menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Fintechnews

3w

read

433

img
dot

Image Credit: Fintechnews

Experian and GBG Join Forces to Tackle Identity Fraud in Australia and NZ

  • Experian and GBG have expanded their partnership to enhance fraud prevention and identity verification services in Australia and New Zealand.
  • The collaboration combines Experian’s data capabilities with GBG’s greenID platform for real-time identity verification across various sectors.
  • The solution enables fast and secure identity checks using name, address, and date of birth matching without paperwork or in-person visits.
  • Growing concerns around identity-related fraud prompt the move.
  • Experian's report highlights that 71% of businesses in EMEA and APAC struggle to keep up with evolving fraud threats.
  • 68% of businesses in Australia and New Zealand saw a rise in fraud last year, with identity verification as a top challenge.
  • The partnership leverages GBG's past work with illion and is one of the first customer-facing outcomes of the integration.
  • Mathew Demetriou, of Experian, highlights the focus on enhancing customer experience through technology.
  • Carol Chris from GBG emphasizes the need for powerful tools to manage fraud risk and customer experience.
  • The partnership aims to deliver innovative, robust, and user-friendly solutions to the market.
  • The collaboration signifies the commitment to combat identity fraud and protect consumers and businesses.
  • The partnership aims to assist clients in onboarding faster and staying ahead of fraud.
  • Experian plans to make high-performing technology more accessible to clients through this partnership with GBG.
  • Fraud risk management and customer protection are crucial in the rapidly evolving fraud landscape.
  • The combined efforts reflect trust and alignment between GBG and Experian in delivering compliant solutions.
  • The collaboration aligns with the shared goal of delivering robust and innovative solutions to combat fraud.

Read Full Article

like

26 Likes

source image

Medium

3w

read

48

img
dot

Image Credit: Medium

Privacy Issues in Cybersecurity: How Residential Proxies Can Solve Them

  • Privacy issues in cybersecurity include data breaches, tracking of online activities, and vulnerability on public Wi-Fi networks.
  • Residential proxies offer solutions by masking real IP addresses, enhancing security, and enabling access to geo-blocked content.
  • They help avoid surveillance, protect sensitive data, and bypass anti-scraping technologies effectively.
  • Thordata's residential proxies provide global coverage, high anonymity levels, and automated IP rotation for enhanced security.
  • Encrypted connections and data protection are prioritized by Thordata to ensure user security.
  • Residential proxies are crucial for maintaining online anonymity, protecting data, and navigating geo-restrictions.
  • Thordata offers reliable, secure, and efficient residential proxy services for individual users and businesses.
  • Using Thordata's proxies can enhance online privacy, data security, and browsing experiences.
  • Consider utilizing Thordata's residential proxies to safeguard your online activities effectively.
  • Engage with the community to discuss experiences with residential proxies and enhance online privacy together.

Read Full Article

like

2 Likes

source image

Bworldonline

3w

read

79

img
dot

Image Credit: Bworldonline

Need for cybersecurity experts grows as PH goes more digital, says DICT

  • The Department of Information and Communications Technology (DICT) highlights the growing need for cybersecurity professionals as major infrastructure projects connect the Philippines digitally.
  • DICT Secretary emphasized the importance of cybersecurity experts in defending against external threats faced by the country.
  • About 60% of DICT's focus has been on cybersecurity following the May midterm elections.
  • Cyberwarfare is emphasized as a critical concern affecting critical systems in the country.
  • The National Intelligence Coordinating Agency (NICA) revealed 234 data breaches in high-level government agencies in 2025.
  • Cyber-related crimes tripled in 2024, with reported complaints reaching 10,004 and financial losses totaling P198 million.
  • The Cybersecurity Council of the Philippines (CSCP) was formalized to enhance digital resilience in collaboration with industry leaders and government offices.
  • CSCP aims to promote cybersecurity awareness and facilitate public-private partnerships for enhanced digital security.
  • DICT plans to triple national cell sites from 30,000 in partnership with telecom companies while prioritizing cybersecurity measures to fortify digital defenses.
  • Efforts are ongoing to improve the accessibility and affordability of Starlink satellite internet in the Philippines, potentially positioning it as the second-largest market for the provider.

