menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Securityaffairs

4w

read

382

img
dot

Image Credit: Securityaffairs

Romanian energy supplier Electrica Group is facing a ransomware attack

  • Romanian energy supplier Electrica Group is facing a ransomware attack.
  • The attack hasn't affected critical systems but may cause temporary disruptions in customer services.
  • Electrica is implementing internal cybersecurity protocols and collaborating with national cybersecurity authorities.
  • The attack is believed to be a retaliation for Romania annulling its presidential election over alleged Russian interference.

Read Full Article

like

23 Likes

source image

Medium

4w

read

302

img
dot

How to Safeguard Your Web-based Protection in 2024?

  • Hoody.com is a creative stage intended to safeguard your protection while perusing the web.
  • It offers types of assistance, for example, hindering promotion following and enhancing security while sharing information.
  • Hoody.com guarantees the protection of individual information and offers a user-friendly interface.
  • To begin with Hoody.com, visit their website at https://hoody.com/?af=ERHNOZJB7 and experience secure and confidential perusing.

Read Full Article

like

18 Likes

source image

Inside

4w

read

386

img
dot

Quality Outreach Heads-Up - Security Properties Files Inclusion

  • The OpenJDK Quality Group is promoting the testing of FOSS projects with OpenJDK builds as a way to improve the overall quality of the release.
  • Including additional properties files in the main security properties file allows for better management of security properties across multiple JDK releases.
  • The inclusion mechanism ensures robust security and prevents misconfigurations by listing files explicitly and throwing a fatal error for missing or inaccessible files.
  • Including other properties files offers benefits such as override priority, automatic propagation of updates, and consistent security policies.

Read Full Article

like

23 Likes

source image

Medium

4w

read

57

img
dot

Image Credit: Medium

Understanding Communication Privacy Management Theory: A Guide for Everyday Life

  • CPM (Communication Privacy Management) is a theory that explains how people handle private information.
  • CPM is based on five core principles: ownership and control of private information, rules for concealing and revealing, disclosure creates co-ownership, negotiating privacy boundaries, and boundary turbulence.
  • An example of boundary turbulence is when private information shared with a colleague at work gets disclosed to the boss, leading to an awkward situation.
  • CPM is especially relevant in the digital age due to the challenges of privacy management posed by social media and online platforms.

Read Full Article

like

3 Likes

source image

Medium

4w

read

26

img
dot

Image Credit: Medium

AI for Cybersecurity and Cybersecurity for AI: A Win-Win

  • AI can automate tasks for pentesters and SOC analysts, improving efficiency and productivity.
  • AI helps cybersecurity professionals explore different domains and automate processes.
  • AI amplifies human expertise and allows for the integration of AI into cybersecurity tools.
  • Securing AI systems is crucial to prevent manipulation and ensure resilience against attacks.

Read Full Article

like

1 Like

source image

Medium

4w

read

4

img
dot

Image Credit: Medium

Register Windows Object Callbacks from Kernel Driver

  • This article demonstrates how to monitor access to Windows process objects using a kernel driver.
  • A kernel driver is employed to intercept handle creation and duplication events for process objects.
  • The driver registers callbacks using the ObRegisterCallbacks function to hook into these operations.
  • By leveraging kernel-mode access, this approach allows for deeper system monitoring and control.

Read Full Article

like

Like

source image

Wired

4w

read

182

img
dot

Image Credit: Wired

Police Arrest UHC CEO Shooting Suspect, App Developer Luigi Mangione

  • Luigi Mangione, an app developer, has been arrested in connection with the shooting death of UnitedHealthcare CEO Brian Thompson in New York City.
  • Mangione was apprehended in Altoona, Pennsylvania after visitors at a McDonald’s noticed his resemblance to the suspect and contacted authorities.
  • Authorities discovered bullet casings at the scene with words related to health insurance denial, and Mangione was found carrying a manifesto criticizing healthcare companies.
  • Mangione's online presence reveals his interest in gaming and technology, along with references to back pain and health care in his account history.

