menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Fintechnews

3w

read

323

img
dot

Image Credit: Fintechnews

Swift and Google Cloud Join Forces to Combat Fraud with AI Innovations

  • Swift is collaborating with Google Cloud to develop anti-fraud technologies.
  • The partnership will leverage AI and privacy-enhancing technologies.
  • The initiative aims to enhance fraud detection capabilities while ensuring data confidentiality.
  • A sandbox environment will be launched in 2025 for financial institutions to prototype learning.

Read Full Article

like

19 Likes

source image

Dev

3w

read

385

img
dot

Image Credit: Dev

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

  • Found an exposed IP via Shodan and identified open ports using Naabu, leading to further investigation.
  • Discovered admin email leakage and internal app details through brute forcing directories.
  • Downloaded and Decompiled an APK that uncovered hardcoded AWS credentials, enabling unauthorized access to S3 buckets.
  • Part 9: Protection Measures for AWS Keys.

Read Full Article

like

23 Likes

source image

Hackernoon

3w

read

8

img
dot

Image Credit: Hackernoon

Strengthening Cybersecurity: Breaking Down inDrive’s Bug Bounty Program

  • In a world where digital technology is infiltrating every aspect of our lives, cybersecurity is of paramount importance.
  • Companies around the world are investing heavily in protecting their data and systems from cyber threats.
  • Organizing a bug bounty program and collaborating with white hat hackers is one of the most effective methods of strengthening security.
  • The bug bounty program at inDrive worked in closed mode initially to track and improve internal processes.
  • inDrive uses automatic integration with Slack and Jira to quickly and efficiently identify and triage vulnerabilities.
  • Triggers in HackerOne are a powerful tool that help to automate various actions in response to certain events related to new vulnerability reports.
  • inDrive maintained a high level of engagement in its bug bounty program through Telegram channel and campaigns.
  • The company's experience in organizing and developing a bug bounty program at inDrive is a vivid example of how hiring external security experts can significantly strengthen a company’s cyber defense.
  • Together, companies and white hat hackers can make the digital world safer.

Read Full Article

like

Like

source image

Wired

3w

read

70

img
dot

Image Credit: Wired

The ‘Ghost Gun’ Linked to Luigi Mangione Shows Just How Far 3D-Printed Weapons Have Come

  • Police claim that a 3D-printed ghost gun was used in the fatal shooting of United Healthcare CEO Brian Thompson by suspect Luigi Mangione.
  • The 3D-printed handgun, called a Chairmanwon V1, is a homemade weapon with no serial number that is created by assembling a mix of commercial and DIY parts.
  • The FMDA 19.2, on which the Chairmanwon V1 is based, is one of the most well-known and well-tested printable ghost gun designs.
  • Despite being a relatively old model by 3D-printed gun standards, the FDMA 19.2 is still practical and lethal.
  • It is only partially 3D printed and uses commercially produced parts like barrels, slides, and magazines, along with a homemade frame.
  • The use of commercially produced metal rails instead of homemade ones makes the FDMA 19.2 the most reliable 3D-printed glock design available.
  • The fact that the 3D-printed ghost gun was allegedly used in such a high-profile shooting shows how far DIY weapons tech has come.
  • The FDMA 19.2 can be fired hundreds or even thousands of times without its plastic components breaking, unlike earlier 3D-printed gun models.
  • 3D-printing the regulated body of the gun allows DIY gunmakers to skirt gun-control laws and build so-called ghost guns with no serial number.
  • It is still unclear why Mangione allegedly used a 3D-printed gun in the killing of Brian Thompson, but experts suggest he may have been attracted to the idea as a coder and technologist.

