menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Info. Security News News

Info. Security News News

source image

Dataprivacyandsecurityinsider

6d

read

351

img
dot

Image Credit: Dataprivacyandsecurityinsider

The Impact of Stolen Credentials

  • Schneider Electric is investigating a security incident involving its JIRA internal development platform.
  • The attacker group, 'Grep,' claims to have stolen 40 GB of data from the JIRA platform.
  • The incident highlights the problem of stolen credentials being used to penetrate company networks.
  • To combat this issue, strong passphrases, password resets, and education are necessary.

Read Full Article

like

21 Likes

source image

Dataprivacyandsecurityinsider

6d

read

0

img
dot

Image Credit: Dataprivacyandsecurityinsider

Precious-Metal Refiner Hit with Data Breach Class Action over 2023 Cyber-Attack

  • Elemetal LLC faces a data breach class action over a 2023 cyber-attack.
  • The breach resulted in the exposure of personal information of approximately 13,000 customers.
  • The lawsuit alleges that Elemetal failed to implement adequate security measures and timely notify customers.
  • The complaint seeks monetary damages, equitable relief, and implementation of a comprehensive data privacy and security program.

Read Full Article

like

Like

source image

Dataprivacyandsecurityinsider

6d

read

0

img
dot

Image Credit: Dataprivacyandsecurityinsider

Ex-Yahoo! Patents Asserted Against Fashion Retainer Shein

  • R2 Solutions, the current assignee of Yahoo!'s patents, has sued fashion retailer Shein for alleged patent infringement.
  • R2 Solutions claims that Shein's website induces consumers to infringe the patents by using pre-populated search terms.
  • R2 Solutions also states that Shein's website collects information related to user vacillation through the 'Wishlist' and 'Recently Viewed' section.
  • R2 Solutions seeks damages, royalties, and attorneys' fees in the lawsuit against Shein.

Read Full Article

like

Like

source image

Dataprivacyandsecurityinsider

6d

read

33

img
dot

Image Credit: Dataprivacyandsecurityinsider

California Privacy Protection Agency Announces Investigative Sweep of Data Brokers’ Compliance with Registration Requirements

  • The California Privacy Protection Agency (CPPA) will conduct an investigative sweep of data brokers' compliance with registration requirements.
  • Data brokers are businesses that collect and sell personal information of California consumers without a direct relationship.
  • The Act requires data brokers to pay an annual registration fee and provide specific information to the CPPA.
  • Data brokers that fail to register by January 31, 2025, may face a penalty of $200 per day.

Read Full Article

like

1 Like

source image

Dataprivacyandsecurityinsider

6d

read

323

img
dot

Image Credit: Dataprivacyandsecurityinsider

Privacy Tip #420 – Is that Consumer Review Real or Generated by AI?

  • The FTC issued a proposed Order against Sitejabber for collecting fake reviews.
  • Sitejabber collected ratings from consumers at the time of purchase, before experiencing the products/services.
  • The FTC alleges that Sitejabber deceptively inflated clients' ratings and review counts.
  • The proposed order prohibits misrepresentation of customer ratings and reviews.

