menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Pymnts

4w

read

107

img
dot

Image Credit: Pymnts

Understanding the Shifting Anatomy of Next-Generation BEC Attacks

  • Business email compromise (BEC) attacks have evolved with a level of sophistication that is reshaping how companies must defend themselves.
  • Cybercriminals are exploiting newer top-level domains (gTLDs) like .shop, .top, .xyz to launch convincing phishing attacks.
  • Automation tools and AI-powered domain generation algorithms allow cybercriminals to set up multiple fraudulent sites and evade detection.
  • To combat BEC and domain-based fraud, organizations need a holistic approach integrating technology, processes, and employee training.

Read Full Article

like

6 Likes

source image

Wired

4w

read

71

img
dot

Image Credit: Wired

The Real Story of “The Order”

  • In the film, The Order, a character pores over The Turner Diaries, a 1978 novel that depicts the violent overthrow of the American government by armed white supremacist insurgents.
  • Bob Mathews, the founder of a murderous white supremacist guerrilla outfit, referred to his group as “The Order”— the same term used in the book for the protagonist’s genocidal militants.
  • Mathews’ campaign of armed insurgency and domestic terrorism has continued to inspire generations of extremists in the United States and beyond.
  • Terrorgram’s materials, which include viable bomb-making instructions, have radicalized at least one “saint,” or mass shooter.
  • The Order unearths a critical chapter in the history of the American extreme right, largely forgotten by the general public.
  • The hope of slipping an unsparing portrayal of domestic extremism into the December award season is to reintroduce a discussion of radicalization to American society.
  • The Order remains firmly rooted in the past, save for one passing reference to the 1995 Oklahoma City bombing, during production there was no escaping the drumbeat of resurgent far-right militancy in the United States.
  • Hoult’s portrayal of Mathews aimed to show audiences how someone with his charisma could attract followers and build a movement.
  • The film’s production team walked a fine line between showing Mathews’ magnetism and the murderous project at the heart of his ideology and actions.
  • Ultimately, The Order is a hope to reintroduce a discussion of radicalization to American society.

Read Full Article

like

4 Likes

source image

TechCrunch

4w

read

402

img
dot

Image Credit: TechCrunch

a16z-backed Toka wants to help US agencies hack into security cameras and other IoT devices

  • Israeli startup Toka, backed by Andreessen Horowitz, specializes in hacking into IoT devices.
  • The company is hiring for positions to support new business growth within US government agencies.
  • Toka claims to sell its products to militaries, homeland security organizations, intelligence, and law enforcement agencies in compliance with local laws.
  • Toka has raised $37.5 million in funding and has sought to avoid scrutiny on Israeli spyware outfits.

Read Full Article

like

24 Likes

source image

Dev

4w

read

335

img
dot

Image Credit: Dev

Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

  • After implementing email authentication, receiving DMARC reports become crucial for understanding email authentication status and potential security issues.
  • An analysis of a DMARC report highlighted multiple IP addresses sending emails, DKIM and SPF failures, and SPF results showing 'permerror'.
  • Investigation of the source IPs revealed unauthorized use of the domain from China Telecom network in Jiangsu Province, China.
  • To protect domains, it is recommended to configure SPF records, implement DMARC policies, and follow additional security measures such as DKIM configuration, deactivation of mail servers, regular monitoring, and domain registration maintenance.

Read Full Article

like

20 Likes

source image

Dev

4w

read

169

img
dot

Image Credit: Dev

Introduction to DevSecOps

  • DevSecOps is an approach that integrates security measures at every stage of the software development lifecycle (SDLC). It ensures that applications are both scalable and secure without compromising development speed.
  • Key principles of DevSecOps include shifting security testing left, automation, collaboration between teams, and continuous monitoring.
  • Benefits of DevSecOps include early detection of vulnerabilities, faster time-to-market, enhanced compliance, and improved security posture.
  • DevSecOps workflow involves planning, development, build, test, release, deploy, operate, and monitor.