Read Full Article

like

4 Likes

source image

Pymnts

3w

read

385

img
dot

Image Credit: Pymnts

OFAC Sanctions Parties Involved in Compromise of 81,000 Firewalls

  • The Office of Foreign Assets Control (OFAC) has sanctioned a China-based cybersecurity company and one of its employees for their involvement in the compromise of 81,000 firewalls.
  • Sichuan Silence Information Technology Company and its employee Guan Tianfeng were found to have used a zero-day exploit in a firewall product to deploy malware, aiming to steal data and infect victims' systems.
  • Over 23,000 of the compromised firewalls were in the United States, including those protecting critical infrastructure companies.
  • The Department of Justice has charged Guan Tianfeng with conspiracy to develop and deploy the malware, and the Department of State has announced a reward of up to $10 million for information about Guan Tianfeng or Sichuan Silence.

Read Full Article

like

23 Likes

source image

Securityaffairs

3w

read

159

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Microsoft Windows CLFS driver flaw to its Known Exploited Vulnerabilities catalog

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft Windows Common Log File System (CLFS) driver flaw to its Known Exploited Vulnerabilities catalog.
  • The flaw, CVE-2024-49138, has a CVSS score of 7.8 and allows a local attacker to escalate privileges.
  • Microsoft released security updates in December 2024 to address this vulnerability and 70 others.
  • CISA has ordered federal agencies to fix the vulnerability by December 31, 2024.

Read Full Article

like

9 Likes

source image

Siliconangle

3w

read

117

img
dot

Image Credit: Siliconangle

Citrix strengthens zero-trust security with acquisitions of deviceTRUST and strong.network

  • Citrix Systems Inc. has announced the acquisitions of deviceTRUST GmbH and strong.network SA to enhance zero-trust security in hybrid work environments.
  • deviceTRUST GmbH specializes in real-time contextual access solutions for virtual desktop infrastructure, while strong.network SA provides secure cloud development environments.
  • The acquisitions aim to strengthen security on the Citrix platform, isolate and protect access to critical applications, and ensure developers have secure cloud development environments.
  • deviceTRUST enables zero-trust strategies by continuously monitoring access context and enforcing dynamic access controls, while strong.network offers self-hosted Linux development environments with data protection features.

Read Full Article

like

6 Likes

source image

Inside

3w

read

256

img
dot

Quality Outreach Heads-up - JDK24: Retiring the Security Manager

  • The OpenJDK Quality Group is promoting the testing of FOSS projects with OpenJDK builds as a way to improve the overall quality of the release.
  • The Security Manager, a legacy feature designed to enforce the principle of least privilege, is being retired due to its complexity, limited adoption, and maintenance costs.
  • In JDK 24, the Security Manager will be effectively disabled, and the Security Manager API will no longer have any operational effect.
  • Developers using older Java versions should transition to alternative sandboxing and API interception mechanisms.

Read Full Article

like

15 Likes

source image

Pymnts

3w

read

354

img
dot

Image Credit: Pymnts

Google Cloud and Swift Partner on Privacy-Preserving AI Model Training

  • Google Cloud and Swift are partnering to develop a secure, privacy-preserving solution for financial institutions using federated learning techniques.
  • Federated learning enables collaborative AI model training without compromising privacy and confidentiality.
  • Swift plans to roll out a sandbox with synthetic data in the first half of 2025, working with Google Cloud and 12 global financial institutions.
  • The solution aims to enhance cross-border payments experience by sharing fraud labels while ensuring data privacy and confidentiality.

