cyber_security_channel | Новости и СМИ

Telegram-канал cyber_security_channel - Cyber Security News

42585

Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin

Подписаться на канал

Cyber Security News

Where Hackers Find Your Weak Spots

So how do attackers gather data about their targets?

There are five sources of intelligence cybercriminals can use to gather and analyze information about their targets.

Read about them in the above article.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

ARTIFICIAL INTELLIGENCEUS-China Competition to Field Military Drone Swarms Could Fuel Global Arms Race

The world’s only AI superpowers are engaged in an arms race for swarming drones that is reminiscent of the Cold War, except drone technology will be far more difficult to contain than nuclear weapons.

Because software drives the drones’ swarming abilities, it could be relatively easy and cheap for rogue nations and militants to acquire their own fleets of killer robots.

The Pentagon is pushing urgent development of inexpensive, expendable drones as a deterrent against China acting on its territorial claim on Taiwan.

Washington says it has no choice but to keep pace with Beijing. Chinese officials say AI-enabled weapons are inevitable so they, too, must have them.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

‘Meta is out of options’: EU Regulators Reject its Privacy Fee for Facebook and Instagram

Meta has tried using various legal justifications for scooping up and processing European users’ personal data over the years since the General Data Protection Regulation (GDPR) came into force in 2018 — with each being successively shot down by regulators as being an unacceptable reading of the privacy law.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

DDoS Attacks Are Still Growing and There Are New Threats On the Horizon

In aggregate, HTTP DDoS attacks remain (just about) the leading form of attacks, accounting for 37% of all DDoS attacks.

DNS DDoS attacks make up 33%, and the remaining 30% is left for all other types of L3/4 attacks, such as SYN Flood and UDP Floods.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Growing macOS Adoption Opens the Door to Increasingly Sophisticated TCC-based Attacks

The report noted that growing numbers of businesses are adopting Mac systems and that this increased corporate market share is inviting an increased volume of attacks.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

FBI Warns of Massive Toll Services Smishing Scam

The FBI also recommended anyone receiving similar messages to check their account on the legitimate toll service’s website or call its customer service number, to see if they do indeed owe money or not.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

AT&T Confirms Data Breach Affecting Over 51 Million Customers

TechCrunch reported a subset of the leaked data had first surfaced online three years ago, but AT&T did not take any significant action at that time.

It was only after the complete dataset was published that the company acknowledged the breach and began taking steps to mitigate the potential risks to its customers.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Apple’s New iOS 18 AI Plans—What To Know About Data Privacy

The iOS 18 rumor mill has been in full swing for months now, with other iPhone features including design changes and a more customizable home screen.

Meanwhile, Apple Maps is adding support for customizable routes and messaging standard RCS will be added to iPhones.

At least one of the new iOS 18 AI features—Encrypted Visual Search—seems to have security at its core and this is very typical of Apple.

I expect to see a bunch of AI features on your iPhone when iOS 18 launches this year, but I do think Apple will carefully consider security and privacy.

After all, it has a reputation to protect.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Simbian Emerges From Stealth With $10 Million to Build Autonomous AI-Based Security Platform

Simbian is focusing on the economic benefit of automated security rather than the full potential benefit of autonomous security.

“Users provide their goal and business context in natural language,” says the firm, “and Simbian’s patent-pending LLM-powered platform provides personalized recommendations and generates automated actions across heterogeneous environments.”

The argument is that human experts will be relieved from tedious tasks, and business will need fewer of those expensive humans.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

DuckDuckGo Launches Privacy Pro: A New Subscription Service Focused on Enhanced Online Privacy

DuckDuckGo’s decision to offer Privacy Pro stems from its commitment to user privacy, aligned with its business ethos.

The company has traditionally provided several privacy tools for free, funded by non-intrusive advertising.

However, some advanced features like a VPN require more resources, justifying the move towards a paid subscription model.

