menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Hackernoon

4w

read

205

img
dot

Image Credit: Hackernoon

Machine Learning Reveals the Faces Behind Viral QAnon Posts

  • A recent study used machine learning techniques to identify the potential authors behind the viral QAnon posts.
  • The authors collected linguistic data from QAnon posts and compared them to a list of suspects provided by journalistic investigations.
  • By analyzing the writing style, the study identified two individuals, Paul F. and Ron W., as the closest matches to Q's linguistic signature.
  • These potential authors are social media activists, not high-ranking personalities from the U.S. administration.

Read Full Article

like

12 Likes

source image

Wired

4w

read

419

img
dot

Image Credit: Wired

US Officials Recommend Encryption Apps Amid Chinese Telecom Hacking

  • US Federal Government officials are recommending US citizens utilise encryption apps such as Signal and WhatsApp in light of a recent Chinese government hacking scandal which is the largest telecom hack in the country's history.
  • The Salt Typhoon attack has aimed to infiltrate US telecoms by using the same government wiretap methods that were previously put in place to access American communications.
  • Specifically, the Cybersecurity and Infrastructure Security Agency and the FBI have encouraged Americans to use encryption in their communications in an attempt to protect themselves from compromise.
  • The Salt Typhoon attack shows that users should be doing everything in their power to keep their online activity protected whilst online in today's digital age.
  • Microsoft's threat intelligence researchers and Lumen Technologies have discovered that Turla, which is believed to operate for Russia's FSB intelligence agency, hacked the infrastructure of another hacker network based in Pakistan. The group then used access to spy on government, military and intelligence targets in India and Afghanistan.
  • Hydra, a dark web market place, enabled over $5bn in dirty cryptocurrency transactions since 2015, according to crypto tracing firm Elliptic. The site was used as a narcotics bazaar as well as a means to launder money for various crimes including ransomware, scams and sanctions evasion.
  • A DCI Group, a lobbying firm working on behalf of Exxon, was found to have given a list of targeted activists to a private investigator who then outsourced a hacking operation against those targets to mercenary hackers.
  • An iVerify smartphone scanner has been utilised to quickly and easily detect spyware in devices and has so far flagged seven infiltrated with the invasive Pegasus surveillance tool.
  • Russian law enforcement has charged and arrested Mikhail Matveev, also known as Wazawaka, a software developer thought to be associated with various ransomware gangs including LockBit, Conti, DarkSide, Babuk and Hive.
  • A consortium of global law enforcement agencies, led by the UK's National Crime Agency, have led a takedown operation against two major money-laundering Russian networks.

Read Full Article

like

25 Likes

source image

Cybersecurity-Insiders

4w

read

22

img
dot

Image Credit: Cybersecurity-Insiders

NAKIVO Launches v11 with Advanced Security Features for Virtualized Environments and Microsoft 365

  • NAKIVO announces the release of NAKIVO Backup & Replication v11, with advanced functionalities that introduce improved security for virtualized environments.
  • NAKIVO Backup & Replication v11 has Proxmox agentless backup, direct cloud backup for Microsoft 365, expanded NAS cloud backup options, and enhanced cybersecurity measure functionalities.
  • Proxmox VE is a cost-effective open-source virtualization solution. NAKIVO Backup & Replication v11 provides powerful Proxmox agentless backup with nod for guest OS agents.
  • NAKIVO Backup & Replication v11 also allows direct backups of Microsoft 365 data to leading public clouds, avoiding the needs for on-premises storage and meeting compliance requirements.
  • NAKIVO Backup & Replication v11 enhances NAS protection by providing flexible backup options to securely store NAS file shares in the cloud, on deduplication appliances, and on tape.
  • NAKIVO Backup & Replication v11 includes source-side encryption to protect sensitive information at the point of origin, reducing risks associated with data transmission and cyber threats.
  • The new Federated Repository feature enables businesses to create a scalable storage pool from multiple repositories ensuring uninterrupted protection and easy scalability as data needs grow.
  • NAKIVO Backup and Replication v11 is geared toward data resilience in businesses worldwide, providing enhanced disaster recovery readiness and safety for virtual environments.
  • The solution offers full Spanish language support, furthering NAKIVO's international expansion strategy and providing Spanish-speaking users an easier way to manage data protection.

