menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Socprime

1M

read

443

img
dot

Image Credit: Socprime

OpenSearch: How to Update index-pattern in “Broken” Visualization

  • If index-pattern was recreated and its id hasn’t been customized to the same as it was before, you’ll get an error in all related visualizations.
  • To fix this issue, you can update the index-pattern_id in the visualization JSON configuration.
  • For individual visualizations, go to Dashboards Management -> Saved objects and update the id field.
  • For multiple visualizations in a dashboard, export the dashboard, update the index-pattern_id in the exported JSON file, and import it back.

Read Full Article

like

26 Likes

source image

Securityaffairs

1M

read

192

img
dot

Image Credit: Securityaffairs

Russia-linked APT Secret Blizzard spotted using infrastructure of other threat actors

  • Russia-linked APT group Secret Blizzard has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.
  • The Secret Blizzard threat actor compromises the infrastructure of the Pakistan-based threat actor Storm-0156 to conduct cyber espionage campaigns in South Asia.
  • Researchers confirmed that Secret Blizzard deploys backdoors, clipboard monitors, and other espionage tools using Storm-0156 infrastructure.
  • Secret Blizzard targets Afghan government entities and accesses exfiltrated data from Indian military and defense institutions.

Read Full Article

like

11 Likes

source image

The Register

1M

read

389

img
dot

Image Credit: The Register

Shape the future of UK cyber security

  • The UK Cyber Team Competition aims to find and nurture top cyber talent across the UK.
  • Approximately 44% of UK businesses have a basic skills gap in cyber security.
  • Companies are invited to sponsor the competition in various ways and contribute to industry growth.
  • Supporting this initiative can attract top talent and strengthen the UK's cyber security infrastructure.

Read Full Article

like

23 Likes

source image

Softwaretestingnews

1M

read

250

img
dot

78% of business schools have integrated AI into the curriculum

  • 78% of business schools have integrated artificial intelligence (AI) into the curriculum or learning experience.
  • The most popular way of integrating AI in business schools is exploring AI in society and business ethics (44%), followed by using AI in decision-making courses (43%) and incorporating practical applications of AI into the classroom (42%).
  • Regionally, programs in Asia were more likely to embrace AI in the application process, while programs in Europe were more likely to prohibit it. However, in terms of curricula, programs in Canada, Asia-Pacific, and Europe integrated AI more than programs in the United States.
  • While a high number of business schools have implemented AI into the curriculum, the adoption of AI in the admissions process is less common. Only 5% of schools embrace AI in admissions, 8% prohibit its use, and 21% have a case-by-case approach.

Read Full Article

like

15 Likes

source image

Silicon

1M

read

282

img
dot

Image Credit: Silicon

Silicon UK AI For Your Business Podcast: How AI is Transforming Business and Society

  • Join Jason Bradbury, futurist and tech icon, on Silicon AI For Your Business as we explore AI’s transformation from sci-fi to reality.
  • We discuss how AI is helping businesses innovate, enhance human potential, and reshape industries.
  • Topics include virtual personas, work-life balance in a virtual age, and the possibility of an AI singularity.
  • This podcast explores the future of AI and its impact on businesses.

Read Full Article

like

16 Likes

source image

Semiengineering

1M

read

152

img
dot

Image Credit: Semiengineering

Enhancing Compute Security Architecture For New-Age Applications

  • New-age AI-powered applications require enhanced compute security architecture.
  • Challenges include achieving high performance, cost-effectiveness, and robust security measures.
  • Optimizations such as GPUDirect RDMA, Unified Memory, and Computational Storage are crucial for AI workload handling hardware.
  • Enhancing confidential computing architecture involves extending Trusted Execution Environment (TEE) for AI accelerators.

Read Full Article

like

9 Likes

source image

Nordicapis

1M

read

120

img
dot

Image Credit: Nordicapis

What Is Decentralized Identity?

  • Decentralized identity gives users control over their digital identity.
  • It allows users to store verifiable credentials issued by trusted organizations.
  • Decentralized identity management removes the need for third-party verification.
  • It also simplifies and improves user experience and data portability.
  • Decentralized digital identity benefits various industries such as healthcare, banking, and travel.
  • It ensures data privacy and security in complex API systems and microservices.
  • Use cases for decentralized digital identity include international shipments, payments, and voting.
  • Digital creators and businesses alike can benefit from adopting decentralized digital identities.
  • Data privacy and security will become increasingly crucial as lives move online.
  • Decentralized identity enables secure access to digital identities and verified credentials.

