menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Info. Security News News

Info. Security News News

source image

Hackingblogs

3d

read

333

img
dot

Image Credit: Hackingblogs

Stop Torrenting Until You Do This — Your IP Might Be Exposed! (Only for Legal Use)

  • Torrenting without a VPN exposes your true IP address, making you vulnerable to monitoring and copyright trolls.
  • Binding your torrent client to a VPN connection can protect your privacy and ensure your real IP is not exposed.
  • Torrenting involves using P2P networks to download and share files, which can compromise your privacy if your IP address is visible.
  • Governments and ISPs employ IP blacklists to monitor and block torrent traffic, making VPNs essential for secure torrenting.
  • To bind a torrent client to a VPN like Mullvad, steps include connecting to Mullvad VPN and configuring settings for secure torrenting.
  • Mullvad VPN offers options for platforms, tunnel protocols, exit locations, and specific settings for secure torrenting.
  • Configuring Mullvad VPN involves unzipping config files, checking contents, making DNS helper executable, and confirming permissions.
  • Using a VPN creates a virtual network interface like tun0, allowing you to route traffic through a secure encrypted tunnel.
  • To test the VPN, you can check the IP address displayed to verify that traffic is being tunneled securely through the VPN.
  • Setting up qBittorrent to use the VPN interface ensures all downloads and uploads go through the secure VPN connection.

Read Full Article

like

20 Likes

source image

Securityaffairs

3d

read

280

img
dot

Image Credit: Securityaffairs

Chinese Android phones shipped with malware-laced WhatsApp, Telegram apps

  • Cheap Chinese Android phones are being shipped with trojanized WhatsApp and Telegram clones designed to steal cryptocurrencies through address swapping.
  • The campaign targets low-end phones resembling well-known models and embeds malware in pre-installed apps.
  • Attackers spoof device specifications to make phones appear as Android 14 with better hardware, fooling users and apps.
  • The malware, dubbed Shibai, uses hidden modules to hijack updates, replace crypto wallet addresses, and exfiltrate chat data.

Read Full Article

like

16 Likes

source image

Cybersecurity-Insiders

3d

read

338

img
dot

What to Know about Compliance with India’s Emerging Digital Personal Data Protection Act

  • The Digital Personal Data Protection (DPDP) Act is India’s regulation to address concerns over data privacy and security.
  • Key highlights of the DPDP Act include data fiduciary responsibilities, explicit consent, access and erasure rights, data transfer regulations, and strict penalties for non-compliance.
  • The DPDP Act has similarities with the EU's General Data Protection Regulation (GDPR) but also has differences that reflect regional approaches to data protection.
  • Compliance with the DPDP Act is crucial to avoid reputational damage, legal penalties, and loss of consumer trust, and to gain a competitive advantage.

Read Full Article

like

20 Likes

source image

Securityaffairs

4d

read

237

img
dot

Image Credit: Securityaffairs

Cyber Threats Against Energy Sector Surge as Global Tensions Mount

  • Rising cyberattacks on the energy sector, linked to large-scale campaigns targeting national infrastructure for geopolitical aims, have been identified.
  • Cybersecurity experts warn about the increase in targeted cyberattacks against enterprises in the energy sector worldwide.
  • The vulnerability of American power grids to cyberattacks is a growing concern, as the number of susceptible points in electrical networks continues to increase.
  • Technological advancements, such as cloud adoption and AI integration, have further increased cyber-risk scenarios for the energy sector.

Read Full Article

like

14 Likes

source image

Krebsonsecurity

4d

read

266

img
dot

Funding Expires for Key Cyber Vulnerability Database

  • The funding for the Common Vulnerabilities and Exposures (CVE) program, a critical resource for cybersecurity professionals, is set to expire on April 16.
  • The CVE program is responsible for identifying and tracking security vulnerabilities in software and hardware.
  • The program assigns unique CVE numbers to reported vulnerabilities and centralizes the information for organizations to patch the security holes.
  • Without funding, the CVE program could lead to a deterioration of vulnerability databases and advisories, impacting incident response operations and critical infrastructure.