This approach allows DuckDuckGo to maintain its privacy-focused offerings while introducing enhanced capabilities that necessitate additional investment in infrastructure and technology.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Meta AI Restricts Election-Related Responses in India to Combat Misinformation

However, there are also significant potential downsides to the use of AI in elections. Malicious actors could exploit AI to spread misinformation or disinformation about candidates or issues.

This could be done by creating fake social media accounts or websites that propagate false information about candidates.

AI could also be used to target voters with misleading or manipulative advertising, designed to exploit their fears or biases.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

What is Data Protection as a Service (DPaaS)

DPaaS is available through many backup vendors, large public cloud providers, managed service providers and traditional infrastructure vendors that provide storage as a service (STaaS).

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Top MITRE ATT&CK Techniques and How to Defend Against Them

For defenders looking to allocate limited attention and resources, here are just some of the most common ATT&CK techniques, and how to defend against them.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Scientists Install Encryption Shield to Protect Advanced Chinese Quantum Computer From Attack

The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.

The next year, the company delivered the 24-qubit Wuyuan second-generation machine – the country’s first practical quantum computer – making China the third country capable of delivering a complete quantum computing system after Canada and the United States.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

LG Smart TVs at Risk of Attacks, Thanks to 4 OS Vulnerabilities

They impact webOS 4.9.7-5.30.40 running on LG43UM7000PLA, webOS 5.5.0-04.50.51 running on OLED55CXPUA, webOS 6.3.3-442 (kisscurl-kinglake)-03.36.50 running on OLED48C1PUB, and webOS 7.3.1-43 (mullet-mebin)-03.33.85 running on OLED55A23LA.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

MITRE Hacked by State-Sponsored Group via Ivanti Zero-Days

Following the discovery of the breach, MITRE took the NERVE environment offline and launched an investigation.

The organization determined that the attack involved exploitation of two Ivanti Connect Secure VPN device vulnerabilities for initial access.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Personal Information of Parents, Staff at 127 Schools Accessed in Data Security Breach

Mobile Guardian is a device management app (DMA) installed on personal learning devices used by students, like iPads and Google Chromebooks.

The app enables parents to manage students’ device usage by restricting applications or websites and screen time.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Quantum-Proof Encryption May not Actually Stop Quantum Hackers

Quantum computers threaten to one day crack the widely used encryption algorithms that keep banking, email and other data safe, so researchers having been working to develop “post-quantum” algorithms to replace them.

Many of these are based on “lattice problems”, an area of mathematics that involves regular patterns, or lattices, in space.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

3 Steps Executives and Boards Should Take to Ensure Cyber Readiness

A company's response to a crisis is a direct reflection of its preparedness.

Rather than focus solely on what happens during and after a cyber incident, executives and leadership teams must first understand that the period preceding an event is most critical.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Web3 Game Developers Targeted in Crypto Theft Scheme

"The targeted nature of this campaign suggests that threat actors may perceive Web3 gamers as having a more acute vulnerability to social engineering, due to an assumed trade-off in cyber hygiene — meaning that Web3 gamers may have fewer protections in place against cybercrime — in the pursuit of profit," according to the report.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Critical Infrastructure Security: Observations From the Front Lines

However, as someone who works on the front lines of critical infrastructure security, I believe that, rather than panicking about Volt Typhoon and the threats the group represents, we should focus on several positives.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Google Cloud Unveils Custom Arm AI Chip. Nvidia Stock Falls

Google Cloud offers our AI Hypercomputer, an architecture that combines our powerful TPUs, GPUs, AI software and more to provide an efficient and cost effective way to train and serve models.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

LastPass Users Hit by Major Phishing Scam: Master Passwords Breached

One of LabHost’s main services was to help hackers create a fake website that looked just like the legitimate one so that users could be tricked into entering their login credentials.

