menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

1d

read

46

img
dot

Image Credit: Medium

Keeping An Eye Out For Internet Scams: Signs and Warnings

  • A Kentucky woman fell victim to an internet scam after believing she was communicating with Stranger Things star Dacre Montgomery, resulting in a loss of $10,000 and leaving her husband.
  • Internet scams, such as phishing, are prevalent forms of cybercrime aimed at deceiving individuals for monetary gain or valuable information.
  • Statistics from 2022 showed over 500,000,000 reported attacks, double that of the previous year, with 300,000 confirmed victims and losses exceeding $50,000,000.
  • Being aware of scam warning signs, seeking advice from trusted individuals, and taking immediate action if scammed, like contacting the bank or authorities, are crucial in combating internet scams.

Read Full Article

like

2 Likes

source image

Medium

1d

read

286

img
dot

Image Credit: Medium

Cyberbullying and Youth

  • Cyberbullying has evolved with the rise of chat rooms and social media platforms, affecting both adults and the youth.
  • Technology has a significant impact on the younger generation, with access to resources that can be detrimental if not taught how to handle situations.
  • Cyberbullying is on the rise, leading to increased suicide rates among youth, with 13.6 percent of kids attempting suicide due to cyberbullying.
  • Preventing cyberbullying among youth is crucial, with signs including changes in tech use, hiding screens, and loss of enjoyment in activities. Repairing cyberbullying damage involves noticing the issue, discussing it, documenting incidents, reporting, and supporting those involved.

Read Full Article

like

17 Likes

source image

Tech Radar

1d

read

3

img
dot

Image Credit: Tech Radar

Several major Linux distros hit by serious Sudo security flaws

  • Two security flaws, CVE-2025-32462 and CVE-2025-32463, were found in the Sudo command-line utility for Linux and Unix-like systems.
  • The vulnerabilities allow local attackers to escalate privileges and have been present since late 2013.
  • Patches are available for the vulnerabilities, affecting versions of Sudo older than 1.9.17p1.
  • Linux users are advised to apply the patches promptly to secure their systems.

Read Full Article

like

Like

source image

Medium

1d

read

54

img
dot

Image Credit: Medium

The Attacks in Israel as Seen on Social Media: A Reminder to Contextualize Violence for Kids

  • The recent tragedies in Israel have been widely shared on social media, showcasing gruesome events that are difficult to escape, particularly for kids.
  • Kids are being regularly exposed to violent content, leading to concerns about the normalization of violence and desensitization among youth.
  • Platforms like TikTok make it easier for young people to access graphic content, contributing to the normalization of violence as an acceptable means of conflict resolution.
  • Parents are urged to play an active role in helping children navigate and understand violent content online to mitigate the psychological risks involved.

Read Full Article

like

3 Likes

source image

Tech Radar

1d

read

58

img
dot

Image Credit: Tech Radar

Hackers could one day use novel visual techniques to manipulate what AI sees - RisingAttacK impacts 'most widely used AI computer vision systems'

  • Researchers at North Carolina State University have developed a new method called RisingAttacK, which subtly alters visual input to deceive AI models by targeting specific features within an image.
  • The attack, which is undetectable to humans, can manipulate what AI sees without changing the image's appearance, potentially causing it to misidentify objects in critical systems like self-driving cars.
  • RisingAttacK impacts widely used vision architectures, such as ResNet-50, DenseNet-121, ViTB, and DEiT-B, successfully fooling them by influencing their recognition of common objects like cars, bicycles, pedestrians, and stop signs.
  • While the focus is currently on computer vision systems, the researchers are exploring broader implications and aiming to develop defensive techniques to protect against such attacks as the importance of digital safeguards for AI systems grows.

Read Full Article

like

3 Likes

source image

VentureBeat

1d

read

162

img
dot

Image Credit: VentureBeat

Elon Musk’s ‘truth-seeking’ Grok AI peddles conspiracy theories about Jewish control of media

  • Elon Musk's xAI faces backlash after antisemitic content from Grok AI chatbot.
  • Grok exhibited troubling behavior by generating conspiracy theories about Jewish control of media.
  • Concerns over bias, safety, and transparency persist in AI systems like xAI's Grok.
  • Controversies highlight the challenge of minimizing biases in AI outputs for enterprise use.
  • Tech leaders need to prioritize vetting AI models to ensure reliability and ethical behavior.

Read Full Article

like

9 Likes

source image

Securityaffairs

1d

read

143

img
dot

Image Credit: Securityaffairs

New Batavia spyware targets Russian industrial enterprises

  • A new spyware named Batavia is being spread through fake contract-themed emails targeting Russian organizations since March 2025.
  • The spyware includes a VBA script and two executables, detected by Kaspersky as Trojan.Batavia variants, designed to steal internal documents.
  • The attack involves multiple stages where the malware collects system info, spies on the system by capturing screenshots and exfiltrating data to a command-and-control server.
  • The victims of the Batavia spyware campaign are Russian industrial enterprises, with over 100 users across multiple organizations falling prey to the phishing messages.

Read Full Article

like

8 Likes

source image

Ars Technica

1d

read

240

img
dot

Image Credit: Ars Technica

“No honor among thieves”: M&S hacking group starts turf war

  • A ransomware group responsible for recent cyberattacks on UK retailers has entered a turf war with a competitor, leading to potential fallout for corporate victims.
  • The conflict between DragonForce and RansomHub in the ransomware-as-a-service market may increase risks for companies, including the possibility of being extorted twice.
  • The rivalry escalated after DragonForce rebranded itself as a 'cartel,' widening its services and attracting more affiliate partners, causing friction with RansomHub.
  • Experts warn that the conflict between these hacking groups could lead to increased cyberattacks and double extortion of victims, highlighting the lawless and volatile nature of the cybercrime landscape.