Read Full Article

like

4 Likes

source image

Dev

3w

read

853

img
dot

Image Credit: Dev

New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild

  • A set of critical vulnerabilities in VMware ESXi, including CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, allows attackers to escape virtual machines and compromise host systems.
  • The vulnerabilities have been observed exploited in the wild, affecting ESXi 7.x and 8.x environments as well as related VMware products like vSphere, Workstation, Fusion, and Cloud Foundation.
  • CVE-2025-22224 involves a race condition in VMCI leading to heap memory corruption, while CVE-2025-22225 and CVE-2025-22226 relate to memory access issues in ESXi modules and the host-guest file system interface.
  • When chained together, these vulnerabilities enable full VM escape, allowing attackers to control the host, leak sensitive data, and disrupt business operations.
  • VMware advises immediate patching for ESXi 7.x and 8.x to prevent exploitation, as well as legacy versions like 6.5 and 6.7, which lack automatic updates.
  • Mitigation involves applying official patches provided by VMware, as there are no reliable workarounds available to address the vulnerabilities.
  • Temporary measures include securing network access, hardening guest VMs, and enabling monitoring and auditing to detect signs of exploitation.
  • Patches for ESXi versions 6.5, 6.7, 7.0, and 8.0 are available, along with updates for desktop virtualization products like VMware Workstation Pro and Fusion.
  • The vulnerabilities were publicly disclosed on March 4, 2025, prompting an emergency advisory from Chaitin Security Lab the following day.
  • VM escape vulnerabilities pose a severe risk and require immediate action to protect virtual infrastructures from potential exploits.

Read Full Article

like

1 Like

source image

Wired

3w

read

304

img
dot

Image Credit: Wired

Minnesota Shooting Suspect Allegedly Used Data Broker Sites to Find Targets’ Addresses

  • A suspect in Minnesota allegedly used data broker sites to find targets' addresses before a violent spree that resulted in the murder of a state representative and her husband, and the shooting of a state senator and his wife.
  • The suspect, Vance Boelter, is accused of shooting Representative Melissa Hortman and her husband, Mark Hortman, who died from their injuries, as well as shooting state senator John Hoffman and his wife, who are currently recovering.
  • Police found handwritten lists of public officials' addresses in the suspect's SUV, along with notebooks listing search platforms for personal information.
  • The addresses of the targeted lawmakers were readily available online through campaign websites and legislative webpages.
  • The suspect faces charges of second-degree murder and is alleged to have stalked his victims online before the attacks.
  • Privacy advocates argue for regulation of data brokers to protect individuals' sensitive information, as the US lacks comprehensive data privacy legislation.
  • Lawmakers like US Senator Ron Wyden emphasize the risks posed by data brokers who sell personal information that can be used for harmful purposes.
  • Basic information like home addresses can be easily obtained through public records or people search services, raising concerns about data security and personal safety.
  • The incident underscores the urgency to address the protection of personal data online and the potential dangers of unregulated data broker services.
  • Advocates call for action by lawmakers to prevent further tragedies and protect individuals from the misuse of personal data facilitated by data brokers.

Read Full Article

like

18 Likes

source image

Siliconangle

3w

read

194

img
dot

Image Credit: Siliconangle

OpenAI bags $200M Pentagon contract to explore defense industry AI applications

  • OpenAI has secured a $200 million Pentagon contract for a pilot program in collaboration with the U.S. Department of Defense to develop frontier AI capabilities.
  • The DoD confirmed the contract award, with an initial payment of $2 million, for OpenAI to create AI solutions addressing national security challenges.
  • The project aims to explore how AI can transform administrative functions like healthcare applications and cyber defense within the DOD.
  • OpenAI's AI applications will align with usage policies that prohibit the development or control of weapons systems.
  • The U.S. government has shown interest in utilizing AI for defense, with recent contracts awarded to companies like Anduril Industries Inc. and Anthropic PBC.
  • OpenAI expressed its willingness to engage in national security areas, highlighting its commitment to exploring AI's potential in defense.
  • Executives from OpenAI, Palantir, and Meta Platforms Inc. were sworn into the U.S. Army Reserve to advise on AI military applications.
  • OpenAI is involved in Project Stargate, aiming to invest in AI computing infrastructure in the U.S.

