menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

4w

read

182

img
dot

Image Credit: Medium

AMSI Patching Evasion

  • AMSI is Microsoft's security feature that scans and blocks suspicious PowerShell scripts.
  • A new technique patches AMSI functions in memory to make the scanner return an error code and allow code execution.
  • The tool locates the PowerShell process, calculates the memory addresses of critical AMSI functions, and writes a small assembly code patch to bypass scanning.
  • This technique disables AMSI's scanning capability directly at its source and allows PowerShell code execution without triggering security alerts.

Read Full Article

like

10 Likes

source image

The Verge

4w

read

22

img
dot

Image Credit: The Verge

Google sues alleged scammers over 10,000 fake Maps listings

  • Google is suing a network of scammers for creating and selling 10,000 fake business listings on Google Maps.
  • Scammers use Google Maps to deceive people by creating fake listings and providing false contact information.
  • Victims can be overcharged for services or persuaded to pay for nonexistent services through call centers.
  • Google has removed or blocked 12 million fake business profiles in 2023 and is taking action against businesses engaging in deceptive review activity.

Read Full Article

like

1 Like

source image

TechCrunch

4w

read

396

img
dot

Image Credit: TechCrunch

Federal judge blocks DOGE’s access to Social Security Administration’s banks of personal information

  • A federal judge blocked Elon Musk's Department of Government Efficiency (DOGE) from accessing systems at the Social Security Administration (SSA).
  • DOGE was accused of being engaged in a fishing expedition without a valid reason to access the personal information of millions of Americans.
  • The access violated federal privacy laws and posed cybersecurity risks.
  • Initially, DOGE was granted access to systems containing Social Security numbers, medical records, and other personal information.

Read Full Article

like

23 Likes

source image

Medium

4w

read

40

img
dot

Image Credit: Medium

So, Your Kid Wants To Be The Next YouTube Billionaire…

  • YouTube has become a popular platform for kids, with vloggers attracting millions of viewers.
  • Parents should engage with their children about the YouTube channels they watch and discuss potential downsides.
  • Some concerns include inappropriate humor, non-kid-friendly advertisements, and disguised product placements.
  • Parents can encourage their kids to have private YouTube channels to ensure their safety and limited exposure.

Read Full Article

like

2 Likes

source image

Medium

4w

read

369

img
dot

Image Credit: Medium

A Typical Afternoon of Digital Parenting Today’s Youth (also known as my child)

  • Conversations around technology use with your family should be a daily occurrence.
  • Steps to download and install Houseparty in a safe and secure way for collaborative school work.
  • Savvy Cyber Kids provides free digital parenting resources.
  • For more information, visit Savvy Cyber Kids website.

Read Full Article

like

22 Likes

source image

Infoblox

4w

read

391

img
dot

Image Credit: Infoblox

As actors adopt GenAI, threat intel needs to modernize

  • Generative AI, particularly Large Language Models (LLM), is transforming cybersecurity by lowering entry barriers for adversaries to create deceiving content.
  • Examples of malicious GenAI usage include deepfakes, chatbot automation, and code obfuscation, facilitating techniques like social engineering and fraud.
  • Deepfakes fueled crypto scams using generative AI, with criminals exploiting high-profile events like the U.S. presidential debate for fraudulent schemes.
  • AI-powered chatboxes are used by threat actors to engage victims through personalized messages and conversations, gradually leading to financial fraud.
  • Threat actors leverage GenAI for code obfuscation, blending malware with image files, increasing evasion rates and efficiency in setting up campaigns.
  • Predictive threat intelligence based on DNS telemetry is essential to intercept actors at early stages, identifying malicious infrastructure alterations.
  • Infoblox emphasizes the importance of tracking pre-attack activities to disrupt threats before the final payload stage, safeguarding against AI-driven attacks.
  • By leveraging DNS protocol data, Infoblox can provide predictive intelligence with high reliability, enabling companies to proactively mitigate risks.
  • The increasing use of AI in cybersecurity emphasizes the need for modernizing threat research and adopting proactive strategies to combat evolving threats.
  • The article underscores the significance of DNS-focused threat intelligence in staying ahead of risks posed by AI-driven attacks in the cybersecurity landscape.

