menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Securityaffairs

3w

read

283

img
dot

Image Credit: Securityaffairs

Microsoft December 2024 Patch Tuesday addressed actively exploited zero-day

  • Microsoft December 2024 Patch Tuesday security updates addressed 71 vulnerabilities including an actively exploited zero-day.
  • 16 vulnerabilities are rated Critical, 54 are rated Important, and one is rated Moderate in severity.
  • One of the issues addressed by Microsoft, tracked as CVE-2024-49138, is actively exploited in the wild.
  • The most severe flaw addressed by Microsoft is a Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability tracked as CVE-2024-49112.

Read Full Article

like

17 Likes

source image

Pymnts

3w

read

79

img
dot

Image Credit: Pymnts

Meta Sounds Pre-Holiday Alarm As Scam Incidents Jump 56%

  • Meta has launched a pre-holiday anti-scam awareness campaign to keep users safe.
  • Scammers are using various tactics like fake coupons, gift cards, and non-existent Christmas decorations.
  • Meta advises users to be cautious of phishing emails and texts and to avoid sharing personal information.
  • Scam-related fraud has increased by 56%, making it the leading form of fraud.

Read Full Article

like

4 Likes

source image

Embedded

3w

read

358

img
dot

Crypto Quantique Introduces Post-Quantum Cryptography (PQC) in its QuarkLink IoT Device Security Platform

  • Crypto Quantique has enhanced its QuarkLink IoT device security platform with a hybrid post-quantum cryptographic method.
  • QuarkLink diminishes the time and cost of executing essential security activities in embedded devices (IoT) and industrial PCs by as much as 10 times.
  • The hybrid key encapsulation technology integrated into QuarkLink provides instant security against conventional assaults and safeguards against potential quantum computer threats.
  • QuarkLink hybrid-PQC is now accessible for MPUs operating on Embedded Linux, with support for MCUs expected to be released in the first quarter of 2025.

Read Full Article

like

21 Likes

source image

Dev

3w

read

402

img
dot

Image Credit: Dev

Turning a Customer Security Concern into a Feature

  • LiveAPI is developing a product called LiveAPI, which creates automated API docs for projects.
  • A main concern for users was the security of the product, as it requires linking their GitHub or GitLab account.
  • To address this, LiveAPI has introduced the LiveAPI Runner, acting as an agent between the backend and the client.
  • The LiveAPI Runner allows users to clone repositories on their own platform and monitor file access for transparency.

Read Full Article

like

24 Likes

source image

BGR

3w

read

309

img
dot

Image Credit: BGR

Someone hacked iOS 18 to get AI, Camera Control, and more on an iPhone 15

  • iOS 18 hack allows enabling Apple Intelligence, Camera Control, and more on iPhone 15
  • Apple announced that Apple Intelligence is only available on iPhone 15 Pro models and iPhone 16 series
  • Hardware constraints, such as the Neural Engine and RAM, prevent Apple Intelligence on non-Pro iPhone 15 models
  • A software vulnerability allowed for the hack, but Apple has since patched it

Read Full Article

like

18 Likes

source image

TechCrunch

3w

read

0

img
dot

Image Credit: TechCrunch

US sanctions Chinese cybersecurity firm for firewall hacks targeting critical infrastructure

  • The U.S. sanctions Chinese cybersecurity company and employee for firewall hacks targeting critical infrastructure
  • The employee of Sichuan Silence exploited a zero-day vulnerability in Sophos firewalls
  • Approximately 81,000 firewalls were compromised in the hacking campaign
  • The purpose of the exploit was to steal data and attempt to infect victims' systems with ransomware

Read Full Article

like

Like

source image

Tech Radar

4w

read

345

img
dot

Image Credit: Tech Radar

AWS customers hit by major cyberattack which then stored stolen credentials in plain sight

  • Misconfigured AWS instances were exploited in a major cyberattack
  • Researchers discovered vulnerabilities in public sites, leading to exfiltration of data
  • Sensitive information like credentials and source code were sold on the dark web
  • AWS responded to the issue and took actions to mitigate the risk

Read Full Article

like

20 Likes

source image

Arstechnica

4w

read

243

img
dot

Image Credit: Arstechnica

New BadRAM attack neuters security assurances in AMD Epyc processors

  • A new attack called BadRAM has the ability to breach the security assurances in AMD Epyc processors.
  • Traditionally, physical access to a device meant compromising its security, but in the age of cloud computing, this is not always true.
  • Chipmakers have implemented protections in their silicon to safeguard sensitive data in virtual machines.
  • BadRAM attack poses a significant risk to the security of sensitive information stored on servers.

