menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

TechBullion

1M

read

421

img
dot

Image Credit: TechBullion

11 Things to Look for in a Security Company

  • Choosing the right security company is critical for safeguarding your interests, and it's important to make an informed choice before partnering with a security service provider.
  • Opting for a local security company offers distinct advantages as they are intimately familiar with the area, culture and potential security challenges.
  • Researching the reputation of potential security guard companies through reviews and client testimonials can provide critical insights into their effectiveness and reliability.
  • Look for a security company with a proven track record in settings that are similar to yours to ensure that the security personnel are familiar with everyday challenges and best practices specific to your industry.
  • When evaluating potential security companies, ensure they only employ licensed guards who have undergone background checks and received the necessary training.
  • A security company committed to excellence will ensure its staff members undergo regular, comprehensive training to handle diverse and potentially hazardous situations effectively.
  • The company you choose should prioritize excellent communication and support and be responsive, transparent, and proactive in addressing any concerns or updates regarding your security situation.
  • A reputable security company ensures 24/7 guard availability and swift emergency responses, making them a reliable choice for uninterrupted security coverage.
  • Firms that leverage advanced technology such as CCTV camera monitoring, GPS tracking, and alarm response systems can significantly enhance the effectiveness of security measures.
  • Choosing a security provider is a significant commitment; ensuring they operate with high ethical standards by engaging directly with potential companies is imperative for a trust-based relationship.

Read Full Article

like

25 Likes

source image

Tech Radar

1M

read

219

img
dot

Image Credit: Tech Radar

MirrorFace targets Japan in fresh ANEL and NOOPDOOR spearphishing campaign

  • MirrorFace, a Chinese state-sponsored threat actor, has shifted its tactics to engage in spear phishing attacks targeting individuals in Japan.
  • The group is particularly interested in Japan's national security and international relations, focusing on topics related to China-US relations.
  • The spear phishing emails contain lures in the form of fake documents discussing Japan's economic security from the perspective of current US-China relations.
  • Victims who fell for the attack were infected with two backdoors, NOODPOOR and ANEL, with the latter being dormant and not observed in campaigns since 2018.

Read Full Article

like

13 Likes

source image

Secureerpinc

1M

read

295

img
dot

Image Credit: Secureerpinc

Hackers Exploit CCTV Camera Flaws

  • Hackers have been exploiting flaws in CCTV cameras, allowing them to manipulate camera settings, watch live feeds, and integrate botnets.
  • Some high-cost devices from manufacturers such as PTZOptics, SMTAV Corporation, and Multicam Systems have been affected.
  • To minimize cyberattacks, it is recommended to use stronger passwords, limit access to authorized devices, utilize virtual private networks (VPNs) or cloud access, employ built-in advanced data encryption, and enable two-factor authentication (2FA).
  • Regular firmware updates are also important to patch any newly discovered software flaws.

Read Full Article

like

17 Likes

source image

Cybersecurity-Insiders

1M

read

67

img
dot

Image Credit: Cybersecurity-Insiders

Beyond Compliance: CMMC 2.0 and the New Era of Cybersecurity for the Defense Industry

  • The release of the Cybersecurity Maturity Model Certification (CMMC) 2.0 marks a significant step in government cybersecurity requirements for the defense industry.
  • CMMC 2.0 establishes standardized cybersecurity standards for defense contractors based on the sensitivity of the information they handle, creating a more resilient defense industrial base.
  • Organizations should follow a three-step approach to navigate CMMC 2.0: assessment, roadmap development, and long-term sustainability of compliance.
  • CMMC 2.0 is not just about compliance, but about creating sustainable security practices and may serve as a model for other critical infrastructure industries.

Read Full Article

like

4 Likes

source image

Cybersecurity-Insiders

1M

read

156

img
dot

Image Credit: Cybersecurity-Insiders

The Hidden Threat of Legacy Systems: Lessons from a Massive Recent Data Breach

  • Legacy systems remain a hidden yet significant threat to cybersecurity.
  • A recent data breach involving DemandScience exposed sensitive data of over 122 million individuals.
  • The breach was traced back to a retired system that remained exposed for two years.
  • Addressing the risks of legacy systems requires inventory management, proactive strategies, and ongoing monitoring.