Read Full Article

like

19 Likes

source image

Qualys

6d

read

53

img
dot

Image Credit: Qualys

Elevate Your Container Security with QScanner in 2025

  • Qualys has launched QScanner, a command-line utility that helps scan and maintain robust security while providing vulnerability reports directly inline in the command-line interface. QScanner is standalone and can seamlessly integrate into various tools and workflows without any installation or deployment. QScanner identifies vulnerabilities in operating system and software packages and performs comprehensive software composition analysis supporting language-based packages for Ruby, Rust, PHP, Java, Go, Python, .NET, and Node.js.
  • QScanner offers centralized policy management through the Qualys Portal without interfering with developer or DevOps workflows, and integrated with CI/CD pipelines to automate security checks during the build and deployment processes. The tool can even be used to scan container images for custom workflows or custom tooling adaptable to various tools and systems. QScanner works with local runtimes, local archives, and remote registries, and offers immediate feedback in the command-line interface.
  • With QScanner, organizations can safeguard sensitive data and meet compliance requirements. The vulnerability reports provide a quantifiable measure of the risk associated with each container image, allowing organizations to prioritize remediation efforts. The tool scans for exposed secrets, such as passwords, API keys, and tokens, and enhances security posture, ensuring that only secure and compliant images are deployed to environments.
  • QScanner simplifies container image security and empowers CISOs, DevSecOps teams, engineers, and developers to secure container images efficiently. Additionally, QScanner has flexible scanning capabilities, automated security checks, and centralized policy enforcement. The seamless integration facilitates a shift-left approach, addressing security concerns while enhancing productivity.
  • QScanner is a standalone executable – just download it and start scanning. Unlike traditional tools requiring bulky setup and configurations, no installation or deployment is needed.
  • QScanner identifies vulnerabilities in OS and software packages within your container images. Leveraging the same trusted engine with 99.99966% Six Sigma accuracy, maintained by over 35 threat feeds and the threat research team, QScanner ensures highly accurate and reliable vulnerability detection.
  • QScanner performs software composition analysis (SCA), supporting language-based packages for Ruby, Rust, PHP, Java, Go, Python, .NET, and Node.js. The vulnerabilities detected by QScanner contribute to calculating the TruRisk score, a quantifiable score for assessing risk associated with each container image.
  • If secrets within container images are not properly secured, they can be accessed by unauthorized users, leading to malicious attacks. QScanner proactively scans for exposed secrets such as passwords, API keys, and tokens, helping safeguard sensitive data, meet compliance requirements, and reduce the risk of security incidents.
  • Local runtimes such as Docker, Containerd, or Podman, local archives, and remote registries like AWS ECR, Azure Container Registry, JFrog, GHCR, and more are supported. QScanner provides immediate vulnerability reports directly in your console with output formats like SBOM, JSON, Table, and SARIF, allowing for integration with various tools and workflows.
  • QScanner offers centralized policy management through the Qualys Portal without interfering with engineering or DevOps workflows while allowing security teams to configure policies to ensure all scans automatically adhere to organizational policy standards, thereby enhancing overall security posture without hindering productivity.
  • For organizations with custom tooling, QScanner offers the flexibility to fit into existing processes. Its command-line interface and support for various output formats make it adaptable to automate custom deployment scripts and specialized monitoring systems to meet specific needs without adding complexity.

Read Full Article

like

3 Likes

source image

Siliconangle

7d

read

62

img
dot

Image Credit: Siliconangle

Quantum threats plague next-gen data platforms: Digital trust and access control in focus

  • Data security and establishing trust parameters are crucial in today's digital world.
  • The rise of generative AI introduces new governance challenges, requiring businesses to rethink their data security strategies.
  • Zero-trust AI plays a central role in protecting against malicious attacks and ensuring data integrity and privacy.
  • Quantum computing poses a significant threat to modern cryptographic systems, requiring the adoption of new encryption and authentication algorithms.

Read Full Article

like

3 Likes

source image

Securityaffairs

7d

read

62

img
dot

Image Credit: Securityaffairs

DPRK-linked BlueNoroff used macOS malware with novel persistence

  • SentinelLabs observed North Korea-linked threat actor BlueNoroff targeting businesses in the crypto industry with a new multi-stage macOS malware called 'Hidden Risk.'
  • The attackers used fake cryptocurrency news emails and a malicious app disguised as a PDF document to initiate the attack.
  • The malware exploits a novel persistence method through the zshenv configuration file, bypassing macOS notifications and enhancing its stealthiness.
  • The campaign is attributed to BlueNoroff, known for targeting the crypto and Web3 sectors, and demonstrates their adaptability and refinement in attack methods.

Read Full Article

like

3 Likes

source image

Schneier

7d

read

364

img
dot

Image Credit: Schneier

Prompt Injection Defenses Against LLM Cyberattacks

  • Researchers propose a defense strategy called Mantis to counter LLM-driven cyberattacks.
  • Mantis exploits LLMs' susceptibility to adversarial inputs to undermine malicious operations.
  • It plants carefully crafted inputs into system responses, disrupting the attacker's operations or compromising their machine.
  • In experiments, Mantis achieved over 95% effectiveness against automated LLM-driven attacks.

