menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Socprime

4w

read

102

img
dot

Image Credit: Socprime

Understanding indices.query.bool.max_clause_count in OpenSearch

  • The indices.query.bool.max_clause_count setting in OpenSearch specifies the maximum number of clauses allowed in a bool query.
  • If the query exceeds this limit, an error is encountered, indicating that the query is too large or complex.
  • To fix the issue, you can increase the indices.query.bool.max_clause_count setting in the OpenSearch configuration.
  • Alternatively, you can optimize queries by simplifying or rewriting them to reduce the number of clauses.

Read Full Article

like

6 Likes

source image

Socprime

4w

read

320

img
dot

Image Credit: Socprime

Decoding the PROCTITLE Field in Auditd Event Streams with Logstash

  • By default, the PROCTITLE field in auditd events is encoded in HEX format.
  • To decode the PROCTITLE field using Logstash, a Ruby script can be added to the pipeline configuration.
  • The Ruby script splits the HEX string and converts it into an ASCII equivalent.
  • The decoded commandline field is then set in the event for further processing or output.

Read Full Article

like

19 Likes

source image

Bitcoinsensus

4w

read

280

img
dot

Image Credit: Bitcoinsensus

Most Secure Cryptocurrency Wallets of 2024

  • As cryptocurrency adoption grows, traders are increasingly looking to the most secure cryptocurrency wallets of 2024.
  • Choosing a wallet with a robust security framework is essential to minimise the risk of hacking, phishing, and other types of cyber attacks that can compromise digital assets.
  • Cold storage wallets are widely thought to be most secure. Among the best are Ledger, which supports over 5,500 cryptocurrencies, and Trezor, which provides open-source security framework tested by its own community.
  • Hot wallets, while less secure than cold wallets, are still a good option. Trust Wallet is among the most secure hot wallets, offering biometric authentication with fingerprint and facial recognition.
  • Metamask is among the most widely used crypto wallets in the world and popular on the Ethereum Blockchain. It offers encryption that hides all of an owner's data and biometric authentication and security alerts.
  • Coinbase Wallet, which includes biometrics, passwords, and security locks to provide multiple layers of protection, is one of the best options for cryptocurrency wallet security in 2024. Its DeFi wallets are integrated with Ledger hardware wallets.
  • The Crypto.com DeFi Wallet features two-factor authentication, biometric authentication, and local encryption via Secure Enclave to ensure private keys remain protected.
  • The Phantom Wallet, popular on the Solana blockchain as well as Ethereum, Bitcoin, and Polygon, includes encrypted storage on devices, biometric authentication, and scam detection features.
  • Securing digital assets is more important than ever and various options are available, whether traders prefer the robust security of cold wallets or the convenience of hot wallets.
  • Investors should stay up-to-date with the most modern defensive technologies in the market to safeguard their digital assets.

Read Full Article

like

16 Likes

source image

Cybersecurity-Insiders

4w

read

57

img
dot

Image Credit: Cybersecurity-Insiders

Security Service Edge Adoption Report 2024

  • Hybrid work poses new challenges for cybersecurity, so more security leaders are turning to Security Service Edge (SSE) services, which integrats ZTNA, SWG, CASB, and DEM technologies.
  • 94% stated their workforce is primarily hybrid or fully remote, and 59% say that adopting a SASE strategy is highly important.
  • SSE platforms are transforming the way businesses secure their hybrid work environments.
  • 69% of businesses want to adopt a Security Service Edge (SSE) platform within the next 24 months.
  • 44% plan to begin SSE implementation with Zero Trust Network Access (ZTNA) deployment.
  • VPN concentrators are the technology most security teams want to see replaced by SSE (66%).
  • Cloud and hybrid SSE architectures continue to grow in preference, with 65% desiring an SSE solution that utilizes public cloud in some capacity.
  • When asked about key challenges, the survey participants revealed that getting buy-in from various teams is the most significant barrier to seamless SSE adoption, cited by 35% of respondents.
  • The most valuable benefit of adopting SSE is enhanced user experience, recognized by 22% of respondents.
  • Effective Security Service Edge (SSE) implementation is crucial for bolstering cybersecurity defenses in a rapidly evolving cyber threat landscape. The report highlights eight essential practices for deploying SSE.