Read Full Article

like

9 Likes

source image

Securityaffairs

1M

read

286

img
dot

Image Credit: Securityaffairs

Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks

  • Overworked SOCs contributes to cybersecurity workforce burnout.
  • 70% of SOC analysts are burnt out which increase risk of missing genuine threats.
  • AI reduces the burden on SOC analysts so they can focus on strategic tasks and their well-being.
  • Alert overload and mundane work are factors contributing to SOC burnout.
  • AI can filter and prioritize alerts to increase effectiveness in identifying and responding to real threats.
  • AI also automates many of the mind-numbing SOC tasks, reducing the mental drain associated with repetitive work.
  • Natural language processing (NLP) is an overlooked AI capability that can provide enormous value to SOC analysts.
  • NLP can generate clear, concise summaries, or even draft emails based on security findings.
  • Some SOCs use NLP-powered chatbots to answer frequently asked questions or provide instant feedback.
  • AI provides the opportunities to improve the working lives of SOC analysts.

Read Full Article

like

17 Likes

source image

Cybersecurity-Insiders

1M

read

338

img
dot

Image Credit: Cybersecurity-Insiders

Ransomware attack on Deloitte and British Telecom

  • Deloitte UK has fallen victim to a significant cyberattack involving the Brian Cipher ransomware, compromising an estimated 1TB of sensitive data.
  • The attack highlights the trend of sophisticated threat actors exploiting vulnerabilities in corporate networks.
  • British Telecom has also been targeted by the Black Basta ransomware group, potentially leading to data theft and sale on the dark web.
  • Both companies are conducting investigations to determine the extent of the breaches and take necessary security measures.

Read Full Article

like

20 Likes

source image

Securityaffairs

1M

read

268

img
dot

Image Credit: Securityaffairs

Operation Destabilise dismantled Russian money laundering networks

  • The U.K. National Crime Agency (NCA) has disrupted Russian money laundering networks linked to organized crime across multiple countries in an operation called 'Operation Destabilise.'
  • The NCA identified two Russian-speaking networks, Smart and TGR, collaborating at the heart of the criminal enterprise.
  • As a result of Operation Destabilise, the U.S. Treasury's Office of Foreign Assets Control (OFAC) sanctioned five individuals and four entities tied to the TGR Group for aiding Russian elites in sanctions evasion.
  • The NCA efforts led to 84 arrests, prison sentences, and the seizure of £20 million in both cash and cryptocurrency.

Read Full Article

like

16 Likes

source image

Dev

1M

read

295

img
dot

Image Credit: Dev

OAuth2 Authorization Code Grant Type: A Deep Dive

  • OAuth2 Authorization Code Grant is a secure way to secure APIs and authorize client applications.
  • The key players in this grant type are the user, client application, and authorization server.
  • The step-by-step process involves authorization request, user authentication and consent, authorization code issuance, token exchange, and accessing the resource.
  • The grant type is secure due to the separation of user-facing and back-end interactions, preventing risks like credential interception and unauthorized access.

Read Full Article

like

17 Likes

source image

Socprime

1M

read

85

img
dot

Image Credit: Socprime

RevC2 and Venom Loader Detection: New Malware Strains Massively Deployed via MaaS in a Sophisticated Campaign

  • Security researchers have discovered two new malware strains called RevC2 and Venom Loader.
  • These malware strains have been distributed since the summer of 2024 using Venom Spider's Malware-as-a-Service (MaaS) platform.
  • RevC2 and Venom Loader can be detected and analyzed using SOC Prime Platform and Uncoder AI.
  • Organizations are advised to maintain cyber vigilance and utilize advanced threat detection solutions against these evolving threats.

Read Full Article

like

5 Likes

source image

Siliconangle

1M

read

17

img
dot

Image Credit: Siliconangle

Bitdefender enhances GravityZone XDR with new sensor for SaaS application security

  • Bitdefender enhances its GravityZone XDR platform with a new Business Applications sensor.
  • The sensor initially supports Atlassian Corp. cloud applications with plans to extend to other SaaS platforms.
  • Organizations using cloud-based productivity platforms are at increased risk of cyber attacks.
  • The Business Applications sensor allows organizations to monitor and analyze security events and enhance data protection.

