menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Infoblox

1M

read

346

img
dot

Image Credit: Infoblox

Blue Helix: Agentic OSINT Researcher

  • As digital threats accelerate, human analysts struggle to synthesize intelligence efficiently, leading to the need for advanced methods like Blue Helix, an agentic OSINT platform.
  • Blue Helix aims to automate collection and synthesis of threat intelligence using AI tools like OpenAI's Agents SDK, Playwright browser orchestration, large language models, OCR, and a genetic algorithm.
  • It operates with a multi-agent system that switches between exploration and exploitation modes to optimize search effectiveness and discover valuable indicators of compromise.
  • The platform balances between exploring new information spaces and refining known pathways by employing Goal-Based Generation (exploration) and Genetic Algorithm (exploitation) modes.
  • Blue Helix's Genetic Algorithm refines search terms by evaluating fitness scores, determining high-performing terms through tournament selection, and creating new queries through crossover and mutation operations.
  • The system leverages AutoBrowser for web navigation, PDF handling, and OCR capabilities to extract high-value information and IOCs from various sources.
  • Blue Helix employs a dual-mode operational framework and automated processes to streamline OSINT collection and report generation while ensuring goal alignment and data relevance.
  • Operationalizing the system involves utilizing Model Context Protocol connections for seamless integration with internal databases, enabling rapid value extraction and feedback mechanisms.
  • The platform demonstrates how agentic concepts can enhance cybersecurity efforts by automating repetitive tasks and guiding relevant data through the pipeline efficiently.
  • Blue Helix's innovative approach emphasizes the need for a balance between human expertise and machine intelligence in addressing the evolving landscape of cyber threats.
  • Overall, the platform showcases a significant advancement in OSINT collection by leveraging AI-driven tools within a structured environment, paving the way for more adaptive and effective threat intelligence research.

Read Full Article

like

20 Likes

source image

The Register

1M

read

424

img
dot

Image Credit: The Register

Microsoft patches the patch that put Windows 11 in a coma

  • Microsoft is patching another update that caused some Windows 11 PCs to enter recovery mode with an unhelpful error code.
  • The issue affected Windows 11 23H2 and 22H2 systems, primarily impacting virtual machines by displaying a boot error message with error code 0xc0000098.
  • Although the fix, KB5062170, addresses the error, it still retains the Noto fonts issue affecting CJK characters in Chromium browsers when scaled at 100 percent.
  • Microsoft faces out-of-band fixes for various issues like the recent Windows 11 update problem, highlighting the need for better quality control despite addressing the problems efficiently.

Read Full Article

like

25 Likes

source image

TechBullion

1M

read

343

img
dot

Image Credit: TechBullion

DataGuard Collaborates with QBS Software

  • DataGuard has partnered with QBS Software, enhancing their presence in the UK, Ireland, and the Nordics, to help organizations manage risks and comply with key frameworks.
  • Through the collaboration, DataGuard aims to provide security and compliance solutions globally. They have also partnered with CIPS Informatica to offer advanced security and compliance tools to Italian businesses.
  • DataGuard, a trusted vendor, offers an all-in-one platform for managing security risks and ensuring compliance with various industry frameworks.
  • QBS Software is the world's largest enterprise software delivery platform, specializing in long-tail software procurement, and has recently acquired Prianto to strengthen its presence in EMEA.

Read Full Article

like

20 Likes

source image

Tech Radar

1M

read

49

img
dot

Image Credit: Tech Radar

The North Face says customer data stolen in cyberattack

  • The North Face confirmed a data breach where hackers ran a credential stuffing attack on its website and breached customer accounts.
  • Sensitive customer information like names, addresses, and phone numbers was stolen during the cyberattack.
  • Payment information including credit card details was not compromised as it was not stored on the servers.
  • The stolen information could potentially be used for identity theft and phishing scams, although payment data was not at risk due to the breach.

Read Full Article

like

2 Likes

source image

TechCrunch

1M

read

288

img
dot

Image Credit: TechCrunch

Health giant Kettering still facing disruption weeks after ransomware attack

  • Kettering Health in Ohio is still recovering from a ransomware attack, causing significant disruption in its operations for the past two weeks.
  • Core components of the electronic health record system have been restored, allowing for updates and access to records, but issues with phone lines and services persist.
  • Patients are facing challenges such as difficulty in refilling medications, closed emergency rooms, and delays in care due to manual record-keeping processes.
  • The ransomware gang called Interlock is believed to be behind the attack, with hackers potentially trying to negotiate a ransom payment, making Kettering Health the latest in a series of healthcare companies targeted by cyberattacks.

