menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Info. Security News News

Info. Security News News

source image

Dev

1w

read

419

img
dot

Image Credit: Dev

How to Integrate and Configure Zabbix for Monitoring IT Infrastructure

  • Zabbix is an open-source monitoring tool used to monitor IT infrastructure, applications, and services.
  • The article provides step-by-step instructions for integrating and configuring Zabbix for your IT infrastructure.
  • It covers prerequisites, such as server requirements and network setup.
  • The article also outlines steps for installing Zabbix server and agent, configuring the Zabbix database, accessing the web interface, configuring Zabbix agents, adding hosts to Zabbix, setting up alerts, visualizing data, securing the installation, and maintaining and monitoring the system.

Read Full Article

like

25 Likes

source image

Securityaffairs

2w

read

227

img
dot

Image Credit: Securityaffairs

U.S. Medical billing provider Medusind suffered a sata breach

  • Medusind, a medical billing provider, disclosed a data breach that occurred in December 2023 and affected over 360,000 individuals.
  • The breach was discovered on December 29, 2023, and the company immediately took affected systems offline and hired a cybersecurity forensic firm to investigate.
  • Certain files containing personal information such as health insurance and billing information, payment information, health information, government identification, and other personal information may have been stolen.
  • Details about the attack, including whether it was a ransomware attack, have not been shared.

Read Full Article

like

13 Likes

source image

TechCrunch

2w

read

98

img
dot

Image Credit: TechCrunch

Facebook awards researcher $100,000 for finding bug that granted internal access

  • Facebook awarded security researcher Ben Sadeghipour $100,000 for discovering a bug that granted him internal access.
  • The vulnerability allowed Sadeghipour to run commands on Facebook's ad platform server, essentially giving him control.
  • Sadeghipour reported the flaw to Facebook's owner Meta, who fixed it within an hour.
  • Similar vulnerabilities are present in ad platforms of other companies as well.

Read Full Article

like

5 Likes

source image

Amazon

2w

read

4

img
dot

Image Credit: Amazon

Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent

  • Securing an event of the magnitude of AWS re:Invent—the Amazon Web Services annual conference in Las Vegas—is no small feat.
  • Amazon's physical security and information security teams work together to secure customers, employees, and infrastructure at scale against a wide range of threats.
  • Teams are co-located in the Command Post—the nerve center of our security operations. Here, physical and logical security converge as nearly every element of our security footprint comes together.
  • For effective collaboration, organizations must prioritize closing the gap between physical and logical security.
  • At re:Invent, Amazon deploys thousands of security personnel, including guards, K9 units, and first responders to help respond to and assist with any security issues.
  • Automated drones are used in re:Play-the culminating concert to coordinate responses to issues.
  • Amazon also secures the presentations given by re:Invent’s cloud computing and AI experts, executives, and engineers.
  • The AWS Cloud helps Amazon support the different components of its security operation and share critical information rapidly.
  • Amazon invests in and strengthens its unified approach to security to ensure a cohesive, unified response.
  • Amazon hopes its learnings can help others enhance their own security resilience, both inside and outside of events.

Read Full Article

like

Like

source image

Dataprivacyandsecurityinsider

2w

read

81

img
dot

Image Credit: Dataprivacyandsecurityinsider

What to Know About the HHS HIPAA Security Standards Proposal

  • The U.S. Department of Health and Human Services (HHS) has proposed amendments to the HIPAA Security Rule.
  • The proposed changes aim to enhance cybersecurity protection for electronic health information (ePHI).
  • Key provisions include removing the 'addressable' standard, requiring risk analysis, and prompt notification of access changes.
  • The Proposed Rule also includes specific requirements for business associates and group health plans.