Read Full Article

like

1 Like

source image

Tech Radar

1M

read

53

img
dot

Image Credit: Tech Radar

Zyxel, ProjectSend, CyberPanel vulnerabilities actively exploited, so patch now

  • Multiple vulnerabilities in Zyxel, North Grid Proself, ProjectSend, and CyberPanel are being actively exploited in the wild.
  • The US Cybersecurity and Infrastructure Security Agency (CISA) has added these flaws to its Known Exploited Vulnerabilities (KEV) list.
  • The most critical vulnerability is an incorrect default permissions flaw in CyberPanel, rated 10/10 in severity.
  • Chinese state-sponsored threat actors have been exploiting some of these vulnerabilities, including the XML External Entity (XEE) reference vulnerability in Proself.

Read Full Article

like

3 Likes

source image

Wired

1M

read

80

img
dot

Image Credit: Wired

She Escaped An Abusive Marriage—Now She Helps Women Battle Cyber Harassment

  • Nighat Dad grew up in a conservative family in Jhang, in Pakistan’s Punjab province.She established the Digital Rights Foundation, an NGO that aims to address the digital divide and fight online abuse of women and other gender minorities in Pakistan.In 2016 the DRF launched a cyber-harassment helpline.Since 2016, it has addressed more than 16,000 complaints from across the country.The DRF’s in-house legal team offers pro-bono advice and helps women file and follow up complaints against their abusers.Today, Dad and the DRF are helping to steer global conversations about tech policy reform.Dad recently joined the United Nations’ AI Advisory Board, and was a founder member of Meta’s Oversight Board.
  • Her family moved to Karachi so she could complete her bachelor’s degree, however, soon after she completed the course, she found out her parents had arranged a marriage for her.With her family’s backing, Dad left her husband and filed for divorce. But after years of domestic violence and abuse and with no experience of working, she struggled with a lack of confidence.
  • Before her marriage, Dad’s family never allowed her access to her cell phone, and when she finally got one, her husband would use it as a surveillance tool, keeping track of who she called and who was texting her.
  • Dad and her team launched a cyber-harassment helpline. Since 2016, it has addressed more than 16,000 complaints from across the country. “Sometimes, the police would give our phone numbers to victims seeking reliable help,” she says.Dad’s legal team helps women file and follow up complaints against their abusers.
  • The DRF’s legal team helped journalist Asma Shirazi win a landmark case in the Islamabad High Court against broadcaster ARY News, after she became the target of a coordinated troll campaign which was exacerbated by a false story aired on the channel.
  • Today, Dad and the DRF are helping to steer global conversations about tech policy reform. She recently joined the United Nations’ AI Advisory Board, and was a founder member of Meta’s Oversight Board.

Read Full Article

like

4 Likes

source image

Dev

1M

read

13

img
dot

Image Credit: Dev

Authentication and Authorization in Django: Django session

  • Django built-in session framework manages user data securely and efficiently.
  • Django users will be assigned a session ID that serves as a key for retrieving data stored on the server.
  • Django's middleware automates session management.
  • There are several options for saving session data, including database-backed, file-based, cache-backed, and signed cookie sessions.
  • Signed cookie sessions store session data directly on the client's browser rather than on the server side.
  • Django offers several settings to configure session behavior such as session expiration time and cookie security requirements.
  • To interact with sessions in Django views, use the request.session object, which behaves like a dictionary.
  • Avoid storing large amounts of data in sessions to prevent increasing server load and slow response times.
  • Periodically delete expired sessions and enable secure cookies, HttpOnly, and HTTPS settings to protect session data.
  • With proper configuration and secure practices, Django sessions can be leveraged to create efficient and personalized user experiences with robust security.

Read Full Article

like

Like

source image

Tech Radar

1M

read

13

img
dot

Image Credit: Tech Radar

BT Group says it was forced to take some servers offline following ransomware attack

  • BT Group confirms it was targeted by ransomware group Black Basta.
  • The Conferencing services division was affected and forced to shut down parts of its infrastructure.
  • BT claims limited damage was done, but Black Basta says they stole 500GB of sensitive data.
  • The group threatens to leak the data if ransom demands are not met.

Read Full Article

like

Like

For uninterrupted reading, download the app