Read Full Article

like

16 Likes

source image

Kaspersky

4d

read

219

img
dot

Image Credit: Kaspersky

CISO priorities in 2025 | Kaspersky official blog

  • In 2025, CISO priorities include cost optimization, such as consolidating and rationalizing infosec tools to reduce excessive expenditure and increase productivity.
  • Companies are advised to consolidate their tech stack under a single-vendor approach or select the best tool in each category, ensuring API integration capabilities.
  • Stack consolidation often involves automation, leading to cost savings and improved security, with companies achieving average savings of 16% and analyst time savings of 20%.
  • Automation projects in infosec processes, including selective incident response automation and risk assessment, help save analyst time and mitigate talent shortage.
  • Generative AI tools are being prioritized by many companies for future competitiveness, while establishing standards and training programs is crucial to manage associated risks.
  • Implementing open-source AI solutions can reduce operational costs and enhance data protection, though the availability of suitable models is case-dependent.
  • Meaningful infosec metrics simplify justifying infosec budgets to the board of directors, focusing on risk reduction, organizational readiness for attacks, and effectiveness of measures.
  • Prioritizing identity management, including multi-factor authentication and passkey-based solutions, can significantly reduce the risk of compromise through credential theft.
  • Centralized management of machine identities and secrets, along with strategic implementation of tools, helps in enhancing security in cloud environments.
  • Effective cost management in security operations centers (SOCs), such as through hierarchical data storage and distributed processing infrastructure, can lead to significant savings.

Read Full Article

like

13 Likes

source image

Amazon

4d

read

320

img
dot

Image Credit: Amazon

How to support OpenID AuthZEN requests with Amazon Verified Permissions

  • The OpenID Foundation's AuthZEN Working Group is drafting a new specification and associated standard mechanisms for communicating authorization-related information.
  • Modern application designs decouple authorization capabilities from application code to enable consistent enforcement and dynamic updates.
  • Fine-grained permissions are derived from subject role assignments, attribute values, relationships between subjects and resources, and a hybrid model.
  • Expressing access control rules in policies leads to policy-based access control (PBAC).
  • Components like PDP, PEP, and PIP work together in an access control system.
  • Verified Permissions integrates as a managed service combining the roles of PDP, policy store, and PAP.
  • The AuthZEN interface for Verified Permissions enables interoperability and standardization in authorization patterns on AWS.
  • The deployment process involves creating a policy store, deploying the AuthZEN interface, and testing the interoperability.
  • The AuthZEN interface aims to provide industry-standard authorization practices while leveraging the benefits of AWS's managed service.
  • Developers interested in the specification can join the AuthZEN Working Group and provide feedback through the associated GitHub repository.

Read Full Article

like

19 Likes

source image

Infoblox

4d

read

288

img
dot

Image Credit: Infoblox

The Business Impact of Enterprise-Grade DDI: New Research Findings

  • Recent research from Enterprise Strategy Group (ESG) highlights the importance of DNS, DHCP, and IP address management (DDI) in the hybrid, multi-cloud era.
  • DDI serves as a critical foundation for seamless operations across complex IT environments.
  • Organizations using enterprise-grade DDI solutions have better outcomes compared to those using non-enterprise-grade options.
  • Research findings reveal significant advantages of enterprise-grade DDI, including higher cloud confidence and reduced outage frequency.
  • Organizations with non-enterprise DDI experience challenges in visibility, security automation, and business agility.
  • Infoblox Universal DDI Product Suite offers cohesive management, comprehensive visibility, adaptive delivery, and proactive security for network services.
  • Customer success stories demonstrate the transformative impact of Infoblox Universal DDI across various industries.
  • ESG research emphasizes the crucial role of DDI in shaping business outcomes and highlights the need for enterprise-grade solutions in modern network management.
  • By adopting a strategic approach to DDI with solutions like Infoblox Universal DDI, organizations can optimize their network infrastructure for success in hybrid, multi-cloud environments.
  • Understanding the risks associated with inadequate DDI is key for businesses looking to thrive in a distributed digital landscape.

Read Full Article

like

17 Likes

source image

Qualys

4d

read

77

img
dot

Image Credit: Qualys

The Efficiency Imperative: How Federal Agencies Can Streamline Cybersecurity Operations

  • Federal agencies are facing pressure to optimize IT budgets and strengthen cybersecurity defenses amidst increasing scrutiny on government spending.
  • Unchecked proliferation of security tools has led to inefficiencies, reduced visibility, and higher total cost of ownership.
  • Research shows large enterprises manage an average of 76 security tools, leading to fragmented security environments and increased risks.
  • To address mandates like FISMA and NIST, agencies need to transform to integrated security stacks for automated processes and enhanced risk visibility.
  • The expanding attack surface has driven tool sprawl in cybersecurity, leading to fragmented security architectures.
  • Federal agencies must adopt integrated, platform-based cybersecurity strategies to consolidate security functions and enhance automation.
  • Challenges include operational inefficiencies, high costs due to complexity, visibility gaps, and delayed incident response.
  • Agencies must invest in unified platforms for better visibility, posture management, and automated remediation to improve efficiency.
  • Qualys offers a unified risk management approach to eliminate inefficiencies, improve security outcomes, and enhance attack surface visibility.
  • Key benefits of Qualys solution include enhanced attack surface visibility, elimination of redundant security tools, proactive risk mitigation, and automation.
  • Qualys helps agencies achieve measurable improvements in efficiency, cost savings, and security effectiveness by consolidating tools and automating risk management.