Read Full Article

like

10 Likes

source image

Lastwatchdog

4w

read

320

img
dot

Shared Intel Q&A: A thriving ecosystem now supports AWS ‘shared responsibility’ security model

  • Amazon has come a long way with AWS Shared Responsibility Model introduced in 2013 to divide cloud security obligations between AWS and its patrons.
  • AWS has introduced and promoted a range of tools and 3rd party cybersecurity vendors have been innovating to address the obvious gaps in cybersecurity.
  • Meanwhile, standards bodies and regulators have kept up the pressure for companies to do the right thing when it comes to cloud security giving rise to a steadily growing momentum of companies living up to their part of AWS shared responsibility.
  • High-profile breaches, especially stemming from misconfigured services like S3 buckets or exposed APIs, have emphasised the need for shared responsibility.
  • AWS does provide a rich set of security-focused tools, but ultimately securing an organization's environment is company's responsibility.
  • Amazon GuardDuty, WAF, Shield, and SSM Patch Manager are some of AWS's tools that help businesses manage their security posture.
  • AWS has built a robust network of partners and vendors, enabling businesses to leverage specialized solutions tailored to their unique needs.
  • Compliance will shift from being a competitive advantage to a baseline expectation and compliance requirements directly into infrastructure and software development lifecycle will become essential.
  • Strengthening security needs to be embedded across operations and championed by management to be truly effective as it is a 'must-have' today.
  • Nimbus Stack is a DevOps consultancy specialising in AWS security and excels in identifying potential threats and mitigating them, making compliance a critical factor for businesses aiming to grow and remain credible in the market.

Read Full Article

like

19 Likes

source image

Medium

4w

read

378

img
dot

The torrent of the Internet is surging.

  • The trend of training our mobile phones to become another self is causing a crisis in privacy protection.
  • The emergence of a data-driven self composed of personal information is following us everywhere, even in the darkest corners.
  • The story of a software engineer who vanished after posting unpopular remarks online highlights the risks and consequences of this data-driven world.
  • The concern lies in the potential pollution and pathological state of the vast ocean of data, as well as the inability to distinguish right from wrong.

Read Full Article

like

22 Likes

source image

Medium

4w

read

35

img
dot

Image Credit: Medium

Why Privacy Matters: Take Control of Your Digital Life

  • Every click, search, and share online leaves behind a trail of data that can be tracked by advertisers, exposed in data breaches, and monitored by governments.
  • To protect your privacy and secure your data, using a Virtual Private Network (VPN) is essential.
  • NordVPN is a trusted solution for privacy, offering military-grade encryption, a strict no-logs policy, a global server network, and ease of use.
  • In addition to using a VPN, limiting sharing on social media, using strong passwords, and enabling two-factor authentication can further protect your privacy online.

Read Full Article

like

2 Likes

source image

TechCrunch

4w

read

218

img
dot

Image Credit: TechCrunch

Ukraine says Russian hackers are targeting country’s defense contractors

  • Ukraine's defense contractors are being targeted by Russian hackers, according to the country's Computer Emergency Response Team (CERT-UA).
  • The hacking group UAC-0185, also known as UNC4221, is behind the attacks.
  • The group has been using phishing emails, pretending to be the Ukrainian League of Industrialists and Entrepreneurs, to target employees working for Ukraine's defense contractors and defense forces.
  • Cybersecurity experts have previously linked this hacking group to the Russian government.

Read Full Article

like

13 Likes

source image

Popsci

4w

read

13

img
dot

Image Credit: Popsci

Mysterious SUV-sized drones may have blocked medical helicopter

  • Large unidentified drones have been spotted flying over New Jersey, New York, and Pennsylvania.
  • These drones, some as large as a car, have caused concerns and prompted investigations.
  • One incident allegedly delayed the transport of a seriously injured car wreck victim by medevac.
  • Officials are actively monitoring the situation and trying to determine the origin and purpose of the drones.