Read Full Article

like

1 Like

source image

Medium

4w

read

276

img
dot

Image Credit: Medium

Building a Role-Based Access System with Spring Boot and React — Part 9

  • The frontend is built using React, with the following key components:
  • All HTTP requests are handled through a reusable service class: UserService.js.
  • The LoginPage enables users to log in by validating credentials and managing authentication state.
  • The Navbar dynamically displays links based on the user’s authentication status and role.

Read Full Article

like

16 Likes

source image

Securityaffairs

4w

read

22

img
dot

Image Credit: Securityaffairs

Russia’s FSB used spyware against a Russian programmer

  • The Russian intelligence agency, FSB, used spyware to monitor a Russian programmer, Kirill Parubets, after detaining him for allegedly donating to Ukraine earlier this year.
  • During Parubets' detention, authorities seized his Android device and installed spyware on it.
  • The spyware allowed Russian authorities to track the device's location, record phone calls and keystrokes, and read messages from encrypted messaging apps.
  • The analysis of the device revealed that the spyware was a trojanized version of the genuine Cube Call Recorder app, enabling comprehensive surveillance of the target device.

Read Full Article

like

1 Like

source image

Medium

4w

read

178

img
dot

Image Credit: Medium

Building a Role-Based Access System with Spring Boot and React — Part 7

  • The Controller Layer acts as the gateway between the client and the business logic.
  • UserManagementController handles user registration and authentication.
  • It also includes endpoints for refreshing tokens, fetching user details, updating user information, and deleting users.
  • Role-based access control is implemented to restrict access to certain endpoints.

Read Full Article

like

10 Likes

source image

Cybersecurity-Insiders

4w

read

120

img
dot

Image Credit: Cybersecurity-Insiders

Living on the (Automated) Edge: How to Leverage Private Networks to Unleash the Power of AI Without Compromising Security

  • Implementing the latest technology can have negative consequences for networks around bandwidth, connectivity and finances. Businesses are now turning to the network edge, where they can thrive without sacrificing latency, performance, or security as Generative AI, IoT and other cutting-edge technologies are developing. It also enables companies to minimize data transfer via external networks, bolstering security, producing better customer outcomes and optimizing bandwidth utilization.
  • Placing security controls closer to cloud-hosted data reduces the possibility of private networks being compromised by outside attacks. Additionally, it helps avoid congestion issues that might arise with devices and applications by rerouting traffic to the correct destinations and ensuring the network is not overloaded. This shift to the edge also delivers cost savings by offloading processing and storage requirements.
  • Security problems, knowledge and training issues, and the upfront costs are the biggest potential risks with Edge Networking. The Automated Edge has emerged as a critical advancement in edge networking, bringing intelligence that is embedded into edge devices and networking tasks like configuration, responsiveness, provisioning, and monitoring all by itself.
  • An optimal Network-as-a-Service (NaaS) platform has been integrated with leading automated edge capabilities, enabling businesses to deploy new technology tools safely and efficiently. The NaaS approach eliminates the complexity of implementing edge automation while taking care of security issues and protecting your network from attacks through constant monitoring and early detection.
  • Generative AI models, enhanced connectivity and real-time decision-making from different devices, locations, and applications can coordinate most effectively with the Automated Edge. Additionally, if your business relies on low latency, then your IT team will no longer have to constantly manage any blockages in your network as the Automated Edge does it for you.
  • Most companies are unwilling to manage the Automated Edge on their own, so they are establishing partnerships with Network-as-a-Service providers executing the edge networking on their behalf. With respective user-friendly dashboards, this approach provides seamless network management while network maintenance concerns are taken care of 24/7.
  • A successful Automated Edge deployment can propel companies forward in many essential areas, from keeping pace with the latest technology innovations to improving productivity and heightening convenience, as businesses capitalize on tomorrow’s cutting-edge developments.