Read Full Article

like

21 Likes

source image

Schneier

7d

read

385

img
dot

Image Credit: Schneier

Subverting LLM Coders

  • Researchers have developed CODEBREAKER, an LLM-assisted backdoor attack framework on code completion models.
  • CODEBREAKER leverages LLMs to transform the payload and evade strong vulnerability detection.
  • The attack demonstrates the need for more robust defenses in code completion systems.
  • This research highlights the importance of trusted AI in preventing such attacks.

Read Full Article

like

23 Likes

source image

Kaspersky

7d

read

182

img
dot

Image Credit: Kaspersky

Tor Browser and anonymity: what you need to know | Kaspersky official blog

  • Tor Browser provides anonymity to users by anonymizing user traffic through a distributed network of servers called nodes; however, it does not provide complete anonymity.
  • German intelligence services recently identified a Tor user through 'timing analysis' in which authorities monitor Tor exit nodes and trace anonymous connections back to the end user.
  • The more nodes a country has, the more of them can be state-monitored, increasing the likelihood of catching criminals.
  • The Tor Project includes safety tips on their support page, but anonymity online primarily depends on the actions of the user rather than the technical capabilities of the browser.
  • If you're using anonymous browsing simply to avoid intrusive contextual ads or for harmless purposes, private browsing mode in any regular browser should suffice.
  • Kaspersky's home security solutions include Private Browsing that detects attempts to collect data and logs them in a report without blocking them.
  • Kaspersky VPN Secure Connection offers Double VPN that allows you to create a chain of two VPN servers in different parts of the world that provides an additional layer of security and anonymity.
  • It is essential to remember that traffic encryption methods are not intended for illegal activities and only conceal personal information from data-gathering sites.

Read Full Article

like

10 Likes

source image

Securityaffairs

7d

read

349

img
dot

Image Credit: Securityaffairs

Canada ordered ByteDance to shut down TikTok operations in the country over security concerns

  • Canada ordered ByteDance to shut down TikTok operations over security concerns but did not issue a full ban on the platform.
  • The Canadian government ordered ByteDance to wind up TikTok Technology Canada, Inc. over security concerns following a national security review.
  • Canada's decision was guided by security and intelligence advice, but Canadians can still access and use TikTok by choice.
  • The shutdown of TikTok's Canadian offices will cause the loss of hundreds of local jobs.

Read Full Article

like

21 Likes

source image

Securityaffairs

7d

read

270

img
dot

Image Credit: Securityaffairs

Critical bug in Cisco UWRB access points allows attackers to run commands as root

  • Cisco fixed a critical flaw in URWB access points, allowing attackers to run root commands, compromising industrial wireless automation security.
  • The vulnerability allows attackers to execute arbitrary commands with root privileges by sending crafted HTTP requests to the device.
  • The vulnerability only affects specific models in URWB mode: Catalyst IW9165D, IW9165E, and IW9167E access points.
  • The Cisco PSIRT is not aware of attacks in the wild exploiting this vulnerability.

Read Full Article

like

16 Likes

source image

Securityaffairs

7d

read

518

img
dot

Image Credit: Securityaffairs

South Korea fined Meta $15.67M for illegally collecting and sharing Facebook users

  • South Korea's data privacy watchdog, Personal Information Protection Commission (PIPC), fined Meta $15.67 million for illegally collecting and sharing sensitive data of Facebook users.
  • Meta shared sensitive data, including political views and sexual orientation, of 980,000 Facebook users with 4,000 advertisers.
  • PIPC found Meta in violation of the Personal Information Protection Act and ordered corrective measures.
  • Meta previously faced fines for storing user passwords in plaintext.

Read Full Article

like

2 Likes

source image

Securityaffairs

7d

read

362

img
dot

Image Credit: Securityaffairs

Memorial Hospital and Manor suffered a ransomware attack

  • A ransomware attack hit Memorial Hospital and Manor in Bainbridge, Georgia, disrupting access to its Electronic Health Record system.
  • The hospital identified the attack after antivirus software flagged potential risks and launched an internal investigation.
  • Operations were unaffected, but staff had to switch to pen and paper for patient information recording.
  • The Embargo ransomware gang claimed responsibility for the attack, stealing 1.15 terabytes of data.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app