Read Full Article

like

Like

source image

Tech Radar

4w

read

338

img
dot

Image Credit: Tech Radar

Microsoft challenges you to hack its LLM email service

  • Microsoft is offering $10k prize for hackers who can exploit vulnerabilities in its LLM
  • The challenge will focus on prompt injection defenses
  • Software developers and hackers often work together to discover and fix flaws
  • Microsoft aims to identify weaknesses in its prompt injection defenses and encourage robust security measures

Read Full Article

like

20 Likes

source image

Siliconangle

4w

read

418

img
dot

Image Credit: Siliconangle

Extreme Networks rolls out its platform to simplify network operations

  • Networking complexity is causing problems for businesses including blind spots, unplanned downtime, and security breaches. Extreme Networks has announced the launch of its Extreme Platform ONE connectivity platform that aims to combat this increasing complexity by using AI. The platform combines data from networks, security tools, and third parties such as Intel and Microsoft, and delivers conversational AI and autonomous networking. The platform is flexible enough to serve multiple audiences and includes a dashboard that shows all relevant financial information.
  • Extreme Platform ONE includes AI capabilities that help troubleshoot complicated networking issues, particularly Wi-Fi problems, which are the hardest to solve. An AI Policy Assistant can be used for policy administration, which is necessary but time-consuming and error-prone. The concept of the network platform has been around for years but has yet to catch on, and Extreme officials said that AI makes the platform's value proposition compelling today.
  • Extreme Networks is a rollup of many network vendors, including Enterasys, Brocade, Avaya Networking, and Motorola/Zebra. The company implemented “Universal Hardware,” which lets customers choose between different operating systems. With Extreme Platform ONE, the company aims to address network issues at every step of the lifecycle, from planning to optimization and security.
  • Extreme Platform ONE is comprised of several acquisitions and represents years of work. The purchase of Aerohive brought the company the cloud back end that is being leveraged in the current platform launch. Other vendors have followed the platform path, but Extreme CEO Nabil Bukhari believes that AI is more than a troubleshooting tool. The inclusion of AI as a core function of the platform is Extreme's differentiator.
  • Extreme Platform ONE is designed to deliver the best insights, which requires a single set of data. For most companies, AI for operations is the way forward, and that will push more companies toward a platform approach. Extreme's approach is to use AI to address issues at every stage of the network lifecycle.
  • Zeus Kerravala wrote the original article for SiliconANGLE. Extreme Platform ONE is well-timed with the current AI wave as it uses AI as a core function of the platform instead of just a troubleshooting tool. The platform aims to automate many of the complex tasks associated with operating and securing a network.

Read Full Article

like

25 Likes

source image

Alleywatch

4w

read

235

img
dot

Ethyca Raises $10M to Scale its Enterprise Data Privacy Engineering Platform

  • Ethyca has raised $10m in an extension of the prior Series A funding, bringing the company's total funding raised to $37.5m. Investors include AVP, Abstract Ventures, and IA Ventures.
  • Ethyca focuses on privacy engineering, building privacy controls into data-driven products to maintain robust governance and compliance. The open-source privacy engineering platform, Fides, integrates with technical infrastructure.
  • Fides caters to regulated enterprises such as financial services and healthcare, with the total available market estimated at $45bn and growing at 13% CAGR.
  • Ethyca's business model provides the Fides platform either self-hosted or cloud-hosted, along with enterprise solutions and support for large institutions.
  • Ethyca faces challenges of operating in a market sensitive to AI hype cycles. Ethyca has raised a strong round and is growing revenues 100% YoY despite wider economic challenges.
  • Ethyca is planning major product releases and to deploy Fides technology across 150 major global brands in the H1 2025. It will also be growing the Fides open-source community.
  • Ethyca's advice to companies with no capital on hand to extend runway as much as possible. It recognizes the challenge, but suggests focusing ruthlessly on sales as investment in product innovation without real revenue is pointless.
  • Ethyca envisages the doubling of its revenues and exponential growth in the coming year, continuing its stewardship of the Fides platform as it proliferates through society.
  • Red Hook is Ethyca CEO Cillian Keiran's favorite fall destination around the city, followed by cozy Italian food at Popina.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app