menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Siliconangle

2w

read

187

img
dot

Image Credit: Siliconangle

ReliaQuest raises $500M at $3.4B valuation to expand AI-driven cybersecurity

  • ReliaQuest has raised over $500 million in funding on a $3.4 billion valuation.
  • The funds will be used to advance AI-driven cybersecurity automation and support international expansion.
  • ReliaQuest offers the GreyMatter security operations platform, which integrates with over 200 cybersecurity and enterprise tools.
  • Using automation and AI capabilities, ReliaQuest claims customers can perform investigations 20 times faster and with 30% greater accuracy.

Read Full Article

like

11 Likes

source image

Cultofmac

2w

read

313

img
dot

Image Credit: Cultofmac

Clear out your overstuffed iCloud storage

  • Running out of iCloud storage space? Learn how to clear old backup files made by iPhone and iPad.
  • iCloud storage is limited and unnecessary files take up precious space. Deleting old backups is essential to free up storage capacity.
  • You can clear iCloud storage by accessing the Settings app, tapping on the Apple Account banner, selecting iCloud, and then iCloud Backup. From there, you can delete old backups and reduce the number of apps that backup to iCloud.
  • Deleting old backups and managing app backups are simple steps to clear iCloud storage and optimize space usage.

Read Full Article

like

18 Likes

source image

VentureBeat

2w

read

339

img
dot

Image Credit: VentureBeat

Runway Gen-4 solves AI video’s biggest problem: character consistency across scenes

  • Runway AI Inc. launched its most advanced AI video generation model called Gen-4, which focuses on character and scene consistency across multiple shots.
  • Gen-4 aims to address the challenge of maintaining visual elements such as character faces and background elements across scenes in AI-generated videos.
  • The new model by Runway allows users to create five and ten-second clips at 720p resolution.
  • Runway's Gen-4 creates a persistent memory of visual elements to render consistent outputs from different angles, enhancing storytelling capabilities in videos.
  • The company showcases the capabilities of Gen-4 through short films like 'New York is a Zoo' and 'The Retrieval.'
  • Runway's strategic approach focuses on building a complete digital production pipeline, catering to the needs of filmmakers for performance, coverage, and visual continuity.
  • The company is raising significant funding, aiming for $300 million in annualized revenue, and has partnerships with Hollywood studios like Lionsgate.
  • While providing opportunities for independent creators, AI video generation technology like Gen-4 raises concerns about potential job loss in the film industry due to automation.
  • Legal issues surround AI training data sources and copyright infringement allegations against companies like Runway, leading to debates on fair use and style mimicry.
  • The technology opens doors for creative applications in marketing, education, and corporate communications, offering both opportunities and disruptions in the filmmaking landscape.

Read Full Article

like

20 Likes

source image

Securityaffairs

2w

read

126

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog

  • The U.S. CISA adds a Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog.
  • The flaw, tracked as CVE-2024-20439, allows attackers to access sensitive log files.
  • No active exploitation was initially observed, but recent attack activity has been reported.
  • CISA orders federal agencies to fix this vulnerability by April 21, 2025.

Read Full Article

like

7 Likes

source image

Wired

2w

read

300

img
dot

Image Credit: Wired

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

  • A cybersecurity professor with a distinguished career mysteriously disappears as the FBI raids his homes and removes his online presence and contact information.
  • Xiaofeng Wang, an acclaimed computer scientist, had his profile erased by Indiana University, where he worked as a tenured professor and associate dean for research.
  • His wife, Nianli Ma, also had her profile removed as government agents conducted searches at their Bloomington and Carmel homes without disclosing the reasons.
  • Efforts to locate Wang and Ma have been unsuccessful, and their employment status and reasons for the actions by the university remain unclear.
  • Fellow researchers expressed concern over the unusual circumstances, questioning the disappearance and lack of communication from Wang.
  • The FBI conducted authorized law enforcement activities at the residences, but court dockets showed no related documents, leaving many details unanswered.
  • Agents were seen moving evidence from the properties, with neighbors witnessing the searches and the FBI declining to disclose specifics of the investigation.
  • News outlets reported the raids and the FBI's limited comments, with the situation prompting questions about the unusual events surrounding Wang and Ma.
  • The investigations at both homes lasted several hours, with the FBI stating they conducted court-authorized activities without providing further information.
  • This story, reported by Ars Technica, continues to develop, and anyone with relevant information is encouraged to come forward for further updates on the investigation.

Read Full Article

like

18 Likes

source image

Medium

2w

read

296

img
dot

Image Credit: Medium

How the Internet Shakes Hands Before Letting You In – SSL Explained in details

  • SSL (Secure Socket Layer) is an internet security protocol that ensures the safe and private transmission of data when you visit a website.
  • SSL encrypts the information exchanged between your device and the website, making it unreadable to hackers or unauthorized individuals.
  • SSL works between the Application Layer and the Transport Layer, acting as a bodyguard that prevents unwanted access to your data.
  • SSL is essential for secure online activities such as shopping, logging into social media accounts, and entering banking details on websites.

Read Full Article

like

17 Likes

source image

TechCrunch

2w

read

365

img
dot

Image Credit: TechCrunch

Oracle under fire for its handling of separate security incidents

  • Tech giant Oracle is facing criticism for how it’s handling two seemingly separate data breaches.
  • One breach involves patient data under Oracle Health, a subsidiary of Oracle. Hackers accessed Oracle servers and stole patient data, with a hacker now trying to extort affected hospitals.
  • The other breach relates to Oracle Cloud servers, with a hacker offering the data of six million Oracle Cloud customers.
  • Oracle denies both breaches, but evidence suggests otherwise, leading to concerns about trust and responsibility.

