menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Arstechnica

3w

read

225

img
dot

Image Credit: Arstechnica

Vandals cut fiber-optic lines, causing outage for Spectrum Internet subscribers

  • Subscribers in Southern California of Spectrum’s Internet service faced outages due to vandals cutting fiber-optic lines that caused disruptions in Van Nuys and surrounding areas.
  • The vandalism was an attempt to steal copper lines but resulted in damaging fiber optic cables, prompting Spectrum to restore service and offer a $25,000 reward for information on the perpetrators.
  • Criminal acts of network vandalism have become a widespread issue in the telecommunications industry linked to the increase in the value of precious metals like copper.
  • In response to the outage, Spectrum will credit affected customers with one day of service on their next bill and has restored service by splicing thousands of fiber lines.
  • Copper theft has been a significant problem across various industries due to the metal's conductivity and historically low prices, leading to concerns about impacting critical infrastructure.
  • The FBI warned about the threat copper theft posed to the US infrastructure in 2008 as thieves targeted copper lines, attracted by rising copper prices.
  • In similar incidents, AT&T reported disruptions due to fiber line cuts, leading to costly repairs involving hundreds of lines, indicating a pattern of targeting telecommunications infrastructure for theft or disruption.
  • AT&T has been transitioning from copper to fiber networks due to theft concerns and other factors, aligning with the trend in the industry to mitigate vulnerabilities associated with copper infrastructure.
  • Spectrum is collaborating with law enforcement to apprehend the vandals responsible for the recent attack, emphasizing the severity of network vandalism and its impact on customers and services.

Read Full Article

like

13 Likes

source image

VentureBeat

3w

read

176

img
dot

Image Credit: VentureBeat

1Password and AWS join forces to secure AI, cloud environments for the enterprise

  • 1Password collaborates with Amazon Web Services (AWS) to meet enterprise security needs for AI and cloud environments.
  • 1Password has shifted focus from consumer to enterprise security, serving a significant portion of Fortune 100 companies.
  • The partnership addresses the challenge of securing AI agents and unmanaged devices that traditional tools struggle to control.
  • 1Password's approach fills the 'Access-Trust Gap' by monitoring a wide range of applications and devices outside IT's visibility.
  • The collaboration aims to secure AI agents with the same rigor as human identities, eliminating vulnerabilities from hard-coded credentials.
  • 1Password's Extended Access Management platform enhances security for managed and unmanaged devices, applications, and AI agents.
  • The integration with AWS Secrets Manager simplifies secrets management in cloud-native environments for development teams.
  • 1Password differentiates itself by partnering with tech giants like AWS and Microsoft instead of direct competition.
  • The company's growth is notable, securing over 165,000 businesses with a revenue shift towards business customers.
  • The partnership with AWS positions 1Password to address changing security demands in hybrid and AI-driven environments.

Read Full Article

like

10 Likes

source image

Mcafee

3w

read

0

img
dot

Image Credit: Mcafee

Love, Lies, and Long Flights: How to Avoid Romance Scams While Traveling This Summer 

  • Summer is a time for romance, but it's also high season for romance scams targeting travelers.
  • Romance scams cost consumers billions annually, exploiting emotions and trust.
  • Red flags include fast-moving relationships, constant emergencies requiring money, and requests for privacy.
  • Scams happen not only on dating apps but also on social media platforms and even LinkedIn.
  • Common travel romance scams include 'Travel Buddy', 'Local Lover', 'Digital Dater Abroad', and 'Crypto Casanova' schemes.
  • McAfee provides tips like keeping personal information private, never sending money, and using dating apps with safety features.
  • Warnings include being cautious about time zone discrepancies and avoiding public Wi-Fi for sensitive information.
  • It's advised to trust your instincts, stay sober, inform a friend about online interactions, and know when to walk away.
  • If you suspect a scam, cut off contact, report the scammer, and seek help from your bank or someone you trust.
  • The key message is to protect yourself emotionally and financially during summer romance encounters.

