menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Info. Security News News

Info. Security News News

source image

Krebsonsecurity

1d

read

102

img
dot

MasterCard DNS Error Went Unnoticed for Years

  • MasterCard recently corrected a glaring error in its domain name server settings that had persisted for nearly five years; a security researcher spent $300 to register the domain and prevent it from being grabbed by cybercriminals.
  • The misconfiguration occurred on one of MasterCard's core Internet servers that direct traffic for portions of the mastercard.com network, effectively allowing DNS traffic to be intercepted or diverted.
  • All of the Akamai DNS server names that MasterCard uses are supposed to end in “akam.net” but one of them was misconfigured to rely on the domain “akam.ne”.
  • Caturegli spent nearly three months waiting for the domain to be secured with the registry in Niger after discovering the misconfiguration which  had left MasterCard vulnerable to potential security breaches.
  • MasterCard acknowledged the mistake and said there was never any real threat to the security of its operations. 'We have looked into the matter and there was not a risk to our systems,” a spokesperson told reporters. “This typo has now been corrected',
  • Caturegli alerted MasterCard that the domain was theirs if they wanted it, rather than abusing his access, obtaining website encryption certificates or Windows authentication credentials.
  • Caturegli had hoped MasterCard would feature, or at least cover the cost to buy the domain. He believes that users are relying on public traffic forwarders or DNS resolvers like Cloudflare and Google.
  • The fundamentally cautionary tale: Don’t dismiss risk, and don’t let your marketing team handle security disclosures.
  • Registered previously by someone using the email address [email protected], the domain was left to expire in 2018
  • This is interesting as another typo domain was registered to [email protected] and hosted at the same ISP, Team Internet (AS61969)

Read Full Article

like

6 Likes

source image

Kaspersky

1d

read

144

img
dot

Image Credit: Kaspersky

CVE-2025-0411 – vulnerability in 7-Zip | Kaspersky official blog

  • A vulnerability (CVE-2025-0411) has been discovered in 7-Zip file archiver software allowing attackers to bypass the Mark-of-the-Web protection mechanism.
  • The vulnerability has a 7.0 CVSS rating and was quickly fixed, but users without automatic updates may still have a vulnerable version.
  • Attackers can exploit the vulnerability to launch malicious code with user privileges, making it a potential risk in complex attacks.
  • To stay safe, users are advised to update to version 24.09 or newer and handle files from the internet with caution.

Read Full Article

like

8 Likes

source image

Securityintelligence

1d

read

98

img
dot

Image Credit: Securityintelligence

2024 Cloud Threat Landscape Report: How does cloud security fail?

  • 40% of all data breaches involve data distributed across multiple cloud environments.
  • The need to maintain a strong security posture in the cloud is exceptionally challenging.
  • The X-Force Cloud Threat Landscape 2024 report analyses which specific rules are most commonly failing.
  • In 100% cloud environments, security rules often fail because of misconfiguring assets.
  • The most commonly failed rule in 100% Cloud-Only environments was configuring essential security and management settings in Linux systems.
  • For hybrid environments, the most commonly failed rule revolves around authentication and cryptography policies.
  • Organizations are turning to Ansible automation to confirm that all rules are correctly followed.
  • Multiple organizations are involved in the cloud environment, and security is a dual responsibility.

Read Full Article

like

5 Likes

source image

Schneier

1d

read

49

img
dot

AI Will Write Complex Laws

  • Artificial intelligence is already being used by legislators to write laws using generative AI.
  • There are projects currently underway in the US House, US Senate and around the world focused on the use of AI in legislative processes.
  • Demand for increasingly complex legislation is growing, which is leading legislators to rely on more external support to draft bills.
  • AI could be very useful for legislators in such a context since it can cover more topics simultaneously and work with a higher degree of complexity than humans.
  • Additionally, AI tools can be used throughout the entire legislative process, from drafting to summarizing bills and answering questions.
  • The use of AI tools in the legislative process could also make laws clearer and more consistent since AI can detect inconsistencies or ambiguous phrases.
  • However, oftentimes AI tools in the wrong hands can benefit certain constituencies rather than the broader population, just like human-written laws can be manipulated to benefit special interests.
  • While AI-written laws may come with certain risks and uncertainties, it’s likely to become more prevalent as legislators turn to it to help them keep pace with the increasing complexity of lawmaking.
  • AI will have an impact on the balance of power between legislative and executive branches of government, since the elimination of existing tools, such as the Chevron doctrine plan, induces the legislature to exert its control over delegation more robustly.
  • As for now, this use of AI in legislation will only grow. AI-made legislation is coming and it doesn’t require any changes in legislative procedure or agreement from any rules committee.

