menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Idownloadblog

2d

read

341

img
dot

Image Credit: Idownloadblog

Ian Beer publishes in-depth analysis of BLASTPASS zero-click iMessage exploit from 2023

  • Google Project Zero researcher Ian Beer has published an in-depth analysis of the BLASTPASS zero-click iMessage exploit.
  • The exploit allowed attackers to compromise iPhones and iPads without any user input, by sending malicious images via iMessage.
  • Beer's analysis highlights the need for sandboxing to treat all incoming attacker-controlled data as untrusted, rather than simply trusting file extensions.
  • While the BLASTPASS exploit has been patched by Apple, the analysis suggests similar attacks may continue to be developed in the future.

Read Full Article

like

20 Likes

source image

Lastwatchdog

2d

read

313

img
dot

News alert: INE receives a dozen G2 badges highlighting its cybersecurity training leadership

  • INE, a global leader in networking and cybersecurity training, receives twelve badges in G2's Spring 2025 Report.
  • Badge categories include Cybersecurity Professional Development, Online Course Providers, and Technical Skills Development.
  • INE's recognition reflects its commitment to providing high-quality training in a rapidly changing digital landscape.
  • INE Security, INE's cybersecurity-specific training, previously received prestigious SC Awards and Global InfoSec Awards.

Read Full Article

like

18 Likes

source image

Idownloadblog

2d

read

146

img
dot

Image Credit: Idownloadblog

Are certain banking apps using a 0-day sandbox escape to detect TrollStore?

  • Certain banking apps hosted in Apple's App Store have been discovered to ship with a sandbox escape.
  • The sandbox escape allows these apps to detect if TrollStore, a perma-signing utility, is installed on a user's device.
  • The presence of sandbox escapes in these apps raises concerns about potential access to other sensitive data.
  • It remains to be seen if Apple will take action against the apps using sandbox escapes to detect TrollStore.

Read Full Article

like

8 Likes

source image

Dev

3d

read

258

img
dot

Image Credit: Dev

🌟Understandig the power of ConfigMaps and Secrets🌟

  • ConfigMaps are Kubernetes objects for storing non-confidential configuration data as key-value pairs.
  • ConfigMaps store data in plain text and allow dynamic updates without rebuilding images or restarting applications.
  • Secrets are Kubernetes objects designed to store sensitive data securely, such as passwords and tokens.
  • Secrets store data as Base64-encoded strings and offer enhanced security with encryption at rest or external tools.

Read Full Article

like

15 Likes

source image

Medium

3d

read

290

img
dot

Image Credit: Medium

End-to-end encryption explained: how the Signal app secured your messages

  • End-to-end encryption is a security method that ensures only the sender and the intended recipient of a message can access its contents.
  • E2EE scrambles (encrypts) the message on the sender's device and only decrypts it on the recipient's device, preventing any third parties from accessing the message.
  • Without E2EE, data could be exposed at any point during its journey, making it a vital tool for privacy in today's interconnected world.
  • E2EE combines symmetric and asymmetric encryption, providing a strong level of security for protecting sensitive information.

Read Full Article

like

17 Likes

source image

Siliconangle

3d

read

147

img
dot

Image Credit: Siliconangle

Hakimo secures $10.5M in new funding and launches autonomous AI security agent

  • Hakimo Inc. has raised $10.5 million in new funding and launched AI Operator, an autonomous security agent.
  • AI Operator monitors existing security hardware, detects threats in real time, and executes response protocols.
  • The service combines computer vision and generative AI for anomaly detection and issuing real-time warnings.
  • Hakimo's funding round was led by Vertex Ventures Management and Zigg Capital, bringing total funding to $20.5 million.

Read Full Article

like

8 Likes

source image

Securityaffairs

3d

read

115

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Google Chromium Mojo flaw to its Known Exploited Vulnerabilities catalog

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Google Chromium Mojo sandbox escape vulnerability, tracked as CVE-2025-2783, to its Known Exploited Vulnerabilities (KEV) catalog.
  • Google released out-of-band fixes for a high-severity security vulnerability (CVE-2025-2783) in Chrome browser for Windows. The flaw was actively exploited in attacks targeting organizations in Russia.
  • The vulnerability involves an incorrect handle provided in unspecified circumstances in Mojo on Windows, potentially enabling sandbox escapes and privilege escalation.
  • CISA has ordered federal agencies to address this vulnerability by April 17, 2025, and private organizations are recommended to review the Catalog and address the vulnerabilities in their infrastructure.

