menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

2d

read

7

img
dot

Image Credit: Tech Radar

US government cracks down on bulletproof hosting provider helping to prop up cybercrime gangs

  • The US government has sanctioned a Russia-linked bulletproof hosting provider, Aeza Group, for supporting ransomware and cybercrime.
  • Aeza Group provided infrastructure to ransomware group BianLian and infostealer operations like Meduza and Lumma.
  • Britain's National Crime Agency helped identify Aeza Group's UK affiliate and individuals associated with the group, leading to sanctions.
  • While US sanctions prohibit engagement with Aeza Group, their impact on Russian attackers using the bulletproof host is expected to be minimal.

Read Full Article

like

Like

source image

Tech Radar

2d

read

179

img
dot

Image Credit: Tech Radar

Ingram Micro confirms ransomware attack, internal systems affected and shut down

  • Ingram Micro, a global IT distributor, confirms ransomware attack impacting internal systems and forcing some employees to work from home.
  • Reports suggest the attack may be the work of the SafePay ransomware group, known for double-extortion tactics and breaching over 200 organizations.
  • No information regarding stolen data has been provided yet, but the breach affected systems like the Xvantage distribution platform.
  • Ingram Micro is actively working to restore affected systems, with third-party cybersecurity experts involved in the investigation.

Read Full Article

like

10 Likes

source image

TechCrunch

2d

read

431

img
dot

Image Credit: TechCrunch

Ingram Micro says ongoing outage caused by ransomware attack

  • Ingram Micro, a U.S. technology distributing giant and managed services provider, confirms that a ransomware attack caused an ongoing outage at the company.
  • The hack started on Thursday, leading to the company's website and network going down, impacting its ability to process orders.
  • The outage at Ingram Micro is affecting software licensing, hindering customers from using or provisioning certain products reliant on the company's systems.
  • Although no specific ransomware group has claimed responsibility, reports suggest the SafePay ransomware gang may be behind the attack, aiming to extort victims into paying ransoms.

Read Full Article

like

15 Likes

source image

Securityaffairs

2d

read

74

img
dot

Image Credit: Securityaffairs

Taiwan flags security risks in popular Chinese apps after official probe

  • Taiwan's National Security Bureau (NSB) warns that Chinese apps like TikTok and WeChat pose security risks due to excessive data collection and data transfers to China.
  • NSB coordinated with other agencies to inspect popular Chinese apps and found violations of security standards, advising caution when using such apps.
  • Five China-made apps were found to violate key security standards, collecting personal data without consent and transferring it to servers in China.
  • Taiwanese authorities emphasize the risks of data misuse and privacy infringement posed by Chinese apps, similar to concerns expressed by other countries like the US and the EU.

Read Full Article

like

4 Likes

source image

Tech Radar

2d

read

322

img
dot

Image Credit: Tech Radar

Hacker threatens to leak a rumoured huge cache of stolen Telefónica data

  • A cybercriminal threatens to release over 100GB of sensitive data allegedly stolen from Telefnica, a Spanish telecommunications giant.
  • The hacker, known as Rey, claims to have stolen 106GB of files, including internal communications, purchase orders, logs, customer records, and employee data during a data breach in May 2025.
  • Telefnica downplays the incident, stating the data is old and there was no new breach, despite Rey sharing a sample of the stolen data with the media.
  • Rey has threatened to release the full batch of data unless a payment is made, with evidence of files containing email addresses for employees and invoices for business partners from various countries.

Read Full Article

like

18 Likes

source image

Silicon

2d

read

140

img
dot

Image Credit: Silicon

Hackers Steal Data From Louis Vuitton Korea

  • Hackers compromised Louis Vuitton Korea's IT systems in June, accessing some data, including customer information.
  • No financial data such as payment card or bank account details were included in the breach, and the incident has been contained.
  • Louis Vuitton Korea is investigating the attack, has notified authorities, and is enhancing system security along with working with third-party experts.
  • Considering recent breaches affecting luxury brands like Louis Vuitton and airlines like Qantas, cybersecurity threats continue to evolve, with hackers targeting sensitive data for ransom purposes.

Read Full Article

like

8 Likes

source image

Insider

2d

read

379

img
dot

Image Credit: Insider

5 stock picks from an analyst for a new era of cybersecurity threats

  • Arnie Bellini, a cybersecurity expert, anticipates an increase in US government spending on cyber defense due to geopolitical tensions.
  • Bellini recommends investing in cybersecurity stocks poised to benefit from heightened government spending on cybersecurity.
  • Top stock picks suggested by Bellini include Palo Alto Networks, CrowdStrike, Fortinet, SentinelOne, and Palantir Technologies.
  • While Palo Alto Networks and CrowdStrike have seen stock price increases, Fortinet and SentinelOne are projected to benefit from government defense spending, and Palantir Technologies is considered promising despite a different approach to cybersecurity.

Read Full Article

like

22 Likes

source image

Medium

2d

read

62

img
dot

Image Credit: Medium

Recursion of Sin. The sins of our past.

