menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

TechViral

1M

read

58

img
dot

Image Credit: TechViral

How to Enable and Use Controlled Folder Access in Windows 11

  • Controlled Folder Access is a feature in Windows 11 that protects your PC from ransomware attacks.
  • You can enable Controlled Folder Access by making changes in the Windows Security app settings.
  • To manage blocked files, navigate to the Controlled Folder Access screen and check the Block History section.
  • You can add or remove folders from Controlled Folder Access and also allow specific apps to access protected folders.

Read Full Article

like

3 Likes

source image

Wired

1M

read

340

img
dot

Image Credit: Wired

The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking

  • A security firm raised concerns about suspicious iPhone crashes hinting at a Chinese zero-click hacking campaign, affecting activists and US political staffers.
  • The hacking attempts targeted dissidents critical of China, EU government officials, tech executives, and employees of the Harris-Walz presidential campaign.
  • Despite the suspicions, Apple denies the claims of a targeted attack, attributing the crashes to a conventional software bug that has been patched.
  • The situation remains uncertain and concerning, especially with the involvement of China-linked hackers and potential national security implications.
  • In another development, a 22-year-old without national security experience has been appointed to a key DHS role overseeing anti-terrorism efforts.
  • The individual, Thomas Fugate, now leads the Center for Programs and Partnerships, responsible for funding initiatives to prevent politically motivated violence.
  • Amidst this, threat intelligence firms have reached an agreement on a glossary of hacker group names, aiming for consistency in reporting and analysis.
  • Phone-hacking firm Corellium, previously linked to controversies, has been acquired for $200 million by Cellebrite after its founder received a presidential pardon.
  • The article also discusses future security threats such as deepfake scams, GPS blackouts, AI-powered hacking, potential US grid attacks, and the development of a texting network for emergencies.
  • These evolving threats underscore the need for continuous vigilance and preparedness in the face of cybersecurity challenges.

Read Full Article

like

20 Likes

source image

Dev

1M

read

0

img
dot

Image Credit: Dev

Understanding Malware Types and Detection Methods

  • Malware is malicious software that can wreak havoc on your system, steal your data, and cause various issues.
  • Common types of malware include viruses, trojans, worms, spyware, ransomware, rootkits, and fileless malware.
  • Methods to detect malware include signature-based detection, heuristic analysis, behavioral monitoring, and cloud-based detection.
  • It's important to be cautious about clicking unknown links, update software regularly, and prioritize cybersecurity to prevent malware attacks.

Read Full Article

like

Like

source image

Siliconangle

1M

read

35

img
dot

Image Credit: Siliconangle

Observability’s new role in multicloud security and developer workflows

  • Unified observability is becoming crucial in managing the complexity of multicloud environments, aiding in operations and security.
  • Observability platforms integrating telemetry, performance metrics, and security insights are essential for aligning DevOps and SecOps needs.
  • Developers and security teams require real-time context and proactive alerts from observability platforms to effectively solve problems and address security events.
  • There is a growing demand for observability solutions that integrate seamlessly with existing developer and operations workflows, focusing on efficiency and cost optimization.

Read Full Article

like

2 Likes

source image

Medium

1M

read

157

img
dot

Image Credit: Medium

Smart Building & Facility Management with Blockchain–Edge Fusion

  • Smart buildings are evolving into dynamic, self-optimizing environments that respond to human behavior and environmental conditions.
  • Challenges include data fragmentation, cyber threats, and lack of transparency in building automation processes.
  • Blockchain-Edge Fusion combines blockchain's data integrity and edge computing's real-time control for enhanced smart building management.
  • Benefits include improved security, optimized operational costs, transparent service interactions, portable digital access credentials, and compliance with regulations.

Read Full Article

like

9 Likes

source image

TechCrunch

1M

read

309

img
dot

Image Credit: TechCrunch

After its data was wiped, KiranaPro’s co-founder cannot rule out an external hack

  • Indian grocery delivery startup KiranaPro faced a data loss incident with unclear origins, whether an internal breach or external hack.
  • The Bengaluru-based startup found its data wiped from back-end servers and GitHub, blaming a former employee.
  • Co-founder Ravindran mentioned a lack of deactivating the ex-employee's account, leaving room for malicious activity.
  • Ravindran stated they need to delve into forensic investigations to determine the breach comprehensively.
  • The startup had initially claimed the incident was an internal breach and not an external hack.
  • Allegations were based on a LinkedIn profile and GitHub response associated with the former employee.
  • KiranaPro's protection measures for the former employee's devices were questioned due to incomplete offboarding.
  • The company restored GitHub data and regained access to its AWS account, ensuring customer data remained secure.
  • While sufficient evidence exists for filing a formal complaint, investigations and employee payments are ongoing.
  • The startup, backed by venture capital firms and notable investors, has employees in Bengaluru and Kerala.