Read Full Article

like

6 Likes

source image

Hackernoon

3d

read

378

img
dot

Image Credit: Hackernoon

Terraform State Management: A Deep Dive Beyond the Basics for Azure Deployments

  • State management is crucial for the success of infrastructure as code using Terraform.
  • State file contains sensitive information and needs to be protected and secured.
  • Hierarchical state organization provides logical organization and separation of concerns.
  • Workspace-based isolation and Azure RBAC enable better control for development teams.

Read Full Article

like

22 Likes

source image

Wired

3d

read

298

img
dot

Image Credit: Wired

Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public

  • Several top Trump administration officials, including those in a Signal group chat, had leaked Venmo accounts, posing a counterintelligence risk.
  • The exposed officials include Dan Katz, Joe Kent, Mike Needham, and Brian McCormack, with detailed transactions and connections public.
  • Sensitive information like payment details, contacts, and activities were revealed through Venmo accounts, prompting concerns about foreign intelligence exploitation.
  • WIRED confirmed the officials' identities based on their linked accounts, and reactions from their respective departments are awaited.
  • Veterans of the US intelligence community warn of the risks posed by public Venmo transactions, citing potential leverage and risks to personal safety.
  • Security experts emphasize the importance of understanding data exposure risks and the potential exploitation by adversaries.
  • Venmo's contact syncing feature in the past facilitated the exposure of connections, making networks visible unless settings were actively changed.
  • Although Venmo deprecated this functionality, users' networks could remain visible unless privacy settings were adjusted.
  • Experts stress the need for vigilance at high levels of national security leadership to minimize risks associated with digital data exposure.
  • Adversaries' interest in even minor data points underscores the importance of safeguarding personal information in the digital age.

Read Full Article

like

17 Likes

source image

Hackernoon

3d

read

119

img
dot

Image Credit: Hackernoon

Why Cyber Threat Intelligence is Essential for Modern Businesses

  • Hackers nowadays gain access to systems using leaked credentials from old breaches, making it crucial for businesses to have cyber threat intelligence.
  • Cyber threat intelligence allows predicting and understanding threats, leading to proactive defense strategies to prevent cyberattacks.
  • It comes in various forms like strategic, tactical, operational, and technical threat intelligence, helping businesses stay ahead of evolving cyber threats.
  • By using threat intelligence platforms and security tools, organizations can analyze threats, detect vulnerabilities, and respond to incidents effectively.
  • Implementing cyber threat intelligence involves collecting, analyzing, and classifying threat data, as well as sharing relevant information with stakeholders and partners.
  • It is essential to assess security needs, choose the right tools, train employees, work with security experts, and keep intelligence data updated for effective implementation.
  • Challenges of cyber threat intelligence include data overload, high costs, and constantly changing threats, which can be managed through automation, cost-effective strategies, and staying updated.
  • The future of cyber threat intelligence lies in AI-driven automation, real-time threat sharing, and predictive analytics to enhance threat detection and response.
  • By investing in proactive security measures, businesses can effectively combat cyber threats and reduce the risks of costly attacks in the long run.
  • Using intelligence procedures and the right tools can help businesses outsmart criminals and ensure the safety of their business against cyber threats.

Read Full Article

like

7 Likes

source image

Medium

3d

read

103

img
dot

Image Credit: Medium

Watch Out, The Internet Army Is Coming For You

  • The internet provides a platform for individuals to easily express their opinions and judgements towards others, often without considering the consequences.
  • Social media has empowered people to act as 'digital police', publicly shaming and judging those they believe have acted wrongly.
  • While some may deserve criticism, the trend of online shaming raises questions about the impact on individuals' lives and where the line should be drawn.
  • Instances of individuals being publicly condemned online for their actions, such as losing their jobs or facing threats, reflect the power of internet outrage.
  • The viral nature of social media can quickly escalate incidents, leading to severe consequences for those targeted without proper consideration.
  • The lack of control over online outrage raises concerns about privacy, ethics, and the potential for innocent individuals to be unfairly targeted.
  • The importance of practicing empathy and respecting others' privacy online is highlighted, urging individuals to consider the impact of their actions and words.
  • Encouraging children to apply real-world relationship values to their online interactions can help foster a more respectful and compassionate digital community.

