The Readable

The Readable

신문출판

Gyeonggi-do Seongnam-si 팔로워 580명

Cybersecurity News that Matters

소개

Cybersecurity News that Matters

웹사이트
https://thereadable.co
업계
신문출판
회사 규모
직원 2-10명
본사
Gyeonggi-do Seongnam-si
유형
비영리
설립
2022

위치

The Readable 직원

업데이트

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    😍 NEWS ON BIOMETRICS 👆 In a digital world plagued by security breaches, weak passwords, and identity theft, biometrics are emerging as the frontrunner in the race for better cybersecurity. Fingerprints, facial recognition, voice patterns, and even behavioral traits are being hailed as the keys to a more secure and seamless digital experience. However, the path to replacing passwords is not without its share of obstacles, risks, and ethical dilemmas. For decades, passwords have been the primary method of authentication. However, their vulnerabilities are increasingly evident. A 2023 Verizon report revealed that weak or stolen passwords accounted for more than 80% of hacking incidents. “The password was never designed for the modern internet. It’s time we move to solutions that fit the needs of a connected world,” Sundar Pichai, CEO of Alphabet, said in 2024. Biometric authentication promises a significant leap forward. Unlike passwords, biometric traits are inherently unique to each individual, making them difficult to replicate. “Biometric authentication is a game-changer,” says Stephan Jou, Senior Director of Security Analytics at OpenText, a Canadian information company specializing in enterprise information management (EIM) software that is transitioning to biometrics. “It’s not just about replacing passwords; it’s about creating a system that’s inherently more secure and far less burdensome for users.” Companies like Apple, Google, and Microsoft are leading the race. Apple’s Passkeys, introduced in 2022, use cryptographic keys tied to biometric data, ensuring sensitive information never leaves the user’s device. Microsoft’s Windows Hello integrates biometrics into its enterprise tools, while Google has expanded biometric authentication across Android and cloud services. #biometrics #authentication #passwordless #cybersecurity #privacy https://lnkd.in/gk_dQUA4

    The password is almost dead; long live biometrics » The Readable

    The password is almost dead; long live biometrics » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    📢 NEWS ON TURLA ❄️ In a bold display of cyberespionage, a prolific Russian hacking group has been spotted infiltrating and hijacking the systems of a rival Pakistani cyber collective. The revelations, detailed in a report released Wednesday by Lumen’s Black Lotus Labs, highlight a campaign spanning more than two years carried out by Turla—also known as Secret Blizzard, as named by Lumen—a well-known Russia-aligned hacker group likely linked to Moscow’s Federal Security Service, or FSB. The strategy allowed Secret Blizzard to steal information, deploy their own malware, and use the rival Pakistani malware for intelligence gathering—all while evading detection. It marks the fourth recorded instance of the group embedding themselves in another cyber gang’s operations since 2019, according to Lumen. The report states that Secret Blizzard began infiltrating the Pakistan-aligned entity, known as Storm-0156, in late 2022. The Russian operatives breached servers managing the Pakistani group’s malware infections, using them as springboards to target Afghan and government organizations in 2023. #Turla #SecretBlizzard #Russia #hacking Black Lotus Labs #cyberespionage #cybersecurity https://lnkd.in/gFMMWK6h

    Russian hackers exploit rival group’s systems to spy on Afghanistan and India » The Readable

    Russian hackers exploit rival group’s systems to spy on Afghanistan and India » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    💚 FAREWELL LETTER 😭 Minkyung Shin, a reporting intern at The Readable, wrote about her experience in cybersecurity journalism, wrapping up her nine months of pursuit of truth. ------------------ In July, I reported on deepfake crimes and emerging forms of cyberbullying in schools. That article highlighted data from the Seoul Metropolitan Police Agency, which revealed that 63.1% of school violence cases involved cybercrime. These included incidents where deepfake technology was used to create and distribute fake images and videos. Content abuse has been a serious problem in schools since my high school days. I was deeply shocked, and I struggled to come to terms with acts of voyeurism and the manipulation of photos—splicing someone’s image with nude pictures—for that purpose. Back then, it was done using Photoshop for simple edits and splicing, rather than the advanced creation of deepfakes. Today, artificial intelligence has become a highly sophisticated and easily accessible tool. While it offers convenience in work, learning, and many other areas of life, it also heightens the risk of criminal misuse. Teenagers are particularly vulnerable, as their familiarity with smartphones makes them potential targets for exploitation. As an intern journalist at The Readable, I focused on raising awareness about cybersecurity issues. Initially, my reporting covered common topics like hacking and data breaches. However, upon discovering the widespread prevalence of deepfake pornography crimes, I shifted my focus to inform readers about this alarming issue. I believe it is a journalist’s duty to highlight serious social problems, and I felt a profound sense of responsibility in fulfilling that role during my time at The Readable. #deepfake #cybercrimes #cybersecurity #privacy #journalism https://lnkd.in/gcVeXJxQ

    [Perspective] Deepfake crimes are an ongoing social issue » The Readable

    [Perspective] Deepfake crimes are an ongoing social issue » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    📻 NEWS ON JUSTICE 👩⚖️ A Russian national accused of masterminding a notorious ransomware-as-a-service operation has been extradited from South Korea and is now in American custody facing criminal charges for his cybercrime activities, the U.S. Department of Justice announced Monday. Evgenii Ptitsyn was extradited by South Korean authorities and appeared in a U.S. court in Maryland on Nov. 4. He faces 13 charges related to the sale, operation, and distribution of the Phobos ransomware service, the Department of Justice said. The indictment against Ptitsyn includes charges of wire fraud, conspiracy to commit wire and computer fraud, four counts of hacking-related extortion, and four counts of intentionally damaging protected computers. According to the charges, Ptitsyn and others have been accused of orchestrating an international hacking and extortion scheme since November 2020 using Phobos ransomware. They allegedly developed and sold the ransomware to criminal affiliates on a darknet site, using aliases such as “derxan” and “zimmermanx.” #ransomware #cybercrimes #Phobos #justice #cybersecurity #hacking #extortion https://lnkd.in/g-dedHDJ

    Alleged Phobos ransomware coordinator extradited to U.S. from South Korea » The Readable

    Alleged Phobos ransomware coordinator extradited to U.S. from South Korea » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    🚤 NEWS ON CYBER 😻 A security expert warned Thursday that cyber threats and conflicts have a profound impact on international politics and security, reaching far beyond technical concerns. Tae-Eun Song, an assistant professor at the Korea National Diplomatic Academy under the Ministry of Foreign Affairs, emphasized Thursday at the 12th Cyber National Strategy Forum that cybersecurity in international conflicts—such as the Russia-Ukraine war and the Israel-Hamas war—is increasingly extending into cyberspace, sparking new forms of conflict. The expert described war as a “festival period” for hackers, providing opportunities for bitcoin theft and network breaches. Cyberspace has become a global crime arena without borders, where criminal tools are distributed on the dark web, and artificial intelligence-driven attacks are making cyber threats increasingly sophisticated and coordinated. #cybersecurity #cybercrimes #cyberthreats #hackers #darkweb #AI https://lnkd.in/ggfgZGJC

    Expert warns cyber threats impact international security beyond technology » The Readable

    Expert warns cyber threats impact international security beyond technology » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    🔊