Read Full Article

like

11 Likes

source image

Dev

3w

read

423

img
dot

Image Credit: Dev

My Journey with the Zen of Python: Learning to Code, Learning to Grow

  • Signing up for the 'From Zero to Hero' Python Mentorship Program was more than just about learning to code, it was a journey of personal growth and new beginnings.
  • Discovering the Zen of Python provided a mindset shift, emphasizing simplicity, readability, and taking action in coding.
  • Embracing the principle that 'simple is better than complex,' the focus shifted towards clear, understandable, and trustworthy code.
  • The importance of 'readability counts' highlighted the need to make code understandable not only to machines but also to humans.
  • Realizing that 'now is better than never' motivated a start despite imperfections, emphasizing progress over perfection.
  • Striving for 'one obvious way to do it' helped in making code not just functional but solid and comprehensible.
  • Personal growth goals include applying Python to cybersecurity and data analysis, aiming to build impactful skills and gaining confidence.
  • The desire is to progress in focus, resilience, and belief, envisioning a career path where tech enables personal and creative freedom.
  • Joining the program was a decision to actively participate, seeking growth, and opportunities to learn and contribute to the tech field.
  • Acknowledging the support of Black Python Dev for providing this transformative mentorship experience and encouraging beginners to pursue their coding journey.
  • Encouragement is given to those considering learning to code to begin now, emphasizing the importance of starting despite any perceived imperfections.

Read Full Article

like

25 Likes

source image

VentureBeat

3w

read

120

img
dot

Image Credit: VentureBeat

Cutting cloud waste at scale: Akamai saves 70% using AI agents orchestrated by kubernetes

  • Enterprises are expected to waste $44.5 billion on unnecessary cloud spending this year.
  • Akamai Technologies faced challenges with a large, complex cloud infrastructure and strict security requirements.
  • The company turned to Cast AI, leveraging AI agents within the Kubernetes platform to optimize cost, security, and speed.
  • Using Cast AI, Akamai managed to reduce cloud costs by 40% to 70% depending on workload.
  • Cast AI's Application Performance Automation (APA) uses machine learning models and reinforcement learning to optimize performance and efficiency.
  • APA works through specialized agents that monitor, analyze, and improve application performance, security, efficiency, and cost.
  • Integration into existing tools and workflows is supported by Cast AI, ensuring incremental adoption without complete replacement.
  • Automation by Cast AI complements human decision-making, maintaining human-in-the-middle workflows.
  • Akamai needed a Kubernetes automation platform to optimize cloud costs in real time across multiple clouds while ensuring performance.
  • By utilizing Cast AI, Akamai achieved significant time savings by automating infrastructure management.
  • Spot instances were effectively utilized by Cast AI for Akamai to reduce costs without manual intervention.

Read Full Article

like

7 Likes

source image

Siliconangle

3w

read

61

img
dot

Image Credit: Siliconangle

CrowdStrike launches Falcon for AWS Security Incident Response at re:Inforce 2025

  • CrowdStrike launched Falcon for AWS Security Incident Response at the 2025 re:Inforce conference.
  • The new service offers cyber protection from the CrowdStrike Falcon platform at preferred rates in the AWS Marketplace.
  • Falcon for AWS Security Incident Response provides AI-powered incident response to help organizations respond faster and strengthen cloud security.
  • The offering aims to address the increasing speed and complexity of cyberattacks in cloud environments.
  • The Falcon platform detects more threats in less time and investigates incidents faster compared to other solutions.
  • It complements the existing AWS Security Incident Response workflow to cover the entire security incident lifecycle.
  • Customers benefit from streamlined procurement and improved security posture through AWS infrastructure.
  • The Falcon platform is available in AWS Marketplace, offering customers CrowdStrike's protection and AWS infrastructure benefits.