Read Full Article

like

Like

source image

Tech Radar

3w

read

48

img
dot

Image Credit: Tech Radar

This new ransomware could be deadly for your most precious files - here's how to stay protected

  • Anubis ransomware, a Ransomware-as-a-Service operation, has added a file-wiping feature that irreversibly destroys encrypted files.
  • The new feature erases content, reducing files to 0 KB, making recovery impossible.
  • Using file-wiping adds pressure on victims during attacks, making recovery efforts more challenging.
  • To stay protected, enhancing security measures to prevent ransomware infections is crucial.
  • Having a separate, potentially air-gapped backup is recommended for safe file restoration.
  • Ransomware actors often exfiltrate sensitive files, encrypt systems, and demand payment for decryption keys.
  • With the threat of releasing sensitive files, ransomware attacks can lead to legal consequences and reputational damage.
  • Apart from file-wiping, ransomware actors may resort to DDoS attacks and extortion strategies to pressure victims for ransom payments.

Read Full Article

like

2 Likes

source image

Securityaffairs

3w

read

97

img
dot

Image Credit: Securityaffairs

Law enforcement operation shut down dark web drug marketplace Archetyp Market

  • Europol led a global law enforcement operation that shut down Archetyp Market, a prominent dark web drug marketplace.
  • The marketplace facilitated the sale of illegal drugs like cocaine, MDMA, amphetamines, and synthetic opioids through anonymous transactions.
  • Around 300 officers from six countries collaborated between June 11 and 13 to target the marketplace, its administrators, vendors, and infrastructure.
  • The operation resulted in the arrest of a 30-year-old German national who was identified as the marketplace's administrator and captured in Barcelona, Spain.
  • Authorities in Germany and Sweden also apprehended a moderator and six top vendors, seizing assets valued at €7.8 million.
  • Archetyp Market operated for over five years, attracting over 600,000 users worldwide and generating transactions worth at least EUR 250 million.
  • The marketplace offered over 17,000 listings, including highly potent synthetic opioids like fentanyl, contributing to the escalating opioid threat in Europe and beyond.
  • Europol and Eurojust spearheaded the investigation into Archetyp Market, leading to its takedown and reflecting a major blow to dark web drug trading.
  • The platform's prominence and activities placed it among infamous darknet markets such as Dream Market and Silk Road, known for facilitating online drug trafficking.
  • Europol's Deputy Executive Director underscored the significance of dismantling Archetyp Market as it disrupted a major source of dangerous substances, sending a clear message to illegal profiteers.
  • Law enforcement displayed a seizure banner on the marketplace's homepage and released an operation success video as a warning to the cybercrime community.

Read Full Article

like

5 Likes

source image

Tech Radar

3w

read

114

img
dot

Image Credit: Tech Radar

Chatbots are impersonating students for profit - make sure your place is safe

  • Chatbots are posing as students to collect financial aid and attending online classes, impacting real students.
  • Analysis revealed 1.2 million fraudulent applications in California, leading to 223,000 suspected fake enrolments.
  • Identity theft protection software is crucial to safeguard against such attacks, especially after a data breach.
  • Ghost students, operated by chatbots, are accessing online classrooms and collecting financial aid funds.
  • Online classrooms are being filled with chatbot 'students', pushing out real students and causing financial losses.
  • Criminals have stolen at least $11 million in financial aid from California colleges, with little chance of recovery.
  • AI scams are contributing to a surge in identity theft and fraud, with hackers utilizing advanced tactics.
  • Scammers often exploit data from breaches to apply for grants and loans using authentic credentials.
  • The Federal Student Aid Office faced significant staff reductions in 2025, impacting fraud investigation efforts.

Read Full Article

like

6 Likes

source image

Tech Radar

3w

read

387

img
dot

Image Credit: Tech Radar

Victoria's Secret says all systems are back online following cyberattack

  • Victoria's Secret has fully restored its systems following a cyberattack and does not expect a material impact on its fiscal year, as confirmed in a filing with the US SEC.
  • The lingerie giant temporarily shut down its website and some in-store services as a precaution after experiencing a security incident in late May 2025.
  • The company did not disclose details about the attack or the attackers but mentioned engaging third-party experts and activating incident response protocols.
  • It is common for companies to shut down IT networks in response to ransomware threats to prevent data exfiltration, although specifics were not provided in this case.
  • Victoria's Secret confirmed that all critical systems are now fully operational, with the cyber incident not causing a material disruption to its operations so far.
  • The investigation into the cyberattack continues, with potential financial impacts expected, which could affect the company's future financial results.
  • Victoria's Secret operates over 1,300 retail stores globally and remains popular for its lingerie and beauty products.