That’s exactly what happened in this scenario with LastPass.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Hackers Are Using Windows Script Files to Spread Malware and Wwerve Antivirus Software

WSF files used in the attack were uploaded to a number of malicious domains controlled by the hackers, but Schläpfer was unable to identify how victims were being lured to the dangerous URLs, speculating spam or a malvertising campaign.

The file contains the malicious script as well as long strings of ‘junk characters’ used to try and conceal the real threat.

The script itself is heavily obfuscated too, where all functions and variables are encoded and decoded using an array.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

SentinelOne Announces Purple AI for Enhanced Cybersecurity Efficiency

Purple AI is a significant upgrade in the cybersecurity landscape.

It makes threat hunts, investigations, and responses faster and simpler, empowering security teams to deliver enhanced defence, savings, and efficiency.

Purple AI is packed with features far surpassing those of a conventional security chatbot or console search box.

It facilitates complex query simplification and streamlines investigations using natural language translations, and it allows analysts to have a normalised view of native and partner data.

The platform also aids in the discovery and mitigation of hidden risks using pre-populated Purple AI Threat Hunting Quick Starts for single-click investigations.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Regulation Remains the Strongest Multiplier to Cybersecurity Growth

The rise of AI has also been increasing and has greatly affected the way cybersecurity could be enhanced at the same time allowing cyber criminals well-versed with AI to launch more sophisticated attacks against their victims and making themselves harder to detect and defend against.

The Internet of Things (IoT) vulnerabilities have also been increasing. According to Statista, the number of IoT devices exceeded 15 billion in 2023.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

❤️ Thank You for 50,000 Subscribers on the Telegram News Channel!

↳ Special Competition...

-----

🫶 Dear community members,

We are super grateful for every one of you =)

At the end of the day, you make all of this possible and provide us with motivation!

-----

To celebrate, we are launching an exclusive contest!

🛠 How Does It Work?

1. You will receive a personal invite link to our News Channel.

2. Main goal: get as many people to join @Cyber_Security_Channel with your custom link.

3. Participant with the largest number of subscribers who followed our channel through their link will receive a prize.

🙋‍♂️ How To Participate?

1. Message @cybersecadmin:

“I want to participate in the Special Competition”

2. Pick up a custom invite link to our News Channel.

3. Start inviting new subscribers, get as many people as you can to enter the community through your link.

4. Be active for 30 days, compete for a Mystery Prize!

-----

⚡️Ready to Join the Fun?

→ Let us know: @cybersecadmin

Good luck!

Читать полностью…

Cyber Security News

GDPR in the Age of AI Raises a “Data Dilemma” for Enterprises

The process of data minimization is similarly restrictive to the AI supply chain, in that it demands that those collecting data only gather the minimum amount of data needed to deliver a service.“

Aligning with emerging regulations like DORA, which focuses on data security and resilience, is also crucial.

As AI evolves, fostering a synergy between innovation, data protection practices (like GDPR), and responsible regulations like DORA will be vital for its future,” he added.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Banking Giant Wells Fargo Suffers Data Breach, Sends Two Notification Letters

In the breach notification letter, the banking giant claims to be “taking measures to monitor (customer) account(s) for suspicious events or changes, and is continually reviewing security measures to reduce the likelihood of this happening in the future”.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Optiv Expands Strategic Alliance with Google Cloud to Deliver World-Class Cybersecurity Expertise

The Optiv and Google Cloud alliance brings clients:

• End-to-end SecOps transformation
• Scalable security operations solutions
• Third-party solutions through Google Cloud Marketplace

Sunil Potti, general manager and vice president of cloud security, Google Cloud, added, "Our partnership with Optiv combines the technology, people, and process necessary to make security as pervasive as possible and materially less complex.

Our globally recognized cybersecurity offerings including Chronicle Security Operations powered by our advanced AI services, coupled with Optiv's end-to-end expertise, from strategy to execution, enables clients to transform their businesses forward, safely

Cyber_Security_Channel

Читать полностью…
Подписаться на канал