menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Siliconangle

4w

read

417

img
dot

Image Credit: Siliconangle

Extreme Networks rolls out its platform to simplify network operations

  • Networking complexity is causing problems for businesses including blind spots, unplanned downtime, and security breaches. Extreme Networks has announced the launch of its Extreme Platform ONE connectivity platform that aims to combat this increasing complexity by using AI. The platform combines data from networks, security tools, and third parties such as Intel and Microsoft, and delivers conversational AI and autonomous networking. The platform is flexible enough to serve multiple audiences and includes a dashboard that shows all relevant financial information.
  • Extreme Platform ONE includes AI capabilities that help troubleshoot complicated networking issues, particularly Wi-Fi problems, which are the hardest to solve. An AI Policy Assistant can be used for policy administration, which is necessary but time-consuming and error-prone. The concept of the network platform has been around for years but has yet to catch on, and Extreme officials said that AI makes the platform's value proposition compelling today.
  • Extreme Networks is a rollup of many network vendors, including Enterasys, Brocade, Avaya Networking, and Motorola/Zebra. The company implemented “Universal Hardware,” which lets customers choose between different operating systems. With Extreme Platform ONE, the company aims to address network issues at every step of the lifecycle, from planning to optimization and security.
  • Extreme Platform ONE is comprised of several acquisitions and represents years of work. The purchase of Aerohive brought the company the cloud back end that is being leveraged in the current platform launch. Other vendors have followed the platform path, but Extreme CEO Nabil Bukhari believes that AI is more than a troubleshooting tool. The inclusion of AI as a core function of the platform is Extreme's differentiator.
  • Extreme Platform ONE is designed to deliver the best insights, which requires a single set of data. For most companies, AI for operations is the way forward, and that will push more companies toward a platform approach. Extreme's approach is to use AI to address issues at every stage of the network lifecycle.
  • Zeus Kerravala wrote the original article for SiliconANGLE. Extreme Platform ONE is well-timed with the current AI wave as it uses AI as a core function of the platform instead of just a troubleshooting tool. The platform aims to automate many of the complex tasks associated with operating and securing a network.

Read Full Article

like

25 Likes

source image

Alleywatch

4w

read

235

img
dot

Ethyca Raises $10M to Scale its Enterprise Data Privacy Engineering Platform

  • Ethyca has raised $10m in an extension of the prior Series A funding, bringing the company's total funding raised to $37.5m. Investors include AVP, Abstract Ventures, and IA Ventures.
  • Ethyca focuses on privacy engineering, building privacy controls into data-driven products to maintain robust governance and compliance. The open-source privacy engineering platform, Fides, integrates with technical infrastructure.
  • Fides caters to regulated enterprises such as financial services and healthcare, with the total available market estimated at $45bn and growing at 13% CAGR.
  • Ethyca's business model provides the Fides platform either self-hosted or cloud-hosted, along with enterprise solutions and support for large institutions.
  • Ethyca faces challenges of operating in a market sensitive to AI hype cycles. Ethyca has raised a strong round and is growing revenues 100% YoY despite wider economic challenges.
  • Ethyca is planning major product releases and to deploy Fides technology across 150 major global brands in the H1 2025. It will also be growing the Fides open-source community.
  • Ethyca's advice to companies with no capital on hand to extend runway as much as possible. It recognizes the challenge, but suggests focusing ruthlessly on sales as investment in product innovation without real revenue is pointless.
  • Ethyca envisages the doubling of its revenues and exponential growth in the coming year, continuing its stewardship of the Fides platform as it proliferates through society.
  • Red Hook is Ethyca CEO Cillian Keiran's favorite fall destination around the city, followed by cozy Italian food at Popina.

Read Full Article

like

14 Likes

source image

TechCrunch

4w

read

382

img
dot

Image Credit: TechCrunch

US medical device giant Artivion says hackers stole files during cybersecurity incident

  • Artivion, a medical device company, experienced a cybersecurity incident that disrupted its services.
  • The incident involved the acquisition and encryption of data, suggesting a ransomware attack.
  • Certain systems were taken offline in response, causing disruptions to order and shipping processes.
  • Artivion does not expect a significant financial impact from the incident.