Read Full Article

like

7 Likes

source image

Securityaffairs

1M

read

403

img
dot

Image Credit: Securityaffairs

China-linked APT Salt Typhoon has breached telcos in dozens of countries

  • APT group Salt Typhoon, linked to China, has infiltrated telecommunications companies in dozens of countries with at least eight US firms compromised, according to a senior White House official. The group has been active for one to two years and has hacked telecommunications providers in several dozen countries. The White House has said it wants to mandate minimum cybersecurity practices for telecoms. The Commerce Department’s tech security office is also preparing measures to address risks from IT and communications transactions linked to China.
  • Australia, Canada, New Zealand and the US have issued a guide advising on best practices to strengthen network security, following warnings linked to PRC-linked cyber espionage targeting telecoms. The guidelines cover scrutiny of network device configurations, advanced monitoring solutions, and restricting internet exposure of management traffic.
  • The US experts detected that Chinese cyber espionage hackers had stolen information from people who were primarily involved in government or political activity, regarding the breach of private communications. Experts’ suspect state-sponsored hackers gathered extensive internet traffic during the intrusion.
  • Data from AT&T, Verizon, and Lumen Technologies that was the target of a Salt Typhoon breach, which occurred in September, may have been accessed. T-Mobile was also recently targeted.
  • The Biden administration’s priority is to safeguard tech and telecom infrastructure from Chinese-linked cyber espionage operations to protect US national security.
  • Experts believe that security breaches like this could enable disruptive attacks during potential future conflicts.
  • The investigation continues into the breaches of US broadband providers, assessing its scope and whether threat actors compromised Cisco routers.
  • Telecoms must adopt secure password storage, phishing-resistant MFA, session token limits, and Role-Based Access Control (RBAC) to reduce vulnerabilities, disrupt intrusion attempts, and strengthen network defenses.
  • The US government and law enforcement will continue investigating a large-scale cyber-espionage campaign by Chinese-linked threat actors targeting US telecoms; stolen data was subject to US law enforcement requests pursuant to court orders.
  • Security breaches such as this are part of China’s broader strategy, which puts US officials increasingly on edge about Chinese cyber efforts to infiltrate critical infrastructure.

Read Full Article

like

24 Likes

source image

Cybersecurity-Insiders

1M

read

1.9k

img
dot

Image Credit: Cybersecurity-Insiders

FBI asks users to stop exchanging texts between Android and iPhones

  • The FBI has warned smartphone users against exchanging regular text messages between Android and iPhone devices due to vulnerabilities that can be exploited by hackers or third parties.
  • The warning comes in the wake of concerns about a cyber espionage campaign allegedly conducted by a Chinese hacking group known as "Salt Typhoon".
  • The group has been targeting US telecom networks, stealing data such as metadata and information on recipients.
  • To enhance security, the FBI advises users to switch to encrypted messaging apps like WhatsApp.

Read Full Article

like

11 Likes

source image

Siliconangle

1M

read

898

img
dot

Image Credit: Siliconangle

Threat detection startup Tuskira launches with $28.5M from investors including Intel

  • Threat detection startup Tuskira has launched with $28.5 million in funding.
  • Tuskira offers an AI-powered unified threat defense platform that integrates security tools.
  • The platform focuses on proactive strategies to address vulnerabilities and delivers holistic defense.
  • The funding round was led by Intel Capital Corp. and SYN Ventures Management.