Read Full Article

like

2 Likes

source image

Securityaffairs

1d

read

306

img
dot

Image Credit: Securityaffairs

Cloudflare blocked a record-breaking 5.6 Tbps DDoS attack

  • Cloudflare announced blocking a record-breaking 5.6 Tbps DDoS attack.
  • The attack occurred on October 29 and lasted for 80 seconds.
  • The botnet behind the attack consisted of 13,000 IoT devices.
  • Cloudflare's detection and mitigation were fully automated.

Read Full Article

like

18 Likes

source image

Hackersking

1d

read

177

img
dot

Image Credit: Hackersking

How To Recover Instagram Hacked Account Complete Guide

  • Instagram has become a target for hackers, but recovering a hacked account is possible.
  • Step 1: Check for Login Issues - Try logging in, check email notifications, and use the login help option.
  • Step 2: Recover Your Account - Fill the recovery form on Instagram's official website.
  • Step 3: Secure Your Account Using the Instagram Support Team - Report the hacked account and follow instructions.
  • Step 4: Regain Access via Linked Accounts or Devices - Try logging in through Facebook or use saved login info.
  • Step 5: Recover Access Through Email and Phone - Check original email, use recovery options, and contact email provider if needed.
  • Step 6: Strengthen Your Account Security - Enable two-factor authentication, review account activity, update email and password, and remove suspicious third-party apps.
  • In conclusion, following this guide will help you recover your hacked Instagram account and enhance its security.

Read Full Article

like

10 Likes

source image

Securityaffairs

1d

read

291

img
dot

Image Credit: Securityaffairs

A 7-Zip bug allows to bypass the Mark of the Web (MotW) feature

  • A vulnerability in the 7-Zip file software allows attackers to bypass the Mark of the Web (MotW) Windows security feature.
  • The vulnerability, tracked as CVE-2025-0411, allows attackers to execute arbitrary code by extracting malicious files from nested archives or visiting a malicious page.
  • Mark of the Web (MotW) is a Windows security feature that identifies files downloaded from untrusted sources and restricts their execution.
  • The vulnerability was fixed in version 24.09 of 7-Zip, and users are advised to update to the latest version.

Read Full Article

like

17 Likes

source image

Hackersking

1d

read

245

img
dot

Image Credit: Hackersking

How to Turn Off Read Receipts on WhatsApp Group Chat

  • WhatsApp's read receipts, represented by blue ticks, inform senders when their messages have been read.
  • To turn off read receipts globally, go to WhatsApp Settings > Privacy > Turn off Read Receipts.
  • For group chats, you can use workarounds like reading messages in airplane mode or using notifications to maintain privacy.
  • Additional tips include muting group chats, disabling message previews, and limiting unnecessary interactions for privacy.

Read Full Article

like

14 Likes

source image

Silicon

1d

read

849

img
dot

Image Credit: Silicon

Worldwide IT Spending Set To Rise 9.8 Percent In 2025 – Gartner

  • Gartner predicts a 9.8 percent increase in global IT spending in 2025.
  • However, price increases are expected to absorb a significant portion of budget growth.
  • Segments like data center systems, devices, and software will experience double-digit growth, primarily due to generative AI hardware upgrades.
  • Gartner warns that expectations for generative AI are declining, but spending on this technology continues to rise.

Read Full Article

like

14 Likes

source image

Securityaffairs

1d

read

275

img
dot

Image Credit: Securityaffairs

Former CIA analyst pleaded guilty to leaking top-secret documents

  • Former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024.
  • Rahman stole and leaked Top-Secret documents on a U.S. ally's plans, which appeared on social media the next day.
  • He altered and shared Top-Secret information with unauthorized individuals from spring to November 2024.
  • Rahman pleaded guilty to two counts of willful retention and transmission of classified information and could face up to 10 years in prison.

Read Full Article

like

16 Likes

source image

Amazon

2d

read

190

img
dot

Image Credit: Amazon

Using OSCAL to express Canadian cybersecurity requirements as compliance-as-code

  • The Open Security Controls Assessment Language (OSCAL) allows security professionals to express control-related information in machine-readable formats.
  • Amazon Web Services (AWS) has collaborated with NIST and the FedRAMP program to advance the adoption of OSCAL in the United States.
  • In Canada, the Canadian Centre for Cyber Security (CCCS) has undertaken a project to encode relevant information in OSCAL to express cybersecurity requirements.
  • CCCS has created OSCAL profiles that assess the security of cloud services and has published OSCAL files on GitHub to support the Canadian security community.