Read Full Article

like

3 Likes

source image

Medium

4w

read

165

img
dot

Image Credit: Medium

The Hidden Swarm: How Mini-Spy Processes Are Consuming Your Computer’s Resources

  • Everyday applications and the OS itself are consuming computer resources through background processes that call home for updates or send telemetry data without explicit user consent.
  • These background processes can lead to performance degradation, wasted resources, and reduced battery life for laptops.
  • Many users rely on their firewall's automatic mode or smart mode, which often grant free reign to supposedly safe applications that continually connect home.
  • Switching to an interactive or 'ask' mode can provide more insight but can also be overwhelming with prompted requests flooding the screen.
  • Existing firewall tools like Lulu and Little Snitch for macOS or Portmaster and Simplewall for Windows provide more insight and control than default firewalls but lack in-session based blocking.
  • Users can demand better tools, encourage innovations in firewall development or contribute to open-source firewall projects to make control over outbound connections customary.
  • Demand firewall features that account for launch agents, rename-hacks, and incessant calling home to starve the mini-spy parasites of their steady diet of data and CPU cycles.
  • Users must take steps to recognize background connections' impact on their computer and demand better firewall tools to reduce wasted resources and restore balance to their machines.
  • A healthier, faster, and more privacy-respecting digital life start when users refuse to be anesthetized and passive in the face of the barrage of background processes.

Read Full Article

like

9 Likes

source image

Eletimes

4w

read

258

img
dot

Image Credit: Eletimes

Securing EMI Resilience with Software-Driven Smart Electronic Fuses

  • Integrated smart power devices are becoming increasingly crucial in automotive systems due to their ability to combine power management with advanced diagnostic and protection features.
  • Electronic fuses, a prominent type of smart power device, are particularly remarkable for their reliability under harsh environmental conditions, including high operating temperatures and mechanical stress.
  • To ensure the correct operation of electronic products, they need to be tested for electromagnetic emissions that may negatively affect nearby equipment.
  • CISPR 25 is the standard developed for vehicles and boats to protect on-board receivers from such emissions.
  • For CISPR 25, emission limits are divided into Class 1, 2, 3, 4, and 5 products, specifying how to measure the noise using peak, quasi-peak, and average detection methods.
  • Conducted Electromagnetic Emission is the noise current generated by the EUT that propagates through the harness to other components/systems or power grid. This noise current can be measured using either the voltage method or the current method.
  • The experimental data have been collected for the STi2Fuse product VNF9Q20F, which is a 4-channel monolithic electronic fuse fully programmable through serial peripheral interface (SPI).
  • The EMI behavior of a smart electronic STi2Fuse device has been investigated, demonstrating compliance with the CISPR 25 standard under class 5 specifications.
  • Compliance with the CISPR 25 standard, particularly under class 5 specifications, is essential for these devices to ensure they do not interfere with other components and equipment within the vehicle.
  • The STi2Fuse products are critical components in modern vehicles, providing overcurrent protection and ensuring the safe operation of electrical circuits.

Read Full Article

like

15 Likes

source image

Cybersecurity-Insiders

4w

read

155

img
dot

Image Credit: Cybersecurity-Insiders

Privacy Concerns Amid Growing Mobile Security Threats: A Digital Dilemma

  • Mobile phones have become personal hubs of information storing everything from our financial details and social media activities to our intimate conversations and health data.
  • Privacy concerns have emerged as one of the most pressing issues in the realm of mobile security.
  • From spyware to malware, data breaches, and surveillance, the threats to mobile privacy have become increasingly sophisticated and pervasive.
  • Mobile devices store highly sensitive personal information, making them prime targets for cybercriminals, hackers, and even government agencies.
  • The repercussions of these security threats can be far-reaching, affecting not only the individual but also organizations, governments, and societies at large.
  • As mobile phones continue to play an ever-expanding role in our lives, the challenge of safeguarding our privacy has become more pressing than ever.
  • Mobile operating systems (iOS, Android) and apps frequently release security patches to fix known vulnerabilities, keeping device software up-to-date ensures protection against the latest threats.
  • Antivirus software can help detect and block malicious apps and spyware.
  • Protect sensitive accounts by using strong passwords or a password manager and enable two-factor authentication for added security.
  • Disable location services when not in use and be cautious about sharing your location with apps and websites.