Read Full Article

like

17 Likes

source image

Dev

1M

read

423

img
dot

Image Credit: Dev

Building Secure C# Applications: A Comprehensive Guide

  • Building secure C# applications is crucial in today's era of cybersecurity threats.
  • Understanding authentication, authorization, data encryption, and best practices is essential.
  • Secure authentication is the first defense line, and ASP.NET Identity simplifies this process in C#.
  • Authorization in C# applications involves controlling user access via roles and policies.
  • Data encryption with AES in C# ensures secure transmission and storage of sensitive information.
  • Key practices include using parameterized queries, input validation, HTTPS enforcement, logging, and monitoring.
  • Common pitfalls to avoid include hardcoding secrets, neglecting SSL/TLS validation, and ignoring exception handling.
  • Continuous learning and exploring advanced security features are crucial in building resilient C# applications.
  • Implementing OWASP Top 10 practices and automation tools for vulnerability scanning are recommended next steps.
  • By following these guidelines, developers can enhance the security and reliability of their C# applications.

Read Full Article

like

25 Likes

source image

Socprime

1M

read

342

img
dot

Image Credit: Socprime

CyberLock, Lucky_Gh0$t, and Numero Detection: Hackers Weaponize Fake AI Tool Installers in Ransomware and Malware Attacks

  • Hackers are using fake AI tool installers to spread ransomware and malware, including CyberLock, Lucky_Gh0$t, and Numero.
  • Adversaries exploit AI technology to compromise business assets, emphasizing the need for stronger cybersecurity measures.
  • Defenders can use tools like SOC Prime Platform and Uncoder AI to enhance detection and defense against AI-driven attacks.
  • Cisco Talos researchers uncovered these threats, highlighting risks posed by fake AI software like OpenAI ChatGPT and InVideo.
  • CyberLock encrypts files, Lucky_Gh0$t is a variant of Yashma ransomware, and Numero disrupts victims' Windows systems.
  • CyberLock ransomware disguises itself as AI software, Lucky_Gh0$t is distributed as a premium ChatGPT version, and Numero poses as InVideo AI.
  • Security experts advise verifying software sources and avoiding downloads from unknown vendors to reduce infection risks.
  • By utilizing SOC Prime Platform and ethical AI practices, organizations can bolster their cybersecurity defenses against evolving threats.
  • It is crucial to stay vigilant against the intersection of AI advancement and cyber threats to safeguard systems and data effectively.
  • Implementing proactive defense strategies and leveraging trusted security technologies are vital in combating the ever-expanding attack landscape.

Read Full Article

like

20 Likes

source image

Kraken

1M

read

441

img
dot

Image Credit: Kraken

Kraken completes SOC 2 Type 2 compliance report, underscoring commitment to institutional security

  • Kraken's institutional-grade qualified custody offering has successfully completed the SOC 2 Type 2 compliance examination, highlighting the commitment to protecting institutional client assets and data.
  • SOC 2 Type 2 is an internationally recognized framework focusing on trust service principles like security, availability, processing integrity, confidentiality, and privacy.
  • The completion of SOC 2 Type 2 examination reflects Kraken's rigorous security controls design, consistent execution, and ongoing commitment to enhancing internal processes and infrastructure to meet industry standards.
  • This achievement enhances asset protection, promotes trust through transparency, and demonstrates Kraken's commitment to excellence in security practices and infrastructure, with continuous efforts to further strengthen their overall security-first approach.

Read Full Article

like

26 Likes

source image

Arstechnica

1M

read

135

img
dot

Image Credit: Arstechnica

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers

  • Meta and Yandex have been found de-anonymizing Android users' web browsing identifiers by using tracking code embedded into websites.
  • This tracking method involves Chrome and other browsers sending unique identifiers to native apps on devices, allowing Meta and Yandex to convert web identifiers into persistent mobile app user identities.
  • The covert tracking through Meta Pixel and Yandex Metrica trackers bypasses security and privacy protections of the Android operating system and browsers.
  • The de-anonymization violates security principles like sandboxing, enabling interaction between mobile and web contexts, possibly compromising user privacy.