Read Full Article

like

4 Likes

source image

Securityintelligence

2w

read

227

img
dot

Image Credit: Securityintelligence

Cybersecurity trends: IBM’s predictions for 2025

  • AI will continue to dominate cybersecurity concerns in 2025. While it provides great benefits to data protection, threat actors can use it to accelerate social engineering attacks and sabotage AI models with malware.
  • Credential theft remains a problem, with a 71% YoY increase in attacks using compromised credentials. Costs related to the cybersecurity skills shortage remain high, with companies losing an extra $1.76 million in a data breach aftermath.
  • Positive steps saw CISA signed up over 250 software manufacturers for its Secure by Design programme, while also launching its Cyber Incident Reporting Portal to improve the way companies share cyber information.
  • In 2025, organizations will confront the risks of unsanctioned 'shadow AI' models with well-fitted governance policies, comprehensive workforce training, and diligent detection & response.
  • With the rise of multi-cloud environments and scattered identity solutions, enterprises will continue to transform their approach to identity management with an Identity-First strategy featuring an effective 'identity fabric' comprised of identity tools and services.
  • In the face of rapidly evolving hybrid cloud threats and quantum computing risks to public-key encryption standards, organizations will need to develop cybersecurity strategies that embed security into their organizational culture.
  • As organizations begin transitioning to post-quantum cryptography over the next year, crypto agility will be just as crucial to ensure systems respond quickly to new cryptographic mechanisms, algorithms and vulnerabilities.
  • With AI becoming more common, data and AI security will form an essential element of trustworthy AI in 2025, and be viewed as part of the trustworthy AI recipe.
  • Businesses need to be prepared for AI being used as a new tool for threat actors to bypass security processes and protocols. They must adopt security frameworks and best practices that address threats that advance with AI.
  • Organizations should prioritize end-to-end security for their own AI solutions, such as user interfaces, APIs, language models and machine learning operations while focusing on strategies for both AI-powered & assisted threats.

Read Full Article

like

13 Likes

source image

Hackingblogs

2w

read

47

img
dot

Image Credit: Hackingblogs

“Phish-Free” PayPal Scam: A Clever New Phishing Attack You Need to Know About

  • The recent PayPal scam is a "phish-free phishing attack" that appears authentic.
  • The scam starts with an email from PayPal's real email address.
  • The attackers utilize PayPal's "Send and Request Money" feature and a Microsoft 365 test domain.
  • The scam is difficult to detect and can result in unauthorized access to PayPal accounts.

Read Full Article

like

2 Likes

source image

Hackersking

2w

read

51

img
dot

Image Credit: Hackersking

Fake Account Detection in Twitter: Detection Strategies

  • Twitter has become a victim of fake accounts, necessitating a robust fake account detection system.
  • Methods to detect fake Twitter accounts include behavioral analysis, analyzing profile attributes, exploring the Twitter network, using machine learning models, and applying NLP.
  • Tools and technologies used for fake account detection include Botometer, Tweepy and Twitter API, and AI frameworks.
  • While fake account detection systems are constantly improving, cybercriminals continuously find ways to evade detection.

Read Full Article

like

3 Likes

source image

Kaspersky

2w

read

287

img
dot

Image Credit: Kaspersky

How vulnerable Ecovacs robot vacuums are being hacked | Kaspersky official blog

  • Vulnerable robot vacuums, such as those manufactured by Ecovacs, can be hacked and commanded to turn into foul-mouthed, abusive louts, or their camera can be accessed remotely by intruders, according to cybersecurity researchers Dennis Giese and Braelynn Luedtke who spoke at DEF CON 32. They discovered the Ecovacs robot vacuums could be targeted if a diagnostic port was exposed, and that the camera's PIN, which secures the video feed from the robot, was not encrypted. Although Ecovacs tried to patch the holes, says Giese, little has been done about the most significant vulnerabilities.
  • Owners of the robots have since been hit by hackers who were able to access the video feed, including through public Wi-Fi, and in some cases remotely control the robot, allowing it to move without owners' knowledge and make abusive comments.
  • Giese and Luedtke informed Ecovacs about the vulnerabilities they found, but received no response from the company. They later demonstrated it was possible to send a malicious payload to the robot via Bluetooth and gain root privileges in the operating system of any vulnerable robot.
  • Although some vulnerabilities may be closed by firmware updates, experts say there is no universal method of protecting against robot vacuum hacking that covers all bases. Owners can attempt to hack the machine themselves, getting root access, and unlinking the machine from the vendor’s cloud. But experts warn this a complex and time-consuming procedure.
  • It is recommended to always install firmware updates, to vet the security practices of the product's vendor pre-purchase, and to group IoT devices on a guest network separate to other devices as robot vacuums are a potential launchpad for an attack on other products if they are breached by hackers.