Read Full Article

like

9 Likes

source image

Cybersecurity-Insiders

4w

read

111

img
dot

Image Credit: Cybersecurity-Insiders

The Rising Threat of Pegasus Spyware: New Findings and Growing Concerns

  • The scope of the Pegasus spyware's reach is far more extensive and troubling than initially suspected. Researchers have identified five new variants of Pegasus targeting iPhones and Android devices that are impacting ordinary individuals. These new strains of Pegasus are persisting undetected on public phones, quietly infiltrating phones, collecting personal data, and evading the detection of most conventional anti-malware solutions. The shift in the NSO Group's business strategy has turned Pegasus into a global surveillance weapon. The spyware is now available on various dark web platforms, and it is being distributed through third-party websites, particularly those hosted in China. The growing accessibility of spyware tools raises issues about personal freedoms, digital security, and the ethical boundaries of surveillance.
  • The use of spyware to infiltrate someone's device without their consent is illegal in most parts of the world, and rightfully so. Given the widespread and largely unregulated availability of spyware tools, there is a growing call for stricter international regulations governing their use. As mobile devices become an integral part of our daily lives, it is crucial for both individuals and organizations to be proactive in securing their mobile devices and to remain vigilant about potential threats.
  • A recent study by iVerify, a mobile security research company, reveals that the spyware is no longer just a tool for high-level surveillance but is becoming a pervasive threat to everyday users, regardless of their social status or prominence. The findings reveal that Pegasus is more prevalent than ever and points to a serious gap in the ability of conventional security tools to identify and neutralize sophisticated spyware like Pegasus.
  • Initially, NSO Group developed the Pegasus spyware as a tool for law enforcement and intelligence agencies, aimed at tracking criminal activity and terrorists. The company's business model shifted in the following years, and NSO began offering the spyware to private clients, which led to widespread abuse and the targeting of journalists, activists, and political figures. These versions are now being used by unauthorized individuals and groups to infiltrate phones for a variety of illicit purposes, including corporate espionage, blackmail, and even political surveillance.
  • iVerify's investigation, based on data collected through its Mobile Threat Hunting feature, indicates that these new strains of Pegasus spyware are circulating widely. The study serves as a stark reminder that no one, not even the most ordinary of individuals, is immune to the risks of digital surveillance. As Pegasus evolves, it is crucial for both individuals and organizations to remain vigilant and prioritize the protection of their personal data against increasingly sophisticated threats.
  • The growing presence of Pegasus highlights the urgent need for increased awareness and vigilance among mobile users, and the battle against digital espionage is far from over. While some countries have introduced legislative measures to protect citizens from spyware, the pace of technological advancement continues to outstrip regulatory efforts, leaving millions of people vulnerable to these kinds of attacks.
  • As of now, iVerify has not been able to trace the exact identities of those behind the release of these new variants of Pegasus. The company has discovered the malware on seven devices out of 1000 examined so far, and they are continuing to investigate the full scope of the attack. iVerify plans to issue an update on their findings as more information becomes available.
  • The battle against digital espionage is far from over, and as Pegasus evolves, so must our defenses. The disturbing findings from iVerify's research signal a troubling trend in the evolution of digital surveillance. As the threat of Pegasus continues to grow, it is crucial for both individuals and organizations to be proactive in securing their mobile devices.

Read Full Article

like

6 Likes

source image

TechJuice

4w

read

329

img
dot

Image Credit: TechJuice

Russian Cyber Group Hijacks Pakistani Servers to Access Indian and Afghan Data

  • The Russia-linked APT group Turla has executed a cyber-espionage campaign by infiltrating the C2 servers of Pakistani hacking group Storm-0156.
  • Turla captured C2 servers and used them to spread malware targeting Afghan government networks.
  • Turla used Storm-0156 as cover to gain access to targeted systems without direct strikes.
  • Turla's strategy involves taking over other actors' tools and infrastructure to reduce resource utilization and increase espionage.