Read Full Article

like

22 Likes

source image

Siliconangle

2w

read

34

img
dot

Image Credit: Siliconangle

On theCUBE Pod: AI and blockchain collide to reshape enterprise infrastructure

  • Blockchain technology and artificial intelligence are reshaping enterprise infrastructure by accelerating innovation in cloud, cybersecurity, and decentralized systems.
  • The convergence of blockchain and AI is leading to a shift in how organizations build, scale, and secure their infrastructure.
  • TheCUBE Podcast discusses the implications of this shift, including the rise of AI-native operating systems and pressure on legacy blockchain platforms.
  • AI-driven workloads are challenging traditional homogeneous infrastructure models, emphasizing the need for flexibility and specialization.
  • Nvidia's developments like Spectrum-X and AI-centric software point to a new view of infrastructure integrating purpose-built hardware and AI ecosystems.
  • Solana is gaining ground in blockchain technology against Ethereum due to its efficiency and low-cost model.
  • The alignment of AI and decentralized technologies is driving innovation in AI governance, decentralized inference, and blockchain-based model verification.
  • Future events from theCUBE will focus on AI, crypto, and community leadership to explore the intersection of finance, policy, and technology.
  • The NYSE is increasingly seen as a potential hub for crypto legitimacy, attracting excitement from the crypto community.
  • Technologists and founders are urged to consider culture, ecosystems, and policies shaping the next wave of infrastructure for AI and blockchain.

Read Full Article

like

2 Likes

source image

Medium

2w

read

95

img
dot

Image Credit: Medium

Who Makes The Rules? Your Digital Bill of Rights

  • In free societies, we are familiar with the rights we enjoy: things like freedom of religion and freedom of speech.
  • As a young person living in your parent’s home and under their rules, you have a different version of rights that are connected to parental expectations about your behavior.
  • You were born into a world surrounded in every possible way by technology, which brings both opportunities and responsibilities.
  • Create your own Digital Bill of Rights to define how you expect to be treated and how you will treat others.

Read Full Article

like

5 Likes

source image

Medium

2w

read

139

img
dot

Image Credit: Medium

Want to engage more with your grandchildren? Try Technology!

  • To digitally grandparent, it is important to raise cyber aware kids.
  • There are no set rules, each family should determine their own cyber safety and ethics.
  • Digital grandparents should get involved and stay involved in their grandchildren's online lives.
  • Technology can help bridge the communication gap with grandchildren living far away.

Read Full Article

like

8 Likes

source image

TechCrunch

2w

read

261

img
dot

Image Credit: TechCrunch

API testing firm APIsec exposed customer data during security lapse

  • API testing firm APIsec confirmed securing an exposed internal database containing customer data.
  • The exposed database stored records dating back to 2018, including names and email addresses of customers' employees and users.
  • UpGuard, the security research firm that found the database, informed APIsec about the security lapse.
  • APIsec claimed that the exposed data was 'test data' and not customer data, but evidence suggests otherwise.

Read Full Article

like

15 Likes

source image

Mcafee

2w

read

261

img
dot

Image Credit: Mcafee

‘Seeing is Believing is Out the Window’: What to Learn From the Al Roker AI Deepfake Scam

  • AI-generated deepfake videos have become a growing concern in the digital age.
  • Al Roker, a popular TV personality, recently discovered a deepfake video using his image and voice to promote a bogus hypertension cure.
  • The incident highlights the ease with which deepfakes can be created and believed, blurring the line between truth and fiction.
  • To protect ourselves from deepfake scams, it is important to remain skeptical of celebrity endorsements and use tools like McAfee's Deepfake Detector for real-time detection.

Read Full Article

like

15 Likes

source image

Cybersecurity-Insiders

2w

read

200

img
dot

Image Credit: Cybersecurity-Insiders

Zoom software leading to BlackSuit Ransomware drop on Windows

  • Zoom, the popular video conferencing software, is being exploited by cybercriminals to distribute the BlackSuit ransomware on Windows systems.
  • Fake versions of Zoom software are created and distributed, appearing as official applications but containing the malicious ransomware.
  • Cybercriminals use aggressive SEO techniques to make these fake applications rank high in search engine results, increasing the chances of unsuspecting users downloading the ransomware.
  • To avoid falling victim to these scams, users should download software only from official sources and keep their security software up to date.

Read Full Article

like

12 Likes

source image

Tech Radar

2w

read

296

img
dot

Image Credit: Tech Radar

Oracle Health suffers major breach, hospital data potentially exposed

  • Oracle Health has potentially suffered a second data breach.
  • Oracle denies any breach but confirmed patient data was stolen.
  • The breach is believed to have occurred through compromised customer credentials.
  • The attacker demands millions of dollars in cryptocurrency to prevent sale or leak of stolen information.

Read Full Article

like

17 Likes

source image

Medium

2w

read

13

img
dot

Image Credit: Medium

How Secure Hash Algorithms (SHA) Protect Your Digital Life

  • Digital Signatures: Like Signing Your WAEC Certificate!
  • Password Hashing
  • SSL Handshake
  • Integrity Checks

Read Full Article

like

Like

For uninterrupted reading, download the app