menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Tech Radar

4w

read

182

img
dot

Image Credit: Tech Radar

Top collectibles site leaks personal data of nearly a million users

  • Collectibles.com, a major collectible cards marketplace, has been leaking sensitive information on hundreds of thousands of users, exposing them to risk of identity theft, wire fraud, phishing, and more, experts have claimed.
  • Cybernews discovered and reported a non-password-protected Elasticsearch instance containing a 300GB cluster of valuable user data, counting more than 870,000 records.
  • The exposed data includes users' full names, email addresses, profile picture links, user account details, collectible card sales, and transactional data.
  • The instance was closed ten days later, but it is unknown for how long it remained open and if any malicious actors accessed the data.

Read Full Article

like

10 Likes

source image

VentureBeat

4w

read

218

img
dot

Image Credit: VentureBeat

Anthropic just gave Claude a superpower: real-time web search. Here’s why it changes everything

  • Anthropic announced that its AI assistant Claude now has real-time web search capabilities, bridging the competitive gap with OpenAI's ChatGPT and giving users access to the latest information from the internet.
  • With the ability to provide direct citations to sources, Claude aims to combat AI hallucinations and misinformation concerns, marking a critical advancement in the AI assistant market.
  • The recent $3.5 billion in Series E funding and strategic partnerships with major companies like Google and Amazon underscore Anthropic's rapid growth and significance in the AI sector.
  • The integration of real-time web search enhances Claude's utility for various users, including sales teams, financial analysts, researchers, and shoppers, streamlining workflows and saving time.
  • The feature allows Claude to process search results in a conversational format, addressing the limitations of traditional search engines and providing a more seamless user experience.
  • Anthropic's focus on technical improvements, such as cache-aware rate limits and prompt caching, showcases its commitment to enhancing developer experience and reducing costs for AI implementations.
  • The addition of voice capabilities in Claude's development pipeline indicates a potential shift towards more intuitive user interfaces, making AI assistants accessible to a broader audience.
  • Anthropic's emphasis on responsible AI development, evidenced by its support for transparency and regulatory collaboration, distinguishes the company in the AI industry landscape.
  • Claude's evolution into a comprehensive digital assistant, equipped with real-time information access and advanced reasoning abilities, signifies a transformative advancement in the AI assistant sector.
  • The combination of current data and deep contextual understanding in AI assistants like Claude has the potential to revolutionize knowledge work by automating research, analysis, and content creation tasks.

Read Full Article

like

13 Likes

source image

Medium

4w

read

333

img
dot

Image Credit: Medium

The Real You vs. Social Media You: How Social Media Is Shaping People’s Perception Of You

  • Your social media presence is curated by you and shapes how people regard and treat you in real life.
  • We spend a significant amount of time on social media creating and defining our personal brand.
  • The impression we make on others through social media can impact our self-worth, leading to pressure and competition.
  • Tips for using social media includes being more honest, real, and likable to let people know the real you.

Read Full Article

like

20 Likes

source image

Medium

4w

read

360

img
dot

Image Credit: Medium

Why Image Anonymization is Vital for GDPR Compliance

  • Data protection regulations like GDPR have become stricter, requiring businesses to handle personal data, including images, with utmost care to avoid severe penalties.
  • Image anonymization plays a vital role in helping businesses comply with GDPR by removing or altering personal identifiers in images to prevent recognition.
  • AI-powered anonymization tools offer a fast, scalable, and accurate solution compared to manual editing to protect user privacy while leveraging image data for legitimate purposes.
  • GDPR emphasizes data minimization, purpose limitation, and security, requiring businesses to treat images with personal identifiers with the same care as sensitive customer details.
  • Failing to comply with GDPR can lead to severe consequences, including fines of up to €20 million or 4% of annual revenue, along with reputational damage and operational disruptions.
  • Automated AI-driven image anonymization can detect and obscure personal information in real-time, ensuring compliance with data protection laws across various industries.
  • AI-powered anonymization techniques include blurring, pixelation, face/object detection with automated redaction, and synthetic replacement for effective privacy protection.
  • Manual anonymization is time-consuming, inconsistent, and error-prone, making it impractical for businesses dealing with large volumes of image data.
  • AI-powered image anonymization offers speed, accuracy, scalability, and consistency in processing large datasets, reducing compliance risks and ensuring data security.
  • Choosing the right AI-powered anonymization tool involves considering factors like integration, accuracy, processing speed, and compliance with GDPR and other privacy laws.
  • By adopting AI-driven image anonymization solutions, businesses can protect user privacy, avoid legal consequences, and maintain consumer trust while ensuring GDPR compliance.