Read Full Article

like

7 Likes

source image

Securityaffairs

4w

read

84

img
dot

Image Credit: Securityaffairs

Romania ’s election systems hit by 85,000 attacks ahead of presidential vote

  • Romania's election systems suffered over 85,000 cyberattacks targeting the country's election systems.
  • Leaked credentials for election-related websites were posted on a Russian hacker forum before the presidential election.
  • Romania's intelligence agency warns that the election systems are still vulnerable and could be compromised again.
  • Romania's Foreign Intelligence Service believes Russia targeted the country as part of broader efforts to influence democratic elections in Eastern Europe.

Read Full Article

like

5 Likes

source image

Medium

4w

read

384

img
dot

Image Credit: Medium

Andrew Tate’s Data Breach: 324,000+ Users Exposed?(In-Depth

  • The Real World, Andrew Tate’s website, has suffered a data breach in which more than 600 servers containing public and private chats were infiltrated. Additionally, over 324,000 user details have been compromised, including email addresses. Systemic security weaknesses led to the breach, which allowed attackers to exploit known vulnerabilities in software security, access control, and data protection.
  • The vulnerabilities exploited during the breach include the use of a vulnerable older version of Revolt; a flaw in the server settings, which meant anyone could upload emojis; and a further flaw that allowed hackers to create group chats and grant access to other users without paying the required fee.
  • Hackers’ ease of access to the platform is demonstrated by their efficient means of extracting the server ID from the URL bar, which gave them access to all the messages and groups on that server, regardless of whether they were public or private channels.
  • Consequently, Andrew Tate’s The Real World platform is exposed to more significant issues beyond a typical data leak. These concerns include privacy, user safety, and platform accountability, with far-reaching impacts affecting both users of the platform and the security landscape as a whole.
  • Solutions to the data breach, including better encryption, advanced authentication methods, and proactive threat detection, are purely reactive, which necessitates the adoption of a multi-faceted security approach across all sectors.
  • The breach of Andrew Tate’s The Real World poses a major wake-up call for cybersecurity. Cybersecurity is not a static goal but an evolving responsibility that demands constant attention.
  • The research into the data breach is a thorough investigation of the vulnerabilities and the potential implications of such a breach, which serves as a reminder that even well-established platforms with considerable resources are not immune to cyberattacks.
  • To address such challenges requires a multifaceted and layered security approach to reduce the likelihood of further breaches arising.
  • This report is the first of two deep dives into the vulnerabilities and broader implications of this breach. The next part will delve further into the leaked content, reveal shocking insights and provide some interesting takeaways.
  • Stay tuned for more updates on the situation.

Read Full Article

like

23 Likes

source image

TechCrunch

4w

read

326

img
dot

Image Credit: TechCrunch

Snyk hits $300M ARR but isn’t rushing to go public

  • Developer security startup, Snyk, valued at $7.4 billion, is not rushing to go public despite hitting $300 million annual recurring revenue (ARR).
  • CEO Peter McKay says the company has $435 million in the bank, expects to be cash flow positive in 2025, and will choose the right time for an IPO.
  • McKay believes regulatory conditions will improve next year, but sees 2026 as a more favorable time for Snyk to go public.
  • Snyk plans to continue acquiring smaller firms in the developer security space, while AI-generated code with vulnerabilities presents growth opportunities for their security tools.

Read Full Article

like

19 Likes

source image

Digitaltrends

4w

read

17

img
dot

Image Credit: Digitaltrends

Eset Premium review: 2024 improvements aren’t enough

  • Eset Premium is a fast and effective antivirus in 2024
  • Excellent malware protection in 2024
  • Flexible plans allow more devices
  • Quick installation
  • Live chat 11 hours on weekdays
  • Poor test results before 2024
  • Eset is expensive
  • Chatbot errors about live agents
  • Eset offers three subscription tiers with options to add more devices and extend the term
  • Eset installer offered some customization options with LiveGrid and customer experience