Read Full Article

like

23 Likes

source image

Medium

1M

read

161

img
dot

Image Credit: Medium

Confidential Layer: The Future of Privacy in a Transparent World

  • Blockchain's Achilles' heel is its inability to offer privacy, and that's even more of a concern in light of the EU's General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).
  • The Confidential Layer is a means of integrating cryptographic techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption into blockchain architecture.
  • This enables users to validate transactions and add them to the blockchain without revealing their own personal information.
  • The Confidential Layer has potential use cases in four main arenas: decentralized finance (DeFi), supply chain management, health care, and enterprise blockchain solutions.
  • In DeFi, a Confidential Layer would provide fully private transactions and confidential lending, borrowing, and trading capabilities.
  • For health care professionals, a Confidential Layer offers a secure, decentralized record system while maintaining patient confidentiality.
  • For supply-chain applications, a Confidential Layer can keep unwarranted competitors at bay with encrypted information, and for enterprise blockchain, it offers privacy and transparency.
  • Ensuring privacy is met while maintaining speed and scalability is a challenge to the Confidential Layer, as are global anti-money laundering laws.
  • Despite the challenges, Confidential Layers have the potential to unlock the true power of blockchain technology with their use in critical areas like finance, health care, and government.
  • The Confidential Layer is seen as a critical step toward building a more secure, private, and trustworthy digital future.

Read Full Article

like

9 Likes

source image

Cybersecurity-Insiders

1M

read

4

img
dot

Image Credit: Cybersecurity-Insiders

Radiant Logic Unveils Real-Time Identity Data Lake for Enhanced Identity Security Posture Management

  • Radiant Logic has introduced Identity Observability, a Real-Time Data Lake for identity data, to enhance Identity Security Posture Management (ISPM).
  • The Real-Time Data Lake provides continuous visibility into identity ecosystems, enabling precise risk assessment and actionable decision-making.
  • This technology addresses challenges faced by organizations dealing with identity sprawl and outdated infrastructures.
  • Radiant Logic's Identity Observability aligns with Gartner's recommendations on IAM hygiene for robust identity-first security.

Read Full Article

like

Like

source image

Pymnts

1M

read

44

img
dot

Image Credit: Pymnts

Ongoing Salt Typhoon Hacking Campaign Targets Americans’ Call Record Metadata

  • Chinese hacking group Salt Typhoon has targeted Americans' call record metadata.
  • The hackers have attacked dozens of companies globally, including at least eight in the U.S.
  • They are specifically targeting individuals of interest to the Chinese government.
  • Call record metadata includes details about who a call was placed to, duration, and location.

Read Full Article

like

2 Likes

source image

Pymnts

1M

read

4

img
dot

Image Credit: Pymnts

SentinelOne’s Purple AI Security Suite Doubles Reach as Cyberthreats Grow

  • SentinelOne’s artificial intelligence (AI)-powered Purple security suite has doubled its market reach, now protecting twice as many devices compared to last quarter.
  • The company announced a multiyear agreement with Lenovo to bundle SentinelOne’s platform and Purple AI with new enterprise PC shipments.
  • SentinelOne expanded its Amazon Web Services partnership, allowing AWS customers to run Purple AI on Amazon Bedrock.
  • The company also introduced AI Security Posture Management (AI SPM) to protect organizations using generative AI services.

Read Full Article

like

Like

source image

VentureBeat

1M

read

174

img
dot

Image Credit: VentureBeat

How Microsoft defends against 7000 password attackers per second

  • Microsoft’s Secure Future Initiative is about transforming cybersecurity and making security a responsibility for everyone at Microsoft, not just a specialized team.
  • Championing inclusivity and productivity, Microsoft is leveraging gen AI to streamline all aspects of cybersecurity, from exposure management to security operations center performance.
  • Microsoft Security has seen success with Security Copilot and Purview to boost efficiency of tasks such as analyzing incidents and automating reports.
  • Defenders feel empowered through Microsoft’s use of generative AI as it acts as a game changer that simplifies tasks for all skill levels to support more people entering the cybersecurity industry.
  • Exposure management and graph-based capabilities are high on Microsoft’s agenda to help defenders see their digital estate in the same way an attacker would.
  • Microsoft is bridging the gap between detection, prevention and response with a unified Security Operations Center that allows for a smooth transition from one step to the other.
  • Cybersecurity thrives on diverse perspectives, and Microsoft Security is working hard to make advanced capabilities available to everyone.
  • Microsoft Security aims to create a resilient, inclusive future by making cybersecurity accessible for everyone and empowering defenders to build a safer digital world.
  • Microsoft CEO Satya Nadella emphasizes the critical role security plays in the future of Microsoft, stating that it underpins every layer of the tech stack and is a core priority for all employees.
  • Research indicates that the number of password attacks has increased from 567 to 7,000 in just three years, emphasizing the importance of cybersecurity being everyone’s responsibility.

Read Full Article

like

10 Likes

For uninterrupted reading, download the app