Read Full Article

like

8 Likes

source image

Siliconangle

1M

read

252

img
dot

Image Credit: Siliconangle

Zero Networks raises $55 million to expand microsegmentation and zero-trust solutions

  • Israeli cybersecurity startup Zero Networks Ltd. raises $55 million in funding to expand microsegmentation and zero-trust solutions.
  • Zero Networks offers automated, agentless microsegmentation solutions to prevent lateral movement and ransomware attacks without manual configurations.
  • The company's platform simplifies zero-trust security by dynamically learning network behavior and enforcing least-privilege access controls.
  • Zero Networks expands its customer base, triples revenue, and raises a total of over $100 million, with Series C led by Highland Europe Ltd.

Read Full Article

like

15 Likes

source image

Medium

1M

read

396

img
dot

Image Credit: Medium

A Peek Into Nova Scotia, Canada’s Cyberspace & The Dangers In Our Digital Lives

  • Recent cyberattacks in Nova Scotia, Canada have exposed the vulnerabilities of individuals' personal information in the digital realm.
  • Nova Scotia Power fell victim to a ransomware attack, compromising over 140,000 Social Insurance Numbers and affecting a quarter of a million people.
  • The PowerSchool breach impacted approximately 35,000 students and 3,200 employees, with stolen data including personal details and encrypted passwords.
  • The MOVEit breach exposed records of teachers, students, and pension plan recipients in Nova Scotia, highlighting widespread vulnerabilities.
  • Individuals affected by these breaches face challenges in safeguarding their identities, leading to financial hardships and emotional distress.
  • The growing trend of cyberattacks targeting various sectors necessitates organizations to prioritize information security and proactive measures.
  • To protect personal information, individuals are advised to monitor accounts, use strong passwords, enable two-factor authentication, avoid phishing attempts, and stay informed about cybersecurity threats.
  • As technology integrates into daily life, the importance of cybersecurity is crucial to mitigate risks in the digital age and protect against evolving cyber threats.
  • The breaches in Nova Scotia serve as reminders of the digital world's vulnerabilities, emphasizing the need for vigilance and awareness to safeguard personal data.
  • Staying informed, vigilant, and proactive can help individuals and communities navigate the digital landscape and protect against potential cyber threats.

Read Full Article

like

23 Likes

source image

Tech Radar

1M

read

342

img
dot

Image Credit: Tech Radar

Cartier reveals data breach, personal customer information at risk

  • French luxury brand Cartier experienced a data breach, exposing names, emails, and countries of origin of customers.
  • Fortunately, passwords and payment data were not compromised in the breach.
  • While the incident is contained, Cartier advises customers to remain vigilant for potential phishing attacks.
  • The company has notified the police, hired security experts, and enhanced system protection to prevent future breaches.

Read Full Article

like

20 Likes

source image

TechBullion

1M

read

139

img
dot

Image Credit: TechBullion

Cybersecurity as Core Strategy: Kevin Thomas on Why Tomorrow’s Leaders Must Think Like Defenders

  • Cybersecurity is becoming a fundamental skill for professionals across all industries.
  • Tomorrow's leaders need to understand and prioritize cybersecurity as threats become more intelligent and targeted.
  • Cyber literacy is essential, with cybersecurity skills being crucial for all departments beyond just IT.
  • In the future, cybersecurity must be culturally embedded in organizations and everyday decision-making.

Read Full Article

like

8 Likes

source image

TechDigest

1M

read

405

img
dot

Image Credit: TechDigest

Cartier and North Face become latest retailers hit by cyber attacks

  • Cartier and The North Face have confirmed customer data breaches following separate cyber attacks.
  • The North Face detected a 'small-scale' attack in April, while Cartier reported an 'unauthorized party' gaining temporary access to their system.
  • Both companies had customer names and email addresses stolen, but no financial information was compromised.
  • The cyber attacks on these retailers highlight an increasingly threatening landscape for the retail sector, with a growing number of high-profile breaches taking place.

Read Full Article

like

24 Likes

source image

Medium

1M

read

729

img
dot

Image Credit: Medium

You’re Handing Out Your Data Like Cheap Candy — Web3 Can Stop It

  • Several recent data breaches, including those of Marks & Spencer, Co-op, and Coinbase, have exposed sensitive user information and resulted in significant losses.
  • Centralized servers in Web2 are vulnerable to cyberattacks, with hackers exploiting social engineering and insider leaks to access personal data.
  • Web3 offers a solution with decentralized storage options like IPFS, Filecoin, and Ceramic, which can mitigate breaches by keeping data encrypted and in users' control.
  • Web3 promotes a user-first approach, empowering individuals to take control of their data and shift from being passive inventory to active owners in the digital realm.

Read Full Article

like

8 Likes

For uninterrupted reading, download the app