Read Full Article

like

1 Like

source image

Amazon

4w

read

232

img
dot

Image Credit: Amazon

AWS Network Firewall Geographic IP Filtering launch

  • AWS Network Firewall is a managed service that provides a convenient way to deploy essential network protections for your virtual private clouds.
  • Geographic IP Filtering, a new feature of Network Firewall that you can use to filter traffic based on geographic location and meet compliance requirements.
  • Customers with internet-facing applications are constantly in need of advanced security features to protect their applications from threat actors.
  • Previously, customers had to rely on third-party tools for retrieving an IP address list of specific countries and updating their firewall rules on a regular basis to meet applicable requirements.
  • Now, with Geographic IP Filtering on Network Firewall, you can protect your application workloads based on the geolocation of the IP address.
  • Geographic IP Filtering is supported in all AWS Regions where Network Firewall is available today, including the AWS GovCloud (US) Regions.
  • You can configure Network Firewall Geographic IP Filtering in minutes using the AWS Management Console, AWS Command Line Interface (AWS CLI), AWS SDK, or the Network Firewall API.
  • Suricata rule examples are given to pass, block, reject, and alert on traffic to or from a specific country.
  • You can use the new Geographic IP Filtering feature in AWS Network Firewall to enhance your security posture by controlling traffic based on geographic locations.
  • The Geographic IP Filtering feature serves as a vital tool for strengthening network security.

Read Full Article

like

13 Likes

source image

Securityaffairs

4w

read

53

img
dot

Image Credit: Securityaffairs

New Atrium Health data breach impacts 585,000 individuals

  • Atrium Health disclosed a data breach affecting 585,000 individuals to the HHS, potentially linked to the use of online tracking tools.
  • The breach occurred on Atrium Health's MyAtriumHealth Patient Portal between January 2015 and July 2019.
  • Online tracking technologies on the portal may have transmitted personal information to third-party vendors.
  • The potentially exposed data includes IP addresses, third-party identifiers/cookies, and limited patient information.

Read Full Article

like

3 Likes

source image

Medium

4w

read

250

img
dot

Image Credit: Medium

Invisible Targets: How Blockchain Transparency Became a Deadly Vulnerability

  • Sarah Thompson, a freelance graphic designer, unknowingly exposed her wealth through a public blockchain transaction.
  • Cybercriminals traced her transaction history and targeted her, stealing cash, crypto wallet, backup drives, jewelry, and her laptop.
  • Confidential Layer technology could have prevented this by providing anonymity, encrypted transaction details, and distributed transaction authentication.
  • Sarah's experience highlights the importance of privacy in the digital age and the need to protect assets with Confidential Layer.

Read Full Article

like

15 Likes

source image

Medium

4w

read

438

img
dot

Image Credit: Medium

TunnelBear VPN Review: Guarding Your Privacy with a Growl

  • TunnelBear VPN is a reliable VPN choice that offers AES-256 encryption and a no-logging policy to keep user data secure from hackers and cyber snooping.
  • TunnelBear boasts of its fast global server network that enables users to stream content and switch from one virtual location to another.
  • The VPN makes friends with up to five devices at once, supporting Apple, Microsoft, Android, or hybrid species of users' tech ecosystems.
  • TunnelBear offers 24/7 customer support backed by an amiable, hospitable tech team ready to navigate users through technical issues.
  • The setup process of TunnelBear is effortless and straightforward. Install the app, set up your account, and you are ready to go.
  • TunnelBear offers a trial run that lets users grasp its capabilities without any long-term commitments.
  • TunnelBear is environmentally conscious, actively engaging in efforts to promote sustainable tech practices.
  • TunnelBear VPN covers five unique devices with a one-year license, making it an affordable, deeply intelligent choice for online protection.
  • TunnelBear VPN also has an FAQ page that covers some of the users' frequently asked questions.
  • TunnelBear VPN signature feature is its intuitive and straightforward user interface that is suitable even for the technologically challenged users.

Read Full Article

like

26 Likes

For uninterrupted reading, download the app