Read Full Article

like

23 Likes

source image

Infoblox

4w

read

320

img
dot

Image Credit: Infoblox

As adversarial GenAI takes off, threat intel must modernize

  • Generative AI, particularly Large Language Models (LLM), is transforming cybersecurity by lowering entry barriers for adversaries to create deceiving content like deepfakes, chatbot automation, and code obfuscation.
  • Adversaries are leveraging GenAI tools such as voice cloning for scams, reducing the effort needed to deceive targets with trustworthy audio messages, which can lead to fraud and extortion.
  • Using AI-driven chat boxes, cybercriminals can automate interactions, target victims with personalized messages, and exploit trust to gain financial benefits, showcasing the need for predictive threat intelligence.
  • Threat actors employ GenAI to obfuscate malicious codes, aiding in evasion tactics, and increasing campaign efficiency while evolving traditional security detection methods.
  • By focusing on pre-attack activities and utilizing predictive intelligence based on DNS telemetry, organizations can identify malicious infrastructure early on and stay ahead of GenAI risks.
  • Infoblox Threat Intel leverages DNS data combined with threat expertise to intercept actor activities early, achieving a high 'Protection Before Engagement' rate in identifying malicious domains before any interaction occurs.
  • Predictive intelligence derived from DNS is highlighted as a strategy to combat GenAI-related threats and prevent organizations from falling victim to evolving cybersecurity challenges.
  • Infoblox Threat Intel's success in identifying malicious domains before engagement showcases the effectiveness of predictive intelligence in staying ahead of cyber threats.
  • It is crucial for organizations to adopt modern threat research strategies, such as predictive intelligence based on DNS data, to combat the evolving landscape of AI-driven cyber threats.
  • For more information on Infoblox Threat Intelligence Research and DNS security workshops, visit the provided links.

Read Full Article

like

19 Likes

source image

Securityaffairs

4w

read

151

img
dot

Image Credit: Securityaffairs

Veeam fixed critical Backup & Replication flaw CVE-2025-23120

  • Veeam has fixed a critical Backup & Replication flaw CVE-2025-23120.
  • The vulnerability could allow remote code execution and impacted version 12.3.0.310 and earlier.
  • The issue was reported by security researcher Piotr Bazydlo of watchTowr.
  • Veeam's patch blocks the identified gadgets, but further deserialization vulnerabilities may still exist.

Read Full Article

like

9 Likes

source image

Dataprivacyandsecurityinsider

4w

read

369

img
dot

Image Credit: Dataprivacyandsecurityinsider

Joint Alert Warns of Medusa Ransomware

  • A joint cybersecurity advisory has been issued by multiple agencies to warn companies about the Medusa ransomware.
  • Medusa is a ransomware-as-a-service (RaaS) variant that has impacted over 300 victims across various critical infrastructure sectors.
  • The ransomware gains access through phishing campaigns and exploits unpatched software vulnerabilities.
  • The threat actors encrypt files with the .medusa extension and communicate with victims through a .onion data leak site.

Read Full Article

like

22 Likes

source image

Npengage

4w

read

120

img
dot

Image Credit: Npengage

5 CRM Tech Trends to Shape the Future of Your Enterprise Organization

  • Around 70% of organizations plan to continue or increase investments in CRM technology according to Forrester's Kate Leggett.
  • There is a clear correlation between a mature CRM operation and improved customer experience and revenue growth.
  • Top 5 CRM tech trends for enterprise fundraising organizations include migration to a cloud-based CRM and upgrading to purpose-built CRMs.
  • Enhancing data security, prioritizing CRM data trust, and leveraging extensible platforms are key trends organizations should focus on.
  • AI is highlighted as a key trend to enhance productivity and make more intelligent business decisions.
  • Cloud-based CRM platforms are gaining momentum for lower costs, improved accessibility, and enhanced collaboration.
  • Purpose-built CRMs offer industry-specific functionalities and better integration with existing tech stacks.
  • Ensuring CRM data trust and security is crucial with modern CRMs offering various data protection measures.
  • Extensible platforms allow for customized user experiences and holistic views of organizational data.
  • AI tools integrated into modern CRMs have significant impacts on efficiency, productivity, and customer experience.