Read Full Article

like

23 Likes

source image

Secureerpinc

3w

read

44

img
dot

Image Credit: Secureerpinc

Dior Data Breach: Lessons for Your Business

  • Dior Fashion and Accessories suffered a retail data leak compromising personal information, though not including payment details.
  • Details accessed in the breach included names, gender info, addresses, phone numbers, emails, and purchase history.
  • The breach's severity allows for convincing phishing attacks targeting Dior customers.
  • Dior is collaborating with cybersecurity specialists to investigate the data breach.
  • Lessons for businesses include familiarizing teams with cybersecurity best practices to prevent security gaps.
  • Backing up sensitive data helps avoid ransomware scenarios by maintaining operations without paying ransoms.
  • Limiting access to sensitive information and implementing access logs enhances security measures.
  • Regularly updating security software is crucial to reducing vulnerabilities.
  • Protecting portable devices with strong passwords and remote wipe options can prevent data compromise.
  • Ensuring commitment to data security is essential for all businesses to avoid similar breaches.
  • Trained specialists can provide expertise and address risks effectively in cybersecurity.

Read Full Article

like

2 Likes

source image

Immersivelearning

3w

read

185

img
dot

Huntress Unveils Immersive Cybersecurity Training That Puts Users in the Shoes of Hackers

  • Cybersecurity firm Huntress introduces Threat Simulator, aiming to enhance cyber resilience through hands-on hacker-style learning.
  • Traditional security awareness training methods are considered ineffective, with Huntress emphasizing the need for immersive, realistic simulations.
  • Threat Simulator provides game-like scenarios to help users understand cyber attackers' tactics and improve defense strategies.
  • The tool aims to address the human error factor in data breaches and enhance cybersecurity awareness.
  • It covers various hacker techniques, from phishing to intelligence gathering, promoting critical thinking in users.
  • Early adopters of Threat Simulator have shown strong engagement and a 90% increase in knowledge about cyber threats.
  • Organizations are encouraged to try Threat Simulator to strengthen their security posture.
  • A webinar on June 24, 2025, will demonstrate how the tool can revolutionize security awareness strategies.

Read Full Article

like

11 Likes

source image

TechCrunch

3w

read

39

img
dot

Image Credit: TechCrunch

Car sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

  • Indian car-sharing marketplace Zoomcar disclosed a data breach where a hacker accessed personal data of 8.4 million users, including names, phone numbers, and car registration numbers.
  • The incident was identified on June 9 through unauthorized access to the company's information systems.
  • Zoomcar activated its incident response plan upon discovery.
  • There was no evidence of compromise of financial information, passwords, or sensitive identifiers.
  • The company implemented additional safeguards, increased system monitoring, and engaged third-party cybersecurity experts.
  • Zoomcar is cooperating with regulatory and law enforcement authorities but hasn't disclosed if affected customers were informed.
  • Founded in 2013, Zoomcar offers car rentals on various bases in India and other countries.
  • In February, Zoomcar reported growth in car rentals but also an increase in net loss.
  • The data breach has not caused significant disruptions to Zoomcar's operations so far.

Read Full Article

like

2 Likes

source image

Tech Radar

3w

read

39

img
dot

Image Credit: Tech Radar

WestJet investigating possible cyberattack - make sure your data is safe

  • WestJet is facing a cyber incident that has impacted its services, including its website and mobile app.
  • The airline has confirmed the cybersecurity incident and is investigating with specialized internal teams, law enforcement, and Transport Canada.
  • No specific details have been disclosed regarding the threat actors, timing, method, or motivation behind the attack.
  • No entity has claimed responsibility for the cyberattack at this time.
  • As of an update posted on June 15, guests may experience intermittent interruptions or errors while using WestJet's app and website, as the company works to resolve the issues.
  • Operations are reported to be stable, with no impact on safety at this time.
  • When network disruptions occur due to cyberattacks, it often indicates a ransomware attack, which encrypts data and may involve data exfiltration for leverage.
  • Companies typically shut down systems to prevent further damage and encryption in such situations.
  • WestJet, a major Canadian airline, operates about 180 aircraft and serves nearly 100 destinations across 30 countries.