Read Full Article

like

23 Likes

source image

Cybersecurity-Insiders

4w

read

262

img
dot

Image Credit: Cybersecurity-Insiders

TikTok influencers being targeted by cyber attacks for Election results manipulation

  • A cyberattack on Romania's election infrastructure in November 2024 led to the leaking of sensitive data on a Russian hacking forum.
  • Over 85,000 cyberattacks were recorded on Romania's election infrastructure before the election concluded.
  • The cyberattack also targeted TikTok influencers, with some being paid to promote a specific presidential candidate.
  • The Romanian Foreign Intelligence Service (SIE) has accused the Russian government of orchestrating the attack.

Read Full Article

like

15 Likes

source image

Medium

4w

read

364

img
dot

Image Credit: Medium

Over the Air and Under the Radar: The Many Faces of Cellphone Hacking

  • Remote hacks of smartphones commonly exploit phishing techniques and zero-day exploits to install spyware without the user's knowledge.
  • Adversaries can monitor calls, text messages, emails, social media, track location, remotely activate microphones, cameras, and record keystrokes using spyware applications.
  • Counter-surveillance apps have been developed to detect anomalies and alert users if a phone is behaving oddly.
  • End-to-end encrypted messaging apps and trusted VPN for communication are recommended for security.
  • Using strong and unique passwords with multi-factor authentication can significantly reduce the chances of infiltration.
  • Proximity-based attacks are still a threat, but staying vigilant and aware of one's surroundings is a valuable precaution.
  • Proper digital hygiene, such as avoiding unsecured networks and disabling unnecessary functionality when not in use, can increase security.
  • Smartphone manufacturers have a critical role in streamlining security and privacy settings and providing transparent access to controls.
  • Encouraging simplicity and ease of use when it comes to security can empower users to transform their phones into trusted guardians of their private lives.

Read Full Article

like

21 Likes

source image

Socprime

4w

read

346

img
dot

Image Credit: Socprime

UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex

  • Hackers have targeted Ukrainian defense organizations and the military-industrial complex in a series of phishing attacks using the UAC-0185 (aka UNC4221) group.
  • CERT-UA issued a security alert notifying cyber defenders of the attacks, which masquerade the sender as the Ukrainian Union of Industrialists and Entrepreneurs (UUIE).
  • The attacks involve email spoofing and lures recipients with invitations to a conference on transitioning Ukraine's defense industry products to NATO standards.
  • The UAC-0185 group is known for credential theft, remote access to military systems, and the use of custom tools like MESHAGENT and UltraVNC.

Read Full Article

like

20 Likes

source image

Tech Radar

4w

read

404

img
dot

Image Credit: Tech Radar

Major hospital ransomware breach exposed data of 300,000 patients

  • Anna Jaques Hospital in Massachusetts was hit by ransomware in late 2023.
  • Negotiations with hackers broke down and the data was leaked on the dark web.
  • A year-long investigation revealed that sensitive data of more than 300,000 patients was exposed.
  • No evidence of misuse of the leaked data for identity theft or financial fraud has been found so far.

Read Full Article

like

24 Likes

source image

TechCrunch

4w

read

111

img
dot

Image Credit: TechCrunch

WhatsApp fixes bug that let users bypass ‘View Once’ privacy feature

  • WhatsApp has fixed a bug that allowed users to save pictures and videos meant to be viewed once.
  • The bug affected the implementation of the 'View Once' privacy feature in WhatsApp's web app.
  • WhatsApp has rolled out a long-term fix to address the issue.
  • The company encourages users to send View Once messages only to trusted individuals and ensure they are using the latest version of the app.

Read Full Article

like

6 Likes

source image

Siliconangle

4w

read

133

img
dot

Image Credit: Siliconangle

Cloudflare 2024 report highlights internet growth and rising cybersecurity challenges

  • Cloudflare Inc. released its annual year in review report, highlighting internet growth and rising cybersecurity challenges.
  • Internet traffic through 2024 grew 17.4%, with Google maintaining its position as the most popular internet service.
  • Government-directed shutdowns, cable cuts, military actions, and severe weather impacts contributed to over 220 internet outages.
  • 6.5% of global traffic required mitigation in 2024, with gambling and games being the most attacked industry.