Read Full Article

like

7 Likes

source image

VentureBeat

4w

read

222

img
dot

Image Credit: VentureBeat

Speed is King: How Google’s $32B Wiz play rewrites DevOps security rules

  • Google's acquisition of Wiz highlights the importance of speed in modern DevOps cycles while maintaining security.
  • By acquiring Wiz, Google gains an AI-infused Cloud Native Application Protection Platform (CNAPP) to enhance threat detection and reduce false positives.
  • Wiz's integration with Google will improve risk detection, threat intelligence, and automated remediation for cloud-based applications and models.
  • Google's $32 billion investment signifies the urgency of AI-driven CNAPP platforms in fast-paced DevOps environments.
  • With enterprises increasingly adopting multi-cloud strategies, Google needs to provide a true CNAPP tool with multi-cloud support after the acquisition.
  • CNAPP plays a crucial role in helping DevOps teams reduce risks, block intrusions, and ensure secure CI/CD pipelines.
  • Wiz's expansion into container security and software composition analysis positions it as a strong competitor in the application security space.
  • Google's goal is to unify CNAPP solutions for end-to-end security from code to cloud, empowering faster development cycles.
  • The global CNAPP market is projected to grow significantly, driven by the need for advanced cloud security solutions.
  • Enterprises require AI-powered CNAPP platforms to streamline security processes and mitigate risks in multi-cloud environments.

Read Full Article

like

13 Likes

source image

Tech Radar

4w

read

195

img
dot

Image Credit: Tech Radar

Ransomware attacks are costing Government offices a month of downtime on average

  • New research reveals that ransomware attacks are causing an average of 27 days of downtime for government offices.
  • Government agencies experience higher average downtime compared to other sectors, such as healthcare and manufacturing.
  • The cost of downtime for government agencies due to ransomware attacks adds up to nearly $84,000 per day.
  • RansomHub is identified as the group responsible for stealing the most data, followed by ALPHV and Brain Cipher.

Read Full Article

like

11 Likes

source image

Tech Radar

4w

read

182

img
dot

Image Credit: Tech Radar

Top collectibles site leaks personal data of nearly a million users

  • Collectibles.com, a major collectible cards marketplace, has been leaking sensitive information on hundreds of thousands of users, exposing them to risk of identity theft, wire fraud, phishing, and more, experts have claimed.
  • Cybernews discovered and reported a non-password-protected Elasticsearch instance containing a 300GB cluster of valuable user data, counting more than 870,000 records.
  • The exposed data includes users' full names, email addresses, profile picture links, user account details, collectible card sales, and transactional data.
  • The instance was closed ten days later, but it is unknown for how long it remained open and if any malicious actors accessed the data.

Read Full Article

like

10 Likes

source image

VentureBeat

4w

read

218

img
dot

Image Credit: VentureBeat

Anthropic just gave Claude a superpower: real-time web search. Here’s why it changes everything

  • Anthropic announced that its AI assistant Claude now has real-time web search capabilities, bridging the competitive gap with OpenAI's ChatGPT and giving users access to the latest information from the internet.
  • With the ability to provide direct citations to sources, Claude aims to combat AI hallucinations and misinformation concerns, marking a critical advancement in the AI assistant market.
  • The recent $3.5 billion in Series E funding and strategic partnerships with major companies like Google and Amazon underscore Anthropic's rapid growth and significance in the AI sector.
  • The integration of real-time web search enhances Claude's utility for various users, including sales teams, financial analysts, researchers, and shoppers, streamlining workflows and saving time.
  • The feature allows Claude to process search results in a conversational format, addressing the limitations of traditional search engines and providing a more seamless user experience.
  • Anthropic's focus on technical improvements, such as cache-aware rate limits and prompt caching, showcases its commitment to enhancing developer experience and reducing costs for AI implementations.
  • The addition of voice capabilities in Claude's development pipeline indicates a potential shift towards more intuitive user interfaces, making AI assistants accessible to a broader audience.
  • Anthropic's emphasis on responsible AI development, evidenced by its support for transparency and regulatory collaboration, distinguishes the company in the AI industry landscape.
  • Claude's evolution into a comprehensive digital assistant, equipped with real-time information access and advanced reasoning abilities, signifies a transformative advancement in the AI assistant sector.
  • The combination of current data and deep contextual understanding in AI assistants like Claude has the potential to revolutionize knowledge work by automating research, analysis, and content creation tasks.

Read Full Article

like

13 Likes

source image

Medium

4w

read

333

img
dot

Image Credit: Medium

The Real You vs. Social Media You: How Social Media Is Shaping People’s Perception Of You

  • Your social media presence is curated by you and shapes how people regard and treat you in real life.
  • We spend a significant amount of time on social media creating and defining our personal brand.
  • The impression we make on others through social media can impact our self-worth, leading to pressure and competition.
  • Tips for using social media includes being more honest, real, and likable to let people know the real you.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app