Read Full Article

like

17 Likes

source image

Securityaffairs

2w

read

111

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog

  • U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog
  • CISA adds CVE-2025-0282 to its Known Exploited Vulnerabilities (KEV) catalog
  • Ivanti Connect Secure, Policy Secure, and ZTA Gateways impacted by the vulnerability
  • CISA orders federal agencies to fix the vulnerability by January 15, 2025

Read Full Article

like

6 Likes

source image

Securityaffairs

2w

read

390

img
dot

Image Credit: Securityaffairs

SOC Scalability: How AI Supports Growth Without Overloading Analysts

  • Scaling up a security operations center (SOC) is inevitable for many organizations.
  • Traditionally, SOC scaling efforts have translated to increased burdens on already-overworked analysts.
  • The transformative potential of Artificial Intelligence (AI) is poised to reshape this trajectory.
  • Building an AI SOC can reduce analyst workloads, increase efficiency, and improve performance.
  • Integrating AI into SOCs can streamline the investigation process and reduce alert overload.
  • AI can automate menial, repetitive tasks, eradicating the need for analysts to perform them significantly, reducing their workload.
  • AI can help improve decision-making and response times by analyzing vast amounts of data and identifying patterns faster.
  • AI is the perfect tool for keeping pace with ongoing SOC growth, allowing organizations to scale up operations while keeping costs and workloads down.
  • The longer your AI SOC is in operation, the better it will perform.
  • It’s important to recognize that SOC scaling is not a one-hit job; it’s an ongoing process.

Read Full Article

like

23 Likes

source image

Securityaffairs

2w

read

12

img
dot

Image Credit: Securityaffairs

SonicWall warns of an exploitable SonicOS vulnerability

  • SonicWall warns customers of an exploitable SonicOS vulnerability.
  • An authentication bypass vulnerability in SonicOS is susceptible to actual exploitation.
  • Customers urged to upgrade their firewall firmware to address the vulnerability (CVE-2024-53704).
  • Mitigations and recommendations provided to minimize potential impact.

Read Full Article

like

Like

source image

Amazon

2w

read

167

img
dot

Image Credit: Amazon

New AWS Skill Builder course available: Securing Generative AI on AWS

  • AWS has launched a new Skill Builder course called Securing Generative AI on AWS.
  • The course aims to help security professionals, architects, and AI/ML engineers understand and implement security best practices for generative AI on AWS.
  • The course covers topics such as the Generative AI Security Scoping Matrix, key AI security frameworks, practical security strategies, and real-world applications.
  • To access the course, users need to sign up for an AWS Skill Builder account and enroll in the Securing Generative AI on AWS course.

Read Full Article

like

10 Likes

source image

Securityaffairs

2w

read

189

img
dot

Image Credit: Securityaffairs

Gayfemboy Botnet targets Four-Faith router vulnerability

  • Gayfemboy, a Mirai botnet variant, has been exploiting a flaw in Four-Faith industrial routers to launch DDoS attacks since November 2024.
  • The Gayfemboy botnet borrows code from the Mirai variant and integrates N-day and 0-day exploits.
  • The botnet targets Four-Faith industrial routers, Neterbit routers, and Vimar smart home devices.
  • Infections are mostly found in China, the United States, Iran, Russia, and Turkey.

Read Full Article

like

11 Likes

source image

Amazon

2w

read

245

img
dot

Image Credit: Amazon

Customize the scope of IAM Access Analyzer unused access analysis

  • AWS Identity and Access Management Access Analyzer is a tool that simplifies inspecting unused access and guides towards least privilege.
  • You can use unused access findings to identify over-permissive access granted to AWS IAM roles and users in your accounts or organization.
  • Recently, IAM Access Analyzer launched new configuration capabilities that you can use to customize the analysis.
  • You can select accounts, roles, and users to exclude and focus on the areas that matter the most to you.
  • This customization using the new configuration capabilities helps to reduce noise from unwanted findings.
  • IAM Access Analyzer unused access analysis can be set up at the organization level to monitor the AWS accounts in your organization.
  • In this post, we walkthrough how to exclude specific AWS accounts from the analyzer's unused access findings.
  • You can also exclude tagged IAM roles to focus on the most relevant security insights and update the exclusions configured on your analyzer as required.
  • By customizing the exclusion on the unused access analyzer, you can focus on the findings that matter most.
  • IAM Access Analyzer provides enhanced controls to help tailor the analysis closely to your organization’s security needs.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app