Read Full Article

like

8 Likes

source image

Siliconangle

4w

read

84

img
dot

Image Credit: Siliconangle

Silverfort unveils Privileged Access Security to address enterprise identity security gaps

  • Unified identity security company Silverfort Inc. has unveiled Privileged Access Security (PAS) to address enterprise identity security gaps.
  • PAS discovers, classifies, and protects privileged accounts from end-to-end, providing rapid time-to-value and broader protection.
  • Existing Privileged Access Management (PAM) solutions struggle to defend against today's threats effectively, while Silverfort PAS can be implemented within days and operate alongside or as an alternative to PAM.
  • Key features of Silverfort's PAS include automating the discovery and classification of privileged accounts, enforcing a zero-trust approach, and offering frictionless just-in-time access.

Read Full Article

like

5 Likes

source image

VentureBeat

4w

read

186

img
dot

Adobe brings generative AI and real-time personalization to AWS: Here’s what’s next 

  • Adobe is partnering with Amazon Web Services (AWS) to expand its Experience Platform onto AWS, signaling a major shift in how enterprises approach AI and customer data.
  • This partnership allows organizations to activate customer data stored in AWS services for personalization without the complexity and latency of cross-cloud data transfers.
  • The integration of generative AI capabilities through the AEP AI Assistant offers a democratization of enterprise marketing tools, allowing teams to interact with complex data through natural language prompts.
  • The joint offering will be available in 2025, providing enterprises with the opportunity to leverage Adobe's suite of applications directly within their AWS environment.

Read Full Article

like

11 Likes

source image

Tech Radar

4w

read

177

img
dot

Image Credit: Tech Radar

New domain names such as .shop and .xyz are proving popular for cybercrime

  • New generic top-level domains (gTLDs), such as .shop and .xyz, are being widely used for cybercrime activities, according to a report.
  • These new domains account for more than a third (37%) of cybercrime domains, despite making up only 11% of the total domain name market.
  • The popularity of these domains among cybercriminals is attributed to their affordability and minimal registration requirements.
  • Phishing attacks have increased by nearly 40% and are expected to worsen with the introduction of new gTLDs.

Read Full Article

like

10 Likes

source image

Ghacks

4w

read

231

img
dot

Image Credit: Ghacks

iVerify: Pegasus spyware infections may be much higher than previously thought

  • iVerify, a security company, has developed a solution to detect traces of the Pegasus spyware on mobile devices.
  • Pegasus spyware, used by governments for surveillance purposes, has been found on 2.5 out of every 1,000 scanned devices on average.
  • Extrapolation suggests that over 750,000 devices in the United States alone could be infected with Pegasus.
  • iVerify's Mobile Threat Hunting solution can be accessed through their iVerify Basic app, allowing users to scan their devices for Pegasus traces.

Read Full Article

like

13 Likes

source image

Tech Radar

4w

read

84

img
dot

Image Credit: Tech Radar

Booking.com says typo bug can give strangers access to your whole trip

  • A typo bug in Booking.com allows strangers to access users' trip details.
  • The bug occurs when another user enters a wrong email address, linking the reservation to the wrong account.
  • Booking.com claims it is not a security breach but a customer input error.
  • Booking.com's system lacks further verification, making it easy to share private information with others.

Read Full Article

like

5 Likes

source image

Tech Radar

4w

read

106

img
dot

Image Credit: Tech Radar

NATO plans to deploy sea drones to monitor and protect undersea cables

  • NATO plans to deploy sea drones to monitor and protect undersea cables.
  • The drones, also known as unmanned surface vessels (USVs), will be used to increase monitoring of critical infrastructure in the Mediterranean and Baltic seas.
  • The deployment is in response to recent disruptions and the threat of sabotage to undersea cables, which supply the majority of internet across the world.
  • NATO aims to launch the fleet of sea drones in June 2025, using existing technologies and systems.

Read Full Article

like

6 Likes

For uninterrupted reading, download the app