Read Full Article

like

3 Likes

source image

Hackernoon

3w

read

132

img
dot

Image Credit: Hackernoon

All Your Crypto Can be Stolen With a Wrench: It’s Happened; Multiple Times

  • Cryptocurrency holders can face physical attacks to steal their funds, with cases increasing alongside cryptocurrency value and adoption.
  • Victims include prominent figures like Hal Finney and everyday users, with over 200 attacks reported.
  • Incidents range from home invasions to kidnappings and assaults, with significant amounts of cryptocurrency stolen.
  • Individuals involved in crypto, such as developers, miners, and traders, are common targets for these attacks.
  • Measures like avoiding online oversharing, using multisignature accounts, and decentralizing funds can help protect against physical attacks.
  • Real-life phishing schemes involve criminals posing as utility workers or postmen to coerce victims into transferring cryptocurrencies.
  • Protective measures against physical attacks include decentralizing funds, using multisignature accounts, and keeping a low profile about crypto wealth.
  • Creating a bait wallet, being cautious with online acquaintances, and staying informed about security risks are recommended strategies.
  • Using hardware wallets, avoiding carrying significant cash or displaying wealth in public, and researching potential trading partners are additional precautions.
  • Staying vigilant, practicing discretion, and being prepared for potential threats are crucial for safeguarding cryptocurrency holdings.

Read Full Article

like

7 Likes

source image

Dev

3w

read

163

img
dot

Image Credit: Dev

GenAI's Ethical Imperative: Building Robust Data Governance Frameworks

  • Generative AI (GenAI) brings transformative power but raises challenges in data governance and ethics.
  • Concerns include biases amplification, intellectual property issues, deepfakes, and data traceability.
  • Establishing robust data governance is crucial for ethical GenAI deployment and preventing misinformation.
  • Key aspects involve pre-training data curation, ethical review boards, human oversight, and adaptive policies.
  • Privacy-preserving techniques like differential privacy and federated learning are recommended.
  • Technical measures such as bias detection and output lineage tracking play a role in governance.
  • Global regulatory frameworks, such as the EU AI Act and the US AI Disclosure Act, impact AI governance.
  • China's regulations focus on content management and data protection for Generative AI services.
  • International organizations must adapt governance frameworks to comply with evolving AI regulations worldwide.
  • Building trust and ensuring fairness in GenAI deployment require continuous vigilance and commitment to responsible innovation.

Read Full Article

like

9 Likes

source image

VentureBeat

3w

read

101

img
dot

Image Credit: VentureBeat

Groq just made Hugging Face way faster — and it’s coming for AWS and Google

  • Groq is challenging cloud providers like AWS and Google by supporting Alibaba’s Qwen3 32B model with a full 131,000-token context window and becoming an inference provider on Hugging Face.
  • Their unique architecture allows efficient handling of large context windows, offering speeds of approximately 535 tokens per second and pricing at $0.29 per million input tokens and $0.59 per million output tokens.
  • The integration with Hugging Face opens Groq to a vast developer ecosystem, providing streamlined billing and access to popular models.
  • Groq's global footprint currently serves over 20M tokens per second and plans further international expansion.
  • Competitors like AWS Bedrock and Google Vertex AI leverage massive cloud infrastructure, but Groq remains confident in its differentiated approach.
  • Groq's competitive pricing aims to meet the growing demand for inference compute, despite concerns about long-term profitability.
  • The global AI inference chip market is projected to reach $154.9 billion by 2030, driven by increasing AI application deployment.
  • Groq's move offers both opportunity and risk for enterprise decision-makers, with potential cost reduction and performance benefits paired with supply chain risks.
  • Their technical capability to handle full context windows could be valuable for enterprise applications requiring in-depth analysis and reasoning tasks.
  • Groq's strategy combines specialized hardware and aggressive pricing to compete with tech giants, focusing on scalability and performance advantages.
  • The success of Groq's approach hinges on maintaining performance while scaling globally, posing a challenge for many infrastructure startups.

