Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering https://firewall.firm.in/wp-content/uploads/2024/05/btc.png May 07, 2024NewsroomCryptocurrency / Cybercrime A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering charges from 2011 to 2017. Alexander Vinnik, 44, was charged in January 2017 and taken into custody in Greece in July 2017. He was subsequently extradited to the ...
Read More »Blog
UK military personnel’s data accessed in hack – ET CISO
UK military personnel’s data accessed in hack – ET CISO https://etimg.etb2bimg.com/thumb/msid-109906573,imgsize-7882,width-1200,height=765,overlay-etciso/cybercrime-fraud/uk-military-personnels-data-accessed-in-hack.jpg Some personal information in a payroll system used by Britain’s defence department has been accessed in a data breach, the BBC reported on Monday. The system was managed by an external contractor and no operational Ministry of Defence data was obtained, the broadcaster said, adding that the department took ...
Read More »Google to use Gemini AI to tackle advanced cyber threats, IT Security News, ET CISO
Google to use Gemini AI to tackle advanced cyber threats, IT Security News, ET CISO In a bid to better protect enterprises from cyber incidents, Google on Tuesday launched a new threat intelligence solution that is powered by its Gemini AI. The ‘Google Threat Intelligence’ AI-driven Gemini provides conversational search across its vast repository of threat intelligence, enabling customers to ...
Read More »China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices https://firewall.firm.in/wp-content/uploads/2024/05/chinese.jpg May 06, 2024NewsroomNetwork Security / Malware The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been the work of China-linked actors, according to new findings from attack surface management firm Censys. Dubbed ArcaneDoor, the activity is said to have commenced around July ...
Read More »Fortinet announces GenAI IoT security assistant – ET CISO
Fortinet announces GenAI IoT security assistant – ET CISO https://etimg.etb2bimg.com/thumb/msid-109873281,imgsize-23236,width-1200,height=765,overlay-etciso/next-gen-tech/fortinet-announces-genai-iot-security-assistant.jpg Fortinet has announced new updates to its generative AI (GenAI) portfolio to enhance both network and security operations, including the industry’s first generative AI IoT security assistant. The cybersecurity sector faces a significant skills gap approaching 4 million professionals.1 GenAI tackles this challenge by augmenting the need for technical proficiency. ...
Read More »Warren Buffett, IT Security News, ET CISO
Warren Buffett, IT Security News, ET CISO Warren Buffett cautioned the tens of thousands of shareholders who packed an arena for his annual meeting that artificial intelligence scams could become “the growth industry of all time.” Doubling down on his cautionary words from last year, Buffett told the throngs he recently came face to face with the downside of AI. ...
Read More »Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution
Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution https://firewall.firm.in/wp-content/uploads/2024/05/hack.jpg May 06, 2024NewsroomVulnerability / Server Security More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that’s vulnerable to a critical unpatched security flaw in the HTTP/HTTPS proxy tool. The issue, tracked as CVE-2023-49606, carries a CVSS score of 9.8 out ...
Read More »Maha govt directs DGP to curb deepfake menace during elections
Maha govt directs DGP to curb deepfake menace during elections [og_img] The Maharashtra government on Friday directed the state Director General of Police (DGP) to take stern action against those involved in creating deepfake videos, clips, photos or other content and circulating it through social media / digital media during the ongoing Lok Sabha elections.
Read More »Imperative of network traffic validation, ET CISO
Imperative of network traffic validation, ET CISO Shailendra Shyam Sahasrabudhe, Country Manager, India, UAE & South East Asia, Cymulate Ltd. In the fast-paced world of cybersecurity, staying one step ahead of potential threats is not just about deploying security controls; it’s about validating their effectiveness. Chief Information Officers (CIO) and Chief Technology Officers (CTO) navigating this ever-evolving landscape have come ...
Read More »Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities https://firewall.firm.in/wp-content/uploads/2024/05/russia.png Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S. The Czech Republic’s ...
Read More »