread enterprise adoption of decentralized identity may occur gradually over the next few years.

Read Full Article

like

7 Likes

source image

Tech Radar

2w

read

429

img
dot

Image Credit: Tech Radar

The European Commission wants a backdoor for end-to-end encryptions for law enforcement

  • The European Commission has unveiled a new internal security strategy called ProtectEU.
  • The strategy aims to enable law enforcement authorities to access encrypted data in a lawful manner.
  • It also proposes to establish Europol as a truly operational police agency to reinforce support to member states.
  • The EU faces challenges in delivering a coherent and collaborative security strategy, as it consists of 27 sovereign nations.

Read Full Article

like

25 Likes

source image

Medium

2w

read

242

img
dot

Image Credit: Medium

Why Your VPN Might Not Be as Safe as You Think

  • Many free VPNs are selling user browsing habits to data brokers, compromising privacy.
  • The best VPN cannot protect against hackers infiltrating through vulnerable IoT devices.
  • Not all VPNs are created equal, particularly the free ones.
  • To ensure privacy and convenience, it is important to choose a reliable VPN and secure IoT devices.

Read Full Article

like

14 Likes

source image

Medium

2w

read

403

img
dot

Image Credit: Medium

IoT23 Anomaly Sentinel: A Unified Platform for AI-Powered IoT Security

  • IoT23 Anomaly Sentinel is a unified threat detection and compliance platform for IoT security.
  • It combines machine learning, behavioral analysis, and regulatory alignment.
  • The system features modules for real-time traffic monitoring, threat intelligence, device inventory management, and risk and compliance management.
  • IoT23 Anomaly Sentinel aims to provide proactive, intelligent, and adaptive defense systems for IoT security.

Read Full Article

like

24 Likes

source image

Cybersecurity-Insiders

2w

read

308

img
dot

Image Credit: Cybersecurity-Insiders

Dealing With Merger and Acquisition Driven Vault Sprawl: The Hidden Risks Of Multiple Secret Managers in Large Enterprises

  • Secret management poses challenges in enterprises, especially with multiple secret managers in use due to mergers and acquisitions.
  • Redundancy in secret management tools can lead to security risks, operational inefficiencies, and compliance challenges.
  • Enterprises often have multiple secret managers in place, with larger companies facing more complex 'vault sprawl'.
  • Standardizing on a single secrets management platform is ideal but often challenging in growing organizations.
  • Mergers and acquisitions exacerbate secret management risks by combining different systems from distinct organizations.
  • Operational overhead and complexities arise from using multiple secret managers within an organization.
  • Fragmented secret management landscapes increase the risk of orphaned or forgotten secrets, leading to security vulnerabilities.
  • Multiple secret managers complicate audits, regulatory adherence, and increase training costs for security teams.
  • Mitigating vault sprawl requires gaining visibility into all secrets, discovering their locations, and automating consolidation.
  • Enterprises should prioritize visibility, standardization, and automation to ensure secure and manageable secrets at scale.

Read Full Article

like

18 Likes

source image

Cybersecurity-Insiders

2w

read

169

img
dot

Image Credit: Cybersecurity-Insiders

New Study Ranks Platforms By Password Reset Frequency

  • YouTube ranks 1st with 35.8K password-related searches per 100K users, resulting in 4.3 average password resets per user yearly.
  • Facebook comes in 2nd, generating 28.2K password recovery searches, with users averaging 3.4 password resets annually.
  • Pinterest follows in 3rd, with 20K password-related queries, and 73.8 million monthly 'recover account' searches.
  • X takes the 4th position with 8.4K password recovery or reset queries, translating to an average of 1 password reset per user yearly.

Read Full Article

like

10 Likes

source image

VoIP

2w

read

112

img
dot

Image Credit: VoIP

UK Set to Strengthen Cybersecurity with New Bill

  • The UK government is set to introduce the Cyber Security and Resilience Bill to strengthen national cybersecurity protocols.
  • The legislation aims to enhance digital security frameworks for critical infrastructure organizations and reduce cyber threats.
  • Over 1,000 suppliers will be affected by the new regulations, requiring them to enhance their security measures.
  • The bill is part of the government's Plan for Change to safeguard the UK's digital infrastructure and mitigate the economic impacts of cyberattacks.

Read Full Article

like

6 Likes

source image

Securityaffairs

2w

read

134

img
dot

Image Credit: Securityaffairs

Spike in Palo Alto Networks scanner activity suggests imminent cyber threats

  • Hackers are scanning for vulnerabilities in Palo Alto Networks GlobalProtect portals, likely preparing for targeted attacks.
  • Over 24,000 unique IP addresses have attempted to access GlobalProtect portals, indicating a coordinated effort to identify vulnerabilities.
  • GreyNoise identified around 23,000 suspicious IPs and 150 known malicious ones, suggesting a potential targeted attack.
  • Organizations using Palo Alto Networks products are recommended to take steps to secure their login portals in response to the heightened scanning activity.

Read Full Article

like

8 Likes

source image

Analyticsindiamag

2w

read

208

img
dot

Image Credit: Analyticsindiamag

Microsoft Security Copilot Uncovers New Vulnerabilities in Open-Source Bootloaders

  • Microsoft’s Security Copilot has uncovered vulnerabilities in open-source bootloaders including GRUB2, U-Boot, and Barebox.
  • The vulnerabilities could allow attackers to execute arbitrary code, potentially bypassing security measures like Secure Boot.
  • The flaws were primarily found in the filesystem parsing components of the bootloaders.
  • Microsoft has communicated the vulnerabilities and patches have been issued to fix the issues.

Read Full Article

like

12 Likes

For uninterrupted reading, download the app