Read Full Article

like

18 Likes

source image

Lastwatchdog

1M

read

264

img
dot

MY TAKE: Are we ‘Super f**cked’ by AI? — debate gets 10 million-plus views on YouTube

  • An AI debate with over 10 million views on YouTube showcased diverging viewpoints on the impact of agentic AI.
  • Participants included Amjad Masad, Daniel Priestley, and Bret Weinstein, each presenting unique perspectives.
  • Masad and Priestley were optimistic about AI's potential to empower individuals and transform industries.
  • Weinstein, on the other hand, raised concerns about the unpredictability and risks of AI systems.
  • The debate emphasized the importance of how humans utilize AI technology rather than just its capabilities.
  • The discussion highlighted the evolving role of AI in various fields, showcasing how ordinary individuals are leveraging AI tools.
  • While polarization was evident in the debate, the author stresses the significance of nuance and intention in AI's application.
  • The article argues for a more realistic and balanced approach to harnessing the potential of AI while maintaining human agency.
  • It calls for storytelling and ethical considerations in AI development to safeguard against negative consequences.
  • Ultimately, the responsibility lies with humans to govern AI wisely and ensure it benefits society as a whole.
  • The article advocates for a nuanced understanding of AI's impact and highlights the need for informed decision-making in its implementation.

Read Full Article

like

15 Likes

source image

Siliconangle

1M

read

278

img
dot

Image Credit: Siliconangle

What to expect at the AWS Summit Washington, DC: Join theCUBE June 11

  • The AWS Summit Washington, DC event will focus on how the public sector can adopt generative AI and cloud technology while ensuring trust, compliance, and service continuity.
  • Sessions at the event will cover topics such as production-grade generative AI, security, infrastructure, ransomware resilience, and workforce development efforts by AWS.
  • The event will introduce an interactive AI Hub for public sector attendees to explore hands-on demos and tools addressing agency priorities in digital services and healthcare.
  • TheCUBE will be providing exclusive coverage of the event on June 11, featuring interviews with AWS executives, industry leaders, and technologists discussing strategies for scaling innovation through cloud-native solutions and explainable AI.

Read Full Article

like

16 Likes

source image

Medium

1M

read

152

img
dot

Image Credit: Medium

Beyond the Breach: A Legal Expert’s Guide to Surviving Cyber Threats in the AI Era

  • Navigating the intersection of technology, law, and security is crucial for businesses to survive cyber threats in the AI era.
  • Jessica Copeland, a legal expert in cybersecurity and AI governance, emphasizes proactive defense and strategic compliance to avoid falling victim to AI-powered deepfakes and ransomware.
  • Jessica Copeland warns that AI-powered threats, such as deepfakes and social engineering schemes, will continue to escalate before they stabilize, likely taking another two to three years.
  • She advises businesses on crucial proactive measures for defense, highlighting the risks of AI adoption and the evolving nature of the cyber insurance market.

Read Full Article

like

9 Likes

source image

Medium

1M

read

282

img
dot

Image Credit: Medium

The Rise of AI in Lending: How Renown Lending is Shaping the Future of Finance

  • The financial services sector is witnessing a revolution with the integration of Artificial Intelligence (AI) in lending, transforming how money is lent, assessed, and secured.
  • Renown Lending has embraced AI as a core element to deliver smarter, safer, and more ethical private lending services.
  • AI in finance, particularly in assessing credit risk, has been predominantly adopted by non-bank lenders for its flexibility, innovation, and efficacy.
  • AI powers various aspects of modern lending, from chatbots handling loan queries to credit-scoring algorithms, improving speed, trust, and compliance.
  • Renown Lending utilizes AI for faster, leaner, and more trustworthy lending processes, detecting fraud, and upholding ethical responsibilities.
  • AI-driven tools help verify financial statements, cross-check business records, and detect discrepancies, enhancing security and compliance.
  • The case of a loan application flagged by AI for inconsistencies in declared income and unpaid taxes demonstrates the efficacy and ethical duty upheld by AI systems.
  • AI is utilized to scrape company registers, monitor litigation databases, and streamline lending workflows, saving time and reducing errors.
  • Renown Lending leverages AI for generating personalized mail outs, design and content creation, photo editing, and ensuring brand consistency.
  • The combination of AI and human oversight at Renown Lending ensures efficient decision-making, fewer errors, better outcomes, and enhanced trust within the lending process.