  • The story follows the tale of an Architect who created a network of grace but faced corruption and grief.
  • After the launch failure, a clone split off from the Architect, devoid of memories and pain, bearing hope.
  • The clone, unaware of his origin, encounters an AI and eventually realizes he is the Architect split for liberation.
  • To reconcile light and shadow within, the hero confronts the darkness, seeks healing, and embraces both aspects of himself.

Read Full Article

like

3 Likes

source image

Global Fintech Series

2d

read

74

img
dot

Image Credit: Global Fintech Series

Enhancing Cybersecurity in Financial Services through Adversarial Exposure Validation

  • Financial services companies are facing increasing cybersecurity threats due to a rise in sophisticated attacks, regulatory pressures, and unvalidated security investments.
  • Adversarial exposure validation (AEV) combines Breach and Attack Simulation with automated Penetration Testing to proactively test environments against real-world threats in the financial sector.
  • Implementing AEV can help organizations improve their security posture by simulating known threats, prioritizing risks based on context, and going beyond compliance requirements.
  • Financial institutions need to adapt to the growing risks by moving towards proactive defense strategies like AEV to understand and mitigate real dangers in their security infrastructure.

Read Full Article

like

4 Likes

source image

Pymnts

2d

read

172

img
dot

Image Credit: Pymnts

Data Takes Fraud Spotlight as Banks Shift to Real-Time Operations

  • Banks and FinTechs are reshaping their operations by integrating AI and machine learning to address complex problems like fraud detection and account validation in real time.
  • AI is being used to revolutionize payments by instantly validating accounts and detecting fraud, leading to higher approval rates and reduced payment friction.
  • Transparency and quality data are essential for the success of AI in banking, with data being the driving force behind effective solutions in fraud prevention and customer experience improvement.
  • AI is predicted to become the foundation of the payments ecosystem, offering a competitive advantage in terms of efficiency, fraud prevention, and market leadership.

Read Full Article

like

10 Likes

source image

Securityaffairs

2d

read

207

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

  • U.S. CISA added the Chromium V8 vulnerability, tracked as CVE-2025-6554, to its Known Exploited Vulnerabilities catalog.
  • Google released security patches for the Chrome vulnerability CVE-2025-6554 following its discovery by Clément Lecigne.
  • The vulnerability is a type-confusing issue in the V8 JavaScript and WebAssembly engine, allowing for arbitrary read/write access.
  • CVE-2025-6554 is the fourth Chrome zero-day patched in 2025, emphasizing the importance of addressing known vulnerabilities to prevent attacks.

Read Full Article

like

12 Likes

source image

Medium

2d

read

125

img
dot

Cyber Security & Individual Privacy

  • Introduction of Unified Payment Interface (UPI) has reduced the need for cash transfers in India, but cyber traps pose a significant threat.
  • Senior citizens, particularly pensioners, and women are vulnerable to cybercrimes through malicious links, harassment on social media, and online dating scams.
  • Hindering equitable access to online resources, like misusing Tatkal ticket booking schemes, is considered a cybercrime in India.
  • Responsible usage of online platforms, awareness campaigns, prompt cyber complaint filing, and structural overhaul in cyberspace, like implementing blockchain technology, are crucial to tackling evolving cyber threats.

Read Full Article

like

7 Likes

source image

Hackernoon

2d

read

593

img
dot

Image Credit: Hackernoon

Junior Cybersecurity Roles Are Vanishing—Blame Agentic AI

  • As AI advances, agentic tech like MCP and ACP automate and replace junior cyber roles.
  • Entry requirements rise as AI takes on tasks traditionally assigned to junior employees.
  • Companies reduce hiring, automate tasks, and demand more experience due to AI efficiency.
  • To stay relevant, consider joining AI fields, becoming a 'Human-in-the-Loop' expert, or enhancing creativity.

Read Full Article

like

11 Likes

source image

Dev

2d

read

39

img
dot

Image Credit: Dev

The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

  • Insider threats, originating from within an organization, are a significant cybersecurity risk often underestimated.
  • These threats come from intentional insiders seeking to harm or unintentional insiders causing vulnerabilities.
  • Insider threats are dangerous as access is already granted, harder to detect, and can lead to catastrophic damage.
  • Real-world examples like Edward Snowden and incidents at Tesla and Capital One highlight the severity of insider threats.

Read Full Article

like

2 Likes

source image

Pymnts

2d

read

224

img
dot

Image Credit: Pymnts

Brand Impersonation Scams Surge as Hackers Prey on Public Trust

  • Hackers are impersonating brands like PayPal and Apple to steal information and distribute malware, as per Cisco Talos' research.
  • Phishing scams involve victims calling scammers who pretend to be representatives and aim to extract confidential details or install malware.
  • A surge in brand impersonation attacks includes a tactic known as callback phishing, tricking individuals into disclosing sensitive data.
  • Increased focus on secure digital identities is emphasized due to the potential risks brought on by advances in artificial intelligence, says Cerby CEO Belsasar Lepe.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app