Read Full Article

like

6 Likes

source image

Amazon

3w

read

194

img
dot

Image Credit: Amazon

How AWS improves active defense to empower customers

  • AWS continues to enhance its active defense systems, including MadPot, Mithra, and Sonaris, to improve threat intelligence and automated response.
  • Efforts to prevent malware spreading include identifying threat actor infrastructure and mitigating botnets, resulting in blocking over 4 million malware infection attempts.
  • Advancements in threat hunting and software vulnerabilities include expanding capabilities to identify and stop malicious scanning and exploitation activities.
  • AWS has seen a decrease of over 55% in CVE exploit attacks in the last year through active defense enhancements.
  • Protection of customer-managed IAM credentials and prevention of malicious scanning connections for exposed AWS access key pairs are key focus areas.
  • AWS proactive measures have helped deactivate over 30 thousand exposed credentials during ransomware threats.
  • Continuous improvement in security measures by AWS shows the commitment to protecting customers from various threats at no extra cost.
  • While active defense strategies are in place, customers are encouraged to maintain their own defenses using AWS security services.
  • Collaboration between AWS and customers aims to make the internet a safer environment for all users.
  • Feedback on the article can be submitted in the Comments section below.

Read Full Article

like

11 Likes

source image

Mcafee

3w

read

211

img
dot

How the Sandwich Generation Can Fight Back Against Scams

  • The "Sandwich Generation" faces increasing digital scam threats, with 47% of adults in their 40s and 50s managing aging parents and children simultaneously.
  • McAfee's State of the Scamiverse report reveals that 60% of Brits have fallen victim to online scams, with significant financial losses averaging £936.
  • Scams targeting this demographic unfold rapidly, with 68% of victims defrauded in less than an hour and 48% within 30 minutes.
  • Financial losses lead to psychological distress, with 32% experiencing anxiety, depression, and damaged self-esteem.
  • Cybercriminals target the Sandwich Generation due to overwhelm, multiple attack vectors, the burden of family tech support, and time constraints.
  • 85% of scam victims in Britain lose money, 29% lose over £400, and 22% are scammed again within a year.
  • Young people face social media and gaming community scams, while older adults are targeted through email-based attacks, authority impersonation, and voice cloning threats.
  • Protection strategies include mobile device security, email security measures, and detection strategies for deepfakes such as celebrity endorsements and voice cloning scams.
  • Families are advised to have fraud response plans, conduct regular security maintenance, and implement educational components for different age groups.
  • Implementing security tools like identity protection services, security suites, and credit monitoring can enhance family digital resilience against evolving threats.

Read Full Article

like

12 Likes

source image

Tech Radar

3w

read

282

img
dot

Image Credit: Tech Radar

Smartwatches could potentially be used to steal data from or launch attacks on air-gapped systems - I wonder how far-fetched that really is

  • Smartwatches could potentially breach secure air-gapped systems using ultrasonic signals to transmit data, as suggested in a research paper by Ben-Gurion University researchers.
  • The method, called 'SmartAttack,' relies on compromised smartwatches picking up ultrasonic signals from infected air-gapped computers, operating at frequencies just above human hearing.
  • To execute such an attack, malware must first infect the air-gapped system, harvest and encode data into ultrasonic audio signals, and then be picked up by an infected smartwatch.
  • Smartwatches are considered an 'underexplored yet effective attack vector' due to their mobility, requiring precise positioning to receive data and relay it back to the attacker.
  • The research raises concerns about the efficacy of current cybersecurity tools against such unconventional threats, suggesting the need for more advanced defenses like ultrasonic jamming and real-time monitoring.
  • While the feasibility of implementing these defenses in real-world scenarios is uncertain, the paper emphasizes the potential risks posed by covert data exfiltration techniques via wearable tech.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app