Read Full Article

like

14 Likes

source image

Pymnts

4w

read

332

img
dot

Image Credit: Pymnts

Gen Digital to Add Financial Wellness Tools With MoneyLion Acquisition

  • Gen Digital plans to add financial wellness tools to its offerings by acquiring MoneyLion.
  • The proposed acquisition is expected to close in the first half of Gen's fiscal year 2026.
  • Gen's cyber safety brands include Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner.
  • MoneyLion's tools include a personal finance platform, an AI recommendation platform, and a digital ecosystem for consumer finance.

Read Full Article

like

19 Likes

source image

The Fintech Times

4w

read

327

img
dot

LexisNexis Risk Solutions to Acquire IDVerse in Fight Against AI-Generated Fraud

  • LexisNexis Risk Solutions is set to acquire IDVerse, an AI-powered automated document authentication and fraud detection solutions provider.
  • IDVerse's technology uses AI to combat fraud and deepfakes by verifying the authenticity of identity documents and matching consumer's faces with photos on documents.
  • The acquisition will integrate IDVerse's capabilities across all solutions and enhance customer readiness for future fraud threats through advanced AI-powered solutions.
  • The transaction is expected to close in early 2025, subject to customary regulatory consents.

Read Full Article

like

19 Likes

source image

Pymnts

4w

read

323

img
dot

Image Credit: Pymnts

How Data-Sharing Consortium Approaches Are Beating Back Bank Fraud

  • Sharing data across financial institutions is becoming a key approach to combating bank fraud and cybercrime.
  • Data-sharing consortiums combine anonymized data to identify suspicious patterns and predict fraudulent activity faster.
  • Sharing data comes with challenges, including privacy concerns and regulatory compliance, but financial institutions are working to address them.
  • By collaborating and sharing insights, financial institutions are not only protecting themselves but also strengthening the overall financial ecosystem against vulnerabilities.

Read Full Article

like

19 Likes

source image

TechCrunch

4w

read

367

img
dot

Image Credit: TechCrunch

US Senator announces new bill to secure telecom companies in wake of Chinese hacks

  • U.S. Senator Ron Wyden has introduced a new bill, the Secure American Communications Act, in response to Chinese government hacks on telecom providers.
  • The bill aims to secure American telephone networks and communications by implementing specific cybersecurity requirements.
  • Telecom providers would be required to perform annual vulnerability tests, hire independent auditors to ensure compliance, and submit documentation and statements of compliance.
  • Senator Wyden emphasized the need for mandatory security rules to protect against hackers and espionage.

Read Full Article

like

22 Likes

source image

Tech Radar

4w

read

101

img
dot

Image Credit: Tech Radar

Top US heart surgery device maker hit by ransomware attack

  • Artivion, a major US heart surgery device maker, has confirmed suffering a ransomware attack.
  • The company took certain systems offline and initiated an investigation to assess and contain the incident.
  • While disruptions to order and shipping processes have been mitigated, the attack has incurred expenses for the company.
  • Artivion has not disclosed the identity of the attackers or whether any sensitive information has been stolen.

Read Full Article

like

6 Likes

source image

TechBullion

4w

read

416

img
dot

Image Credit: TechBullion

Payment Processing & Acquiring: Technology Behind Retail Transactions

  • Payment processing involves completing a purchase using digital payment methods like credit cards or mobile wallets.
  • Acquirers or acquiring banks connect merchants to card networks, enabling businesses to accept payments.
  • Advanced technologies such as NFC, mobile wallets, chipped cards, cloud technology, AI, and blockchain power modern payment systems.
  • Security measures like encryption, tokenization, PCI compliance, and fraud detection are crucial in payment technology.

Read Full Article

like

25 Likes

source image

Secureerpinc

4w

read

425

img
dot

Travel Safely: Shielding Mobile Brands from Scams

  • Travel-related scams targeting mobile brand users are on the rise.
  • Hackers use fake websites and phishing tactics to steal sensitive information.
  • To protect customers, businesses should educate employees, update security measures, and use built-in mobile brand protection.
  • Travel safety tips, such as booking through trusted apps, should be shared with consumers.

Read Full Article

like

25 Likes

For uninterrupted reading, download the app