Read Full Article

like

21 Likes

source image

Hackernoon

4w

read

338

img
dot

The HackerNoon Newsletter: Is Your AI-Generated Code Really Secure? (3/20/2025)

  • Is Your AI-Generated Code Really Secure?
  • Argentina’s President Fights to Move Past $300M Crypto Rug Pull with Aggressive Agenda
  • Vibe Coding Will 10X Every Developer, Yet Never, Ever, Replace Them
  • Remember When NFTs Were All the Rave on Twitter?

Read Full Article

like

20 Likes

source image

TechCrunch

4w

read

106

img
dot

Image Credit: TechCrunch

Hackers are ramping up attacks using year-old ServiceNow security bugs to target unpatched systems

  • Hackers are exploiting year-old ServiceNow vulnerabilities to target unpatched systems.
  • Threat intelligence startup GreyNoise observed a notable resurgence of targeted exploitation attempts.
  • The vulnerabilities, known as CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217, were patched by ServiceNow in July 2024.
  • The vulnerabilities allow for full database access of affected ServiceNow instances, potentially exposing sensitive data.

Read Full Article

like

6 Likes

source image

Tech Radar

4w

read

111

img
dot

Image Credit: Tech Radar

Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices

  • A popular spyware company has suffered a data breach.
  • Almost 2 million SpyX records were compromised, including 17,000 Apple iCloud credentials.
  • SpyX is a widely-used consumer-grade stalkerware operation that monitors devices without the users' knowledge or consent.
  • This breach puts affected individuals at risk of identity theft, fraud, and privacy invasion.

Read Full Article

like

6 Likes

source image

Cybersecurity-Insiders

4w

read

0

img
dot

Image Credit: Cybersecurity-Insiders

Elon Musk Faces Backlash After Hackers Target Tesla Customers raising data security concerns

  • A hacker group has launched a cyberattack targeting Tesla customers, resulting in a massive data breach.
  • The website 'DOGEQUEST' displays personal information of Tesla owners, including names, addresses, and ownership records.
  • Tesla owners' information will remain public unless they can prove they have sold their vehicles.
  • Elon Musk condemned the hackers' actions as 'domestic terrorism', and the FBI is demanding a formal investigation.

Read Full Article

like

Like

source image

Siliconangle

4w

read

232

img
dot

Image Credit: Siliconangle

Breaking boundaries: Cato Networks adopts a platform approach to reshape network security

  • Cato Networks adopts a platform approach to reshape network security.
  • Founder and CEO, Shlomo Kramer, aims to simplify and converge enterprise security solutions into a single cloud platform.
  • Cato Networks' Secure Access Service Edge approach integrates networking and security for operational efficiency and agility.
  • The company overcomes technical challenges to provide a reliable and dynamic network security stack.

Read Full Article

like

13 Likes

source image

TheNewsCrypto

4w

read

115

img
dot

Image Credit: TheNewsCrypto

How Hackers Are Targeting Crypto Job Seekers: Top Scams and Protection Tips

  • Cryptocurrency job scams have been on the rise, targeting job seekers with promises of high-paying remote jobs and tricking them into sharing personal information or making financial commitments.
  • Scammers use tactics like phishing emails, fake job listings, and impersonating well-known companies to deceive individuals seeking crypto job opportunities.
  • Common scams involve requests for personal information, downloading malicious applications, and upfront payments under the guise of employment requirements.
  • Recent incidents have highlighted the severity of crypto job scams, including cases of human trafficking, text message recruitment scams, and pig butchering scams.
  • Understanding the tactics employed by scammers, such as fake job postings, fake company profiles, and pressure tactics, can help job seekers identify and avoid potential threats.
  • Protection tips for job seekers include verifying job offers, avoiding unsolicited offers, using secure platforms, and never paying upfront fees for employment.
  • Hardware wallets, monitoring wallet activity, and never sharing private keys are recommended measures to protect against cryptocurrency job scams.
  • In the event of being targeted by a scam, individuals should cease communication, report the incident to authorities, notify financial institutions, and seek support from fraud victim assistance groups.
  • Real-world incidents of crypto job scams include arrests in Singapore, North Korean hacking groups targeting blockchain developers, and significant global financial losses reported.
  • Awareness, caution, and verification are crucial in protecting oneself from crypto job scams, phishing attacks, and other fraudulent schemes prevalent in the cryptocurrency industry.