Read Full Article

like

10 Likes

source image

Tech Radar

4w

read

13

img
dot

Image Credit: Tech Radar

The EU Digital Identity Wallet lands in Italy despite privacy concerns

  • Italian residents can now digitalize their identity documents with the IT-Wallet, Italy's version of the EU Digital Identity Wallet.
  • The IT-Wallet allows users to scan their driving license and health card from the IO app, with plans to expand to include other documents and functionalities.
  • The implementation of the EU ID Wallet has raised concerns about privacy and security among commentators and experts.
  • While the IT-Wallet is currently voluntary in Italy, critics argue that it could enable increased government surveillance and pose security risks.

Read Full Article

like

Like

source image

Hackernoon

4w

read

76

img
dot

Image Credit: Hackernoon

A Pentester Took Apart a Website’s Code to Prove It Was Totally Pointless

  • A penetration tester came across an online casino that verified the signature of requests on the server side and managed to figure out the generation algorithm of the signature itself.
  • Regardless of the purpose the developers had in mind when they added this parameter, it seems to be pointless. The signature itself is generated on the client side, and any client-side action can be subject to reverse-engineering.
  • The tester resolved the request signature generation algorithm and wrote an extension for Burp Suite that automates all the dirty work.
  • The extension can automatically generate HMAC SHA256, allowing the tester to get rid of manual work when sending requests, but it has the disadvantage of not being universal.
  • To make the extension universal, the tester added two functions extracting the CSRF token and UserID and by update the token itself in the sent headers.
  • The signature function takes all the custom parameters that are sent in the request, adds the standard user_id, currentTime, csrf_token to them, and sign them all together using ; as a separator.
  • The final body of the request is generated and sent onward.
  • The article concludes by highlighting the importance of writing custom extensions and presents the source code of the extension the tester wrote.

Read Full Article

like

4 Likes

source image

Tech Radar

4w

read

31

img
dot

Image Credit: Tech Radar

Mitel collaboration software zero-day strings along a previously patched vulnerability

  • A zero-day vulnerability in Mitel MiCollab is still present three months after being reported, according to cybersecurity researchers watchTowr.
  • The flaw allows threat actors to access sensitive information about user accounts, and Mitel has not yet released a patch for it.
  • WatchTowr has suggested several mitigations to minimize the risk, including limiting access to the MiCollab server and implementing strong firewall rules.
  • Users are advised to monitor logs for suspicious activity and disable or restrict access to the ReconcileWIzard servlet, if possible.

Read Full Article

like

1 Like

source image

Tech Radar

4w

read

71

img
dot

Image Credit: Tech Radar

US critical infrastructure hit once again by a new group on the scene

  • Microsoft reports that a new threat actor, Storm-0227, has targeted critical infrastructure in the United States.
  • Storm-0227 is a Chinese state-sponsored advanced persistent threat (APT) group linked to Silk Typhoon.
  • The group utilizes spear phishing and exploits software vulnerabilities to gain unauthorized access.
  • Once accessed, Storm-0227 deploys malware to obtain login credentials and steal sensitive documents for cyber-espionage.