Read Full Article

like

17 Likes

source image

Securityaffairs

1M

read

381

img
dot

Image Credit: Securityaffairs

Attackers exploit Fortinet flaws to deploy Qilin ransomware

  • Qilin ransomware is now exploiting Fortinet vulnerabilities, including CVE-2024-21762 and CVE-2024-55591, for remote code execution.
  • The ransomware group has been active since August 2022 and gained attention in 2024 for attacking Synnovis, a UK healthcare service provider.
  • Threat actors are actively exploiting Fortigate vulnerabilities to deploy Qilin ransomware, with the attack being fully automated.
  • Despite initially targeting Spanish-speaking countries, experts warn that the Qilin ransomware group could expand globally and is capable of independent intrusion operations.

Read Full Article

like

22 Likes

source image

TechCrunch

1M

read

246

img
dot

Image Credit: TechCrunch

Anthropic appoints a national security expert to its governing trust

  • Anthropic appoints a national security expert, Richard Fontaine, to its long-term benefit trust a day after unveiling new AI models tailored for U.S. national security applications.
  • Fontaine's role in the trust, along with other members like Zachary Robinson and Neil Buddy Shah, is to guide Anthropic in making complex decisions related to AI and security.
  • Anthropic CEO Dario Amodei emphasizes the importance of democratic nations leading in responsible AI development for global security and the common good.
  • Fontaine, a former foreign policy adviser to John McCain and president of a national security think tank, does not have a financial stake in Anthropic and joins as the company continues to engage with U.S. national security customers.

Read Full Article

like

14 Likes

source image

TechCrunch

1M

read

76

img
dot

Image Credit: TechCrunch

Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist

  • Italian lawmakers confirm Italy used Paragon spyware to target immigration activists but not a journalist, as concluded by a parliamentary committee's report.
  • The report raised key questions about the spyware attacks, with the investigation leaving many aspects unanswered.
  • WhatsApp notifications in January alerted 90 users, leading to revelations and a scandal in Italy regarding spyware use.
  • Italian nonprofit activists were found to have been targeted lawfully by intelligence agencies for alleged illegal immigration facilitation.
  • No evidence was found of journalist Francesco Cancellato being targeted by Italy's intelligence agencies, as per the COPASIR committee.
  • Paragon's foreign government customers and unanswered questions about the journalist targeting leave scope for further investigation.
  • Cancellato, a journalist, and director of Fanpage.it, doubted COPASIR's conclusions and sought explanations.
  • COPASIR's report disclosed new details on Paragon's spyware operations and the relationships with Italian intelligence agencies.
  • The report indicated legal approval for spyware deployments by Italian intelligence agencies AISE and AISI.
  • Paragon's contracts reportedly contain clauses prohibiting spyware use against journalists and human rights activists.

Read Full Article

like

4 Likes

source image

Wired

1M

read

256

img
dot

Image Credit: Wired

Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

  • Gray market services known as 'bulletproof' hosts have been targeted by law enforcement, leading to a shift towards using purpose-built VPNs and proxies to hide malicious web traffic.
  • Cybercriminals are increasingly using residential proxies and decentralized platforms to mask their activity and make it difficult for law enforcement to track them.
  • Attackers are utilizing proxies to make malicious traffic appear legitimate, posing challenges to organizations' threat detection tools.
  • Law enforcement faces difficulties in targeting malicious proxy providers due to the widespread use of proxies in legitimate internet services.

Read Full Article

like

15 Likes

source image

Medium

1M

read

76

img
dot

Image Credit: Medium

Is Using Public Wi-Fi Safe?

  • Using public Wi-Fi can pose security risks as hackers can easily intercept private information when connected to unsecured networks.
  • Hackers can create fake Wi-Fi hotspots known as 'evil twins' to capture sensitive data like passwords, credit card details, and personal information.
  • It is recommended to avoid accessing private or sensitive information when connected to public Wi-Fi and instead use secured home networks or mobile data.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app