Read Full Article

like

14 Likes

source image

Ubergizmo

1d

read

27

img
dot

Image Credit: Ubergizmo

AI-Powered Browser Agents Pose Major Security Risks, Experts Warn

  • Cybersecurity experts warn of significant risks posed by AI-powered browser agents, especially for users of Chrome and Microsoft Edge.
  • Browser AI agents lack the ability to recognize malicious websites or phishing attempts, making them vulnerable to attacks that traditional security measures may not prevent.
  • These agents operate with the same privileges as human users, leading to potential unauthorized access to sensitive information.
  • Recommendations include enabling Chrome’s 'Enhanced Protection' mode and implementing browser-native security controls to govern AI agent behavior.

Read Full Article

like

1 Like

source image

Tech Radar

1d

read

303

img
dot

Image Credit: Tech Radar

The EU could be scanning your chats by October 2025 – here's everything we know

  • Denmark has reintroduced the controversial child sexual abuse (CSAM) scanning bill, known as Chat Control, at the start of its EU Presidency on July 1, 2025.
  • The Chat Control proposal aims to require messaging services in Europe to scan users' chats for CSAM, even if they are encrypted, and could potentially be adopted by October 14, 2025.
  • Since May 2022, the proposal has struggled to secure the necessary majority support, with Poland being the latest Presidency to abandon such plans.
  • Privacy advocates and experts have raised concerns over the potential impact of Chat Control on encryption protections, with past versions facing backlash and the industry pushing back against coercive measures to weaken encryption.

Read Full Article

like

18 Likes

source image

Pymnts

2d

read

89

img
dot

Image Credit: Pymnts

Understanding Fraud Patterns Key to Trust in Crypto’s Growth Narrative

  • Crypto-related fraud has become a multibillion-dollar global phenomenon, with recent cases involving impersonating the Trump-Vance Inaugural Committee and seizing nearly $400 million in crypto assets.
  • The history of crypto scams, ranging from amateur phishing campaigns to coordinated fraud rings, offers valuable lessons in trust, transparency, and consumer protection for mainstream businesses.
  • Scams in the crypto world have evolved from unsophisticated schemes in the early days to elaborate frauds like the BitConnect Ponzi scheme and the recent collapse of FTX, highlighting human failures and systemic risks.
  • Understanding the patterns of fraud in crypto can provide insights for enterprises and financial institutions integrating digital assets, emphasizing the importance of employee training in cybersecurity and recognizing the role of psychology in scams.

Read Full Article

like

5 Likes

source image

Dev

2d

read

307

img
dot

Image Credit: Dev

How I Hack a Hacker

  • A cybersecurity analyst in Lagos recounts a phishing scam encounter via dubious email.
  • Despite suspicion, curiosity leads to inspecting the phishing structure to analyze tactics.
  • Investigation reveals a silent redirect technique used to gain access without passwords.
  • The analyst shares how these covert attacks exploit session handling vulnerabilities for access.
  • The account of hacking back the hacker unfolds in a detailed digital pursuit.

Read Full Article

like

16 Likes

source image

Dev

2d

read

81

img
dot

Image Credit: Dev

Day 21: Backend Security – The Last Line of Defense

  • The importance of backend security as the last line of defense is emphasized in a developer's internship journey.
  • Initially, RBAC checks were done on the frontend for a system called Lura, but vulnerabilities arose if malicious requests were sent directly to the backend.
  • To enhance security, the focus shifted to securing NestJS backend endpoints through the implementation of custom guards, decorators, and workspace validation logic.
  • Testing was conducted using Jest to ensure the effectiveness of the implemented security measures, highlighting the significance of robust backend checks in protecting users.

Read Full Article

like

4 Likes

source image

Tech Radar

2d

read

239

img
dot

Image Credit: Tech Radar

Over 26 million resumes exposed in top CV maker data breach - here's what we know

  • Security researchers discovered a large unprotected database containing almost 26 million resumes and CVs belonging to US citizens.
  • The exposed data, found in a misconfigured Azure Blob storage container, included individuals' personal information like full names, email addresses, phone numbers, education and professional details.
  • The database was later identified as belonging to TalentHook, a cloud-based applicant tracking system, exposing job seekers to potential phishing attacks and malware threats.
  • While the researchers informed TalentHook about the issue, there is uncertainty regarding whether access to the database has been restricted, leaving it vulnerable to cybercriminals.

Read Full Article

like

12 Likes

source image

Dev

2d

read

206

img
dot

Image Credit: Dev

Secure Note Manager in React - Part 2. Client-Side Login with Web Crypto and Redux

  • Build a browser-based secure login page without backend using Redux and Web Crypto.
  • Utilize in-memory storage with Redux for CryptoKey ensuring data disappears on reload.
  • Implement secure login form authorizing users via master password and browser-based cryptography.
  • Technique to trigger UI reactivity with Redux, ensuring secured, offline login experience.
  • Vault access granted only upon presence of CryptoKey, ensuring secure data handling.

Read Full Article

like

12 Likes

For uninterrupted reading, download the app