Read Full Article

like

19 Likes

source image

Damienbod

4w

read

209

img
dot

Image Credit: Damienbod

Using Entra External ID with an Auth0 OpenID Connect identity provider

  • This post discusses implementing an Open ID Connect identity provider in Microsoft Entra External ID.
  • Auth0 is used as the identity provider, and an ASP.NET Core application is used for authentication testing.
  • Microsoft Entra External ID supports federation using OpenID Connect, and it was used to create the Auth0 OpenID Connect client.
  • The setup involves configuring the client in Auth0, setting up the callback URLs, and integrating the identity provider in the Entra External ID user flow.

Read Full Article

like

12 Likes

source image

Dev

4w

read

89

img
dot

Image Credit: Dev

VB .Net: Secure Password

  • The provided code snippet showcases the usage of the SecurePassword class in VB.Net for securing passwords.
  • The GetMd5Hash function computes the hash of the input string using MD5 algorithm.
  • The verifyMd5Hash function compares a hashed input string against a provided hash to verify correctness.
  • The code snippet also demonstrates the usage of the SecurePassword class for password verification.

Read Full Article

like

5 Likes

source image

Dev

4w

read

383

img
dot

Image Credit: Dev

What Is security.txt and How Can It Help Improve Website Security?

  • security.txt is a standardized text file that provides security-related information for websites.
  • By implementing security.txt, organizations can efficiently receive and address reports of security vulnerabilities.
  • The file format includes fields such as contact information, expiration date, preferred languages, security policy URL, acknowledgements URL, hiring URL, canonical URL, and encryption keys.
  • It is important to regularly update the security.txt file to ensure accurate and up-to-date information.

Read Full Article

like

23 Likes

source image

Pymnts

4w

read

428

img
dot

Image Credit: Pymnts

AI Adoption Still in ‘Very Early’ Stages, BlackRock Exec Says

  • BlackRock's U.S. head of thematic and active ETFs expects 2025 to be a big year for infrastructure and cybersecurity.
  • AI adoption is still in its early stages and AI firms need to build out their data centers.
  • Investing in cybersecurity is crucial as data becomes more valuable, benefiting the cybersecurity and software community.
  • The physical infrastructure that supports AI, including power, chips, and real estate, is important to consider alongside the technological advancements.

Read Full Article

like

25 Likes

source image

Inside

4w

read

405

img
dot

Quality Outreach Heads-up - JDK 24 Prepares Restricted Native Access

  • The OpenJDK Quality Group is promoting the testing of FOSS projects with OpenJDK builds to improve the release quality.
  • JDK 24 prepares restricted access to native code interactions, such as Java Native Interface (JNI) and Foreign Function & Memory API (FFM).
  • The goal is to ensure integrity by default for applications and the Java Platform, while providing operators with the ability to opt-out selectively.
  • Restricted operations include specific JNI and FFM operations, and warnings will be printed for these operations by default in JDK 24.

Read Full Article

like

24 Likes

source image

Dev

4w

read

316

img
dot

Image Credit: Dev

Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity

  • The Nexus Network testnet aims to provide a safe environment for developers and blockchain enthusiasts to explore rollup features and generate returns on idle assets.
  • It enhances cybersecurity by offering non-custodial security, minimizing risks for idle assets, and ensuring transparent yield mechanisms.
  • The testnet benefits cybersecurity by reducing attack points, increasing trust in rollups, proactive threat mitigation, and building a more secure blockchain infrastructure.
  • Pros of the Nexus Network testnet include boosted efficiency, strong security, easy adoption, risk-free testing, and support for rollup growth. Challenges include early-stage bugs, dependency on Holesky testnet, complexity for smaller developers, and lack of real-world rewards.

Read Full Article

like

19 Likes

For uninterrupted reading, download the app