Read Full Article

like

6 Likes

source image

Embedded

3d

read

127

img
dot

Thistle Technologies Expands Embedded Security Platform with OTA Updates and Secure Boot Solutions

  • Thistle Technologies has expanded its embedded device security platform with over-the-air (OTA) updates and secure boot solutions.
  • The Thistle Update package includes device software, developer tools, and Thistle Cloud components, offering seamless firmware and software updates for embedded devices running Linux® and powered by Infineon PSOC 6 microcontrollers.
  • Thistle also unveiled the Secure Boot Enablement solution, providing tools and services for implementing secure and verified boot processes on supported hardware.
  • These enhancements strengthen Thistle Technologies' position as a leader in embedded security, enabling manufacturers to deploy secure and updatable systems in today's connected world.

Read Full Article

like

7 Likes

source image

Siliconangle

3d

read

302

img
dot

Image Credit: Siliconangle

Three insights you may have missed from theCUBE’s coverage of MWC25

  • Businesses are focusing on AI adoption, automation, and edge computing while maintaining ethics, security, and sustainability.
  • The integration of AI and automation is crucial for driving meaningful change in enterprises.
  • Telcos are recognizing the potential of AI and the importance of networks in supporting innovation.
  • AI-powered automation is transforming enterprise innovation but also raises security and ethical concerns.
  • Cisco emphasizes data security amid AI integrations, addressing job displacement and cybersecurity risks.
  • Juniper Networks highlights AI-native networking for automating tasks and improving performance.
  • IBM focuses on embedding AI directly into business processes for flexible deployment without system overhauls.
  • Real-world AI use cases impact player scouting in sports and enhance telecommunications operations.
  • AI in telecommunications faces regulatory challenges but AI governance platforms ensure compliance and transparency.
  • Broadcom enhances connectivity solutions for AI-powered edge infrastructure to drive enterprise innovation.

Read Full Article

like

18 Likes

source image

Wired

3d

read

139

img
dot

Image Credit: Wired

SignalGate Is Driving the Most US Downloads of Signal Ever

  • Signal has experienced a surge in downloads in the US after the SignalGate scandal involving senior Trump administration officials planning secret actions on the messaging platform.
  • Jun Harada, Signal's head of growth, mentioned that this growth is unprecedented in Signal's history, with a significant increase in adoption following the scandal.
  • The spike in US downloads for Signal is the largest growth moment, surpassing any previous surge experienced by the app.
  • The incident has led to a doubling of Signal's usual rate of new downloads, maintaining a sustained adoption rate daily.
  • The scandal raised questions regarding the security practices of the Trump administration and highlighted the use of Signal for confidential communication.
  • Despite claims of Signal being blamed for the breach, experts recommend Signal as a secure end-to-end encrypted messaging tool.
  • The attention towards Signal has increased, with even President Trump mentioning its use, resulting in a rise in public awareness about encrypted messaging.
  • Signal received increased visibility and interest, attributed partly to general privacy concerns among consumers and recent cybersecurity incidents.
  • SignalGate has propelled Signal to become a mainstream name and a significant player in private encrypted messaging.
  • The surge in attention towards Signal signifies a potential shift in private encrypted messaging's adoption on a global scale.

Read Full Article

like

8 Likes

source image

Medium

3d

read

39

img
dot

Image Credit: Medium

The Dark Shift in Ransomware in 2024: Less Money, More Menace

  • Ransomware payments have fallen by 35%, indicating improved defenses among organizations.
  • Attackers have shifted their tactics, employing intense psychological pressure.
  • They personalize threats, targeting personal information, relationships, and reputations of key individuals.
  • The focus on psychological coercion highlights the need for a holistic cybersecurity strategy.

Read Full Article

like

2 Likes

For uninterrupted reading, download the app