Read Full Article

like

4 Likes

source image

Securityaffairs

4d

read

166

img
dot

Image Credit: Securityaffairs

Critical Apache Roller flaw allows to retain unauthorized access even after a password change

  • A critical flaw (CVE-2025-24859, CVSS 10) in Apache Roller lets attackers keep access even after password changes. All versions ≤6.1.4 are affected.
  • A critical vulnerability, tracked as CVE-2025-24859 (CVSS score of 10.0), affects the Apache Roller open-source, Java-based blogging server software.
  • The flaw is a session management issue that impacts in Apache Roller before version 6.1.5 where active user sessions are not properly invalidated after password changes.
  • In early April, experts warned of another critical vulnerability impacting Apache Parquet’s Java Library. The vulnerability, tracked as CVE-2025-30065 (CVSS score of 10.0), could allow remote code execution.

Read Full Article

like

10 Likes

source image

Securityaffairs

4d

read

105

img
dot

Image Credit: Securityaffairs

Meta will use public EU user data to train its AI models

  • Meta will use public EU user data to train its AI models.
  • The company paused the plan last year due to data protection concerns raised by Irish regulators.
  • Meta's AI, including Llama LLM, is already available in other parts of the world.
  • EU users will be able to object to their public data being used for training purposes.

Read Full Article

like

6 Likes

source image

Sentinelone

4d

read

219

img
dot

Image Credit: Sentinelone

PinnacleOne ExecBrief | Economists on AI & Workplace Productivity

  • The Economist reviewed research on the impact of AI on productivity and found that AI strengthened work outputs among experts but not poorly-skilled users.
  • SentinelOne's Mortal v. Machine competition demonstrated that non-experts using finely-tuned AI models, like Purple AI, can outperform experts in discrete tasks in the context of SOC operations.
  • Managers and CISOs should up-skill SOC analysts for threat hunting, detection engineering, and intelligence production to leverage the expertise of experts using specialized AI systems, while also empowering team members to take on new responsibilities and improve overall security.
  • Improvements in team capabilities, through education and empowering members, will contribute to improved security and productivity statistics, unlike the limited impact seen with the onset of computers in the 1980s.

Read Full Article

like

13 Likes

source image

Securityaffairs

5d

read

334

img
dot

Image Credit: Securityaffairs

Hertz disclosed a data breach following 2024 Cleo zero-day attack

  • Car rental giant Hertz Corporation disclosed a data breach that impacted its Hertz, Thrifty, and Dollar brands.
  • Threat actors gained access to customer data via Cleo zero-day exploits in late 2024.
  • The breach exposed customer data, including names, contacts, DOB, credit card information, and driver's license information.
  • Hertz confirmed Cleo addressed the breach, notified law enforcement and regulators, and offers 2 years of free Kroll identity monitoring.

Read Full Article

like

20 Likes

source image

Securityaffairs

5d

read

136

img
dot

Image Credit: Securityaffairs

Gladinet flaw CVE-2025-30406 actively exploited in the wild

  • Security researchers at Huntress have reported active exploitation of the Gladinet CVE-2025-30406 vulnerability, affecting seven organizations and 120 endpoints.
  • The vulnerability (CVE-2025-30406) is a deserialization issue in Gladinet CentreStack and Triofox software due to the hardcoded machineKey use.
  • The flaw allows remote code execution and full server compromise if unpatched, posing a critical risk with no prerequisites other than knowing the default key values.
  • Huntress has released detection tools and urges partners to patch the vulnerability.

Read Full Article

like

8 Likes

source image

Hackersking

5d

read

40

img
dot

Image Credit: Hackersking

Open-Source Browser For Ethical Hackers and Cybersecurity Researchers

  • An open-source browser called Venator Red has been developed for ethical hackers and cybersecurity researchers.
  • Venator Red is based on the Firefox browser and focuses on privacy, security, and user freedom.
  • The browser features no telemetry, private search options, content blocker, and enhanced privacy settings.
  • It comes with an extensive bookmarks collection, including resources like dark web search engines, database leaks, and IP address research tools.

Read Full Article

like

2 Likes

For uninterrupted reading, download the app