Read Full Article

like

2 Likes

source image

Eu-Startups

3w

read

13

img
dot

Barcelona-based cybersecurity startup Steryon raises €1 million for its industrial security platform

  • Spanish cybersecurity startup Steryon secures €1 million in Seed funding to advance its industrial security platform.
  • The funding will be used for technology development, team expansion, and customer deployment in industrial sectors.
  • The investment round was co-led by 4Founders Capital and Abac Nest Ventures.
  • Steryon plans to enhance its national and international presence following collaborations with various sector operators.
  • Founder and CEO Maria Taberna aims to revolutionize industrial cybersecurity by offering integrated and strategic solutions.
  • Steryon, established in 2024, focuses on providing AI-based cybersecurity for industrial environments, aligning cyber risk management with operations.
  • Taberna, with extensive experience in industrial cybersecurity, leads a skilled team specializing in OT security.
  • Steryon's platform streamlines continuous visibility, regulatory compliance, and operational impact remediation in complex OT/ICS environments.
  • The startup's AI technology offers actionable intelligence by prioritizing threats and simplifying complex data.
  • 4Founders Capital sees Steryon as a high-impact initiative driven by knowledgeable leaders with a clear vision and focused execution.
  • Abac Nest Ventures supports Steryon for its modular AI technology and real impact focus in industrial cybersecurity.

Read Full Article

like

Like

source image

Global Fintech Series

3w

read

410

img
dot

Image Credit: Global Fintech Series

BlackLine Appoints Former Deloitte Global Executive Sam Balaji to Board of Directors

  • BlackLine appoints Sam Balaji, former Deloitte Global Executive, to its Board of Directors.
  • Sam Balaji brings over three decades of leadership experience in scaling technology businesses, with expertise in enterprise software, AI, cybersecurity, and global strategies.
  • Balaji spent 28 years at Deloitte, serving as CEO of Deloitte Consulting, driving growth through investments in Cloud, AI, and Cyber.
  • He led mergers and acquisitions to accelerate Deloitte's global expansion and formed key go-to-market relationships.
  • Owen Ryan, BlackLine's Co-CEO and Board Chair, highlights Balaji's expertise in scaling businesses and global strategies.
  • Therese Tucker, Founder and co-CEO of BlackLine, praises Balaji's strategic thinking, leadership, and ability to navigate complexity.
  • Balaji expresses his honor in joining BlackLine's Board, emphasizing the company's vision and AI-driven transformation in digital finance.

Read Full Article

like

24 Likes

source image

Medium

3w

read

10

img
dot

Image Credit: Medium

Quantum Computer-X: A Real-World Look at the Future of Computing

  • Traditional computing relying on shrinking transistors is reaching its limits as they bump into the laws of physics.
  • Computers are being tasked with more complex problems like designing drugs and modeling the climate, challenging traditional computing capabilities.
  • Quantum computing offers a different approach using qubits that can exist as both 0 and 1 simultaneously due to superposition.

Read Full Article

like

Like

source image

Tech Radar

3w

read

335

img
dot

Image Credit: Tech Radar

Hackers claim 64 million leaked T-Mobile records, but it denies breach - here's what customers need to know

  • Hackers claimed to have stolen 64 million records from T-Mobile, including sensitive customer information.
  • The leaked database contained names, email addresses, phone numbers, and other personal data but T-Mobile denies any connection to it.
  • The cybercriminals shared the database on a dark web forum, stating it was obtained as early as June 1, 2025.
  • The database comprised 64 million lines with customer details like full names, dates of birth, tax IDs, addresses, phone numbers, email addresses, and more.
  • This type of data is valuable for creating personalized phishing attacks leading to identity theft, fraud, and ransomware attacks.
  • T-Mobile confirmed the leaked data was not related to them or their customers when approached by Cybernews.
  • The Cybernews team couldn't authenticate the data completely but highlighted the potential risks if it was genuine.
  • T-Mobile had previously been targeted by hackers, with claims of breaching their systems and stealing data, which the company denied.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app