Read Full Article

like

11 Likes

source image

Socprime

2d

read

39

img
dot

Image Credit: Socprime

CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution 

  • A critical zero-click OLE vulnerability in Microsoft Outlook, tracked as CVE-2025-21298, has been disclosed.
  • The vulnerability allows attackers to perform remote code execution on Windows devices through a specially crafted email.
  • CVE-2025-21298 has a severity rating of 9.8 and poses a significant email security risk.
  • Security professionals are advised to apply the patch immediately or use the provided workaround for mitigation.

Read Full Article

like

2 Likes

source image

Amazon

2d

read

328

img
dot

Image Credit: Amazon

Safeguard your generative AI workloads from prompt injections

  • Generative AI applications introduce new security challenges, including prompt injections and excessive agency. Developing a comprehensive threat model can help to identify potential vulnerabilities related to prompt injection, such as unauthorized data access.
  • AWS provides generative AI security strategies that can be used to create appropriate threat models to safeguard AI systems. This blog post provides an overview of prompt injection risks in generative AI and outlines defense mechanisms that can be implemented.
  • Prompt injections involve manipulating prompts to influence LLM outputs, with the intent to introduce biases or harmful outcomes. There are two main types of prompt injections: direct and indirect.
  • Defending against prompt injection involves a multi-layered approach, including content moderation, secure prompt engineering, access control, and ongoing monitoring and testing. AWS provides tools, such as Guardrails, user and content moderation, and input validation.
  • Prompt engineering, the practice of carefully crafting the instructions and context provided to an LLM, plays a crucial role in maintaining control over the model’s behavior and mitigating risks. Developers can use prompt templates as an effective technique to mitigate prompt injection risks.
  • Access control and establishing trust boundaries are essential components of a comprehensive security strategy for generative AI applications. Monitoring and logging are crucial for detecting and responding to potential prompt injection attempts.
  • You can use AWS CloudTrail to monitor for potential prompt injection attempts and AWS CloudWatch to set up dashboards and alarms, providing real-time visibility into the application’s behavior and performance.
  • To protect generative AI applications from prompt injections, a defense-in-depth strategy that combines technical controls, system design, and ongoing vigilance can be adopted by organizations.
  • By adopting a proactive, layered security approach, organizations can confidently realize the potential of generative AI while maintaining user trust and protecting sensitive information.
  • AWS Identity and Access Management (IAM), Amazon Cognito, AWS WAF, and Amazon Bedrock are some of the AWS services that can be used to develop a comprehensive security strategy for generative AI applications.

Read Full Article

like

19 Likes

source image

Securityintelligence

2d

read

23

img
dot

Image Credit: Securityintelligence

Why maintaining data cleanliness is essential to cybersecurity

  • Data cleanliness or hygiene, involves ensuring all organizational data is accurate, complete, follows predefined rules or standards, maintains data uniformity and more. To achieve this, automated systems, that leverage data profiling and cleansing processes are used. It is essential to ensuring both operational efficiency and resiliency and security as well. Highly regulated industries are more inclined to investing in data security investments to assist with their compliance efforts. Without accurate and reliable compliance reporting data, businesses open themselves up to significant compliance violations and associated financial penalties.
  • The importance of data cleanliness goes beyond helping to support smoother business operations. It is a core element of ensuring a strong cybersecurity posture. Cybersecurity threats, compliance failures and confidentiality breaches, are a few of the security risks that can occur if good data hygiene is neglected over time. Data classifiers need to be aware of where sensitive data resides in order to prevent breaches and detect cyberattacks.
  • Data cleansing requires an ongoing commitment and the ability to integrate data quality practices into every stage of the data lifecycle. From initial data collection and entry to storage, processing and analysis, proactive data maintenance steps need to be followed in order to keep data healthy and make the most out of the asset.

Read Full Article

like

1 Like

source image

Securityaffairs

2d

read

199

img
dot

Image Credit: Securityaffairs

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

  • Researchers have discovered a new Mirai botnet variant called Murdoc Botnet which targets vulnerabilities in AVTECH IP cameras and Huawei HG532 routers.
  • The botnet has been active since at least July 2024, with over 1300 IPs found active in the campaign, mainly in Malaysia, Thailand, Mexico, and Indonesia.
  • The botnet uses existing exploits to download next-stage payloads and specifically targets IoT devices through command-line injection and shell scripts.
  • Other recent Mirai-based botnets, such as Gayfemboy, have also been observed exploiting vulnerabilities in various devices.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app