Read Full Article

like

6 Likes

source image

Secureerpinc

4w

read

115

img
dot

Image Credit: Secureerpinc

Why Cybersecurity Should Be a Priority for Every Business Owner

  • Cyber threats are on the rise and can impact establishments of all sizes, making cybersecurity essential for every business owner.
  • Small-to-medium-sized businesses are particularly vulnerable to cybercrimes, with the potential cost averaging over $2.2 million annually.
  • Insider threat management, ransomware defense strategies, cyber liability insurance, and regulatory compliance are key steps in strengthening cybersecurity.
  • Building a solid defense and taking consistent actions against cyber threats is crucial for protecting business establishments.

Read Full Article

like

6 Likes

source image

Medium

4w

read

115

img
dot

Image Credit: Medium

CyberHub: The AI-Powered Cybersecurity Tool Experts Are Using

  • CyberHub is an AI-powered cybersecurity tool that curates and delivers high-quality cybersecurity content to users.
  • It aggregates and summarizes the most relevant news, videos, discussions, and podcasts from trusted sources.
  • Users can stay updated with major cybersecurity events, breaches, and research through easy-to-read summaries.
  • CyberHub allows users to efficiently stay informed, stay ahead, and never miss a critical update.

Read Full Article

like

6 Likes

source image

Tech Radar

4w

read

134

img
dot

Image Credit: Tech Radar

Data breach at Pennsylvania education union potentially exposes 500,000 victims

  • A data breach at the Pennsylvania State Education Association (PSEA) potentially exposed more than 500,000 individuals to identity theft and fraud.
  • The data breach occurred in July 2024, and the union issued a data breach notification to warn the affected individuals.
  • Personal, financial, and health information were exposed in the breach, including names, social security numbers, payment card information, and health insurance details.
  • While the responsible threat actors were not disclosed, the ransomware group Rhysida claimed responsibility for the attack in September 2024.

Read Full Article

like

8 Likes

source image

Dev

4w

read

351

img
dot

Image Credit: Dev

What Happens When Apps Collect Too Much User Data?

  • Apps have the capability to collect various types of user data, some of which may not be essential for the app's core functionality.
  • TikTok's instance of reading clipboard data without explicit user consent is an example of excessive data collection.
  • Excessive data collection is not limited to popular social media apps but extends across the industry due to the value of data.
  • Legitimate reasons for data collection by apps include authentication, user experience optimization, troubleshooting, and compliance.
  • Apps collect excessive data for purposes such as targeted advertising, AI training, competitive advantage, surveillance cooperation, and data hoarding.
  • Excessive data collection leads to privacy violations, security breaches, bias, legal issues, erosion of user trust, and financial burdens.
  • Developers hold ethical responsibilities in transparent data collection, data minimization, data security, user control, and avoiding manipulative practices.
  • Ensuring ethical data practices is crucial for maintaining user trust and abiding by laws and regulations governing data collection.
  • Data minimization, transparency, user control, and security measures are key principles for responsible data collection by app developers.
  • Maintaining user trust and ensuring data security are vital aspects of ethical app development in the digital age.

Read Full Article

like

21 Likes

source image

Pymnts

4w

read

365

img
dot

Image Credit: Pymnts

Worldpay and Visa Introduce Single-Click Checkout in the UK

  • Worldpay and Visa have introduced Click to Pay with Visa checkout in the UK.
  • The feature enables customers to complete transactions with a single click, eliminating manual card details entry.
  • Worldpay research shows that 83% of online shoppers expect a one-click checkout experience.
  • The Click to Pay technology incorporates advanced security measures and can increase authorization rates by over 10% and reduce fraud by 80% compared to manual card entry.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app