Read Full Article

like

21 Likes

source image

Dev

3w

read

203

img
dot

Image Credit: Dev

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

  • The unauthorized cryptocurrency mining operations running in a Fortune 500 healthcare company’s AWS environment underscores the seriousness of the under-appreciated security challenges in cloud computing.
  • Credential sprawl has become one of the most pressing yet underappreciated security challenges in modern cloud computing.
  • Recent analysis revealed that the average enterprise maintains over 100,000 cloud credentials ,35% of all cloud credentials are either dormant or over-privileged, and 22% of organizations have experienced security incidents related to credential mismanagement.
  • Credential mismanagement can lead to severe data breaches and damage to reputations.
  • In some companies with legacy systems, automated tools have revealed more than 3,000 active service accounts and more than 150 former employee credentials still active.
  • Some best practices in credential management include providing just-in-time access control, automated credential lifecycle management, and advanced monitoring and detection.
  • Emerging technologies and future trends include machine learning-based access management and zero-trust implementation.
  • Organizations must move beyond traditional static access models to embrace dynamic, context-aware security frameworks to curtail the unnecessary exposure of sensitive data and damage to their organization’s reputation.
  • Adopting such measures would prevent issues like a startup meltdown that experienced 1.2 million customer records exposed, $4.5 million in regulatory fines, and an 18% drop in stock price.
  • It is important to remember that security is only as strong as the weakest credential, and with proper credential management, organizations could prevent security compromise and survive.

Read Full Article

like

12 Likes

source image

Medium

3w

read

115

img
dot

A Year of Code, Struggles, and Resilience

  • STELS, a platform for decentralized market automation, has undergone a transformation from its initial monolithic system to STELS 2.0 built on modern technologies.
  • Key mistakes, such as toxic environment, regulatory challenges, managerial failures, lack of contracts, financial mismanagement, and failed delegation, nearly derailed the project.
  • STELS 2.0 is built on six principles: filtering the environment, regulatory structure through protocols, decentralized governance, no partners or contracts, AI as CFO, and interest-based business distribution.
  • The past year involved extensive coding and groundwork, including protocol design, system architecture, cost optimization, decentralization, and cross-platform applications.
  • STELS represents resilience and the future of decentralized market automation, ready to reshape how we think about automation, decentralization, and trading.

Read Full Article

like

6 Likes

source image

TechCrunch

3w

read

0

img
dot

Image Credit: TechCrunch

ElevenLabs’ AI voice generation ‘very likely’ used in a Russian influence operation

  • The recent report by Recorded Future suggests that a Russian influence operation, known as "Operation Undercut," used AI-generated voiceovers to create fake or misleading news videos.
  • The campaign aimed to undermine Europe's support for Ukraine by attacking Ukrainian politicians and questioning military aid to Ukraine.
  • Recorded Future researchers confirmed the use of AI voice generation, including technology from ElevenLabs, by submitting the clips to ElevenLabs' AI Speech Classifier.
  • ElevenLabs has faced allegations of misuse before, including its tech being used for a robocall impersonating President Joe Biden during a primary election.

Read Full Article

like

Like

source image

Dev

3w

read

429

img
dot

Image Credit: Dev

Reconnaissance & Information Gathering

  • Reconnaissance and information gathering is the process of collecting data about a target.
  • Popular techniques for reconnaissance include social engineering, phishing, and footprinting.
  • Network scanning, OS fingerprinting, and vulnerability scanning are also commonly used.
  • Passive reconnaissance involves low-risk activities, while active reconnaissance carries a higher risk of detection.

Read Full Article

like

25 Likes

source image

Tech Radar

3w

read

265

img
dot

Image Credit: Tech Radar

Claude AI and other systems could be vulnerable to worrying command prompt injection attacks

  • Security researchers tricked Anthropic's Claude Computer Use to download and run malware
  • Prompt injection attacks can compromise AI tools such as GenAI
  • Claude Computer Use is still in beta and has a disclaimer regarding potential risks
  • Other AI tools like DeepSeek AI chatbot and Large Language Models (LLM) are also vulnerable to prompt injection attacks

Read Full Article

like

15 Likes

source image

Securityaffairs

3w

read

283

img
dot

Image Credit: Securityaffairs

Microsoft December 2024 Patch Tuesday addressed actively exploited zero-day

  • Microsoft December 2024 Patch Tuesday security updates addressed 71 vulnerabilities including an actively exploited zero-day.
  • 16 vulnerabilities are rated Critical, 54 are rated Important, and one is rated Moderate in severity.
  • One of the issues addressed by Microsoft, tracked as CVE-2024-49138, is actively exploited in the wild.
  • The most severe flaw addressed by Microsoft is a Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability tracked as CVE-2024-49112.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app