Read Full Article

like

4 Likes

source image

Cybersecurity-Insiders

4w

read

371

img
dot

Image Credit: Cybersecurity-Insiders

Ransomware attacks cost $17 billion in downtime

  • Ransomware attacks have caused huge financial losses and operational disruptions, and Comparitech estimates that the financial toll of ransomware-related downtime could reach a staggering $17 billion over the past 5-6 years (since 2018).
  • Comparitech's research highlights the hidden costs that can accumulate when businesses are unable to function normally, including lost jobs, customer trust, and long-term damage to the business.
  • The research also indicates a concerning increase in ransomware attacks for 2023, with over 194 companies falling victim to ransomware disruptions in that year alone.
  • Rising sophistication of cybercriminals and the expanding scope of their targets have made industries like finance, manufacturing, and healthcare vulnerable to ransomware attacks.
  • During ransomware attacks, businesses face a minimum of 11.6 days of operational disruption, which can spiral up to an alarming 129 days, resulting in lost productivity, reduced customer satisfaction, and the costs associated with recovery and mitigation efforts.
  • A disturbing new trend in the world of ransomware is emerging where cybercriminals are now focused on deleting data to pressure victims by threatening permanent data loss unless the ransom is paid, creating an even more urgent need to act.
  • Experts predict that data deletion tactics could cause more widespread panic and force businesses to reconsider their approach to handling ransomware incidents.
  • As ransomware attacks evolve, businesses must be prepared for an increasingly complex threat landscape and invest in robust cybersecurity measures, including regular data backups, employee training, and threat detection systems.
  • They must also prepare for the possibility of losing critical data and rethink their strategies for handling ransomware incidents.
  • The frequency and severity of ransomware attacks continue to rise, making it imperative for businesses to stay ahead of the curve in their defenses against this growing threat.

Read Full Article

like

22 Likes

source image

Siliconangle

4w

read

192

img
dot

Image Credit: Siliconangle

AWS boosts cybersecurity efforts with updates to Security Lake

  • Amazon Web Services (AWS) announced updates to its cybersecurity services, including Security Lake and Open Cybersecurity Schema Framework at its re:Invent conference.
  • Security Lake is a data lake that centralizes customers' security data to help businesses in defending against cyberattacks.
  • AWS integrated Security Lake with OpenSearch, allowing customers to analyze their data efficiently and reducing the cost of service.
  • Open Cybersecurity Schema Framework (OCSF) has become a Linux Foundation project, promoting open-source cybersecurity solutions for data analysis and machine learning.

Read Full Article

like

11 Likes

source image

Socprime

4w

read

295

img
dot

Image Credit: Socprime

BlueAlpha Attack Detection: russia-affiliated Hacking Collective Abuses Cloudflare Tunnels to Distribute GammaDrop Malware

  • The Russian state-sponsored threat actor BlueAlpha has been conducting cyber-espionage campaigns against Ukraine since 2014.
  • BlueAlpha is now abusing Cloudflare service to distribute the GammaDrop malware.
  • The group uses Cloudflare Tunneling to obscure their infrastructure and bypass network detection mechanisms.
  • BlueAlpha employs sophisticated techniques like HTML smuggling and DNS fast-fluxing to evade security measures.

Read Full Article

like

17 Likes

source image

Medium

4w

read

134

img
dot

Image Credit: Medium

Building a Role-Based Access System with Spring Boot and React — Part 6

  • The UsersManagementService class handles core functionalities of user registration, login, token generation, user retrieval, and more, acting as the brain of the application.
  • User registration ensures secure storage of new users with encoded passwords and provides validations and error responses.
  • The login method authenticates users, generates a JWT, manages tokens, and allows role-based access control.
  • The UsersManagementService class also handles fetching, updating, deleting, and retrieving user information, ensuring secure and efficient processing.

Read Full Article

like

8 Likes

source image

Tech Radar

4w

read

353

img
dot

Image Credit: Tech Radar

Apple is taking over this popular password manager plugin

  • Apple has introduced Passwords support for Firefox
  • The extension allows Mac users to store, sync, and autofill credentials
  • Apple has apparently taken ownership of an existing extension
  • The Firefox extension is not compatible with Windows, but support may be coming in the future

Read Full Article

like

21 Likes

source image

Tech Radar

4w

read

290

img
dot

Image Credit: Tech Radar

Cyberattack response plans should be mandatory for US telecoms, FCC Chair says

  • US telecoms should submit yearly certification for cyber-incident response plan.
  • FCC Chairwoman proposes the mandatory certification to tackle rising cyber attacks.
  • Chinese state-sponsored threat groups allegedly infiltrated US telecom providers.
  • China denies involvement and claims CIA involvement in hacking collective.

Read Full Article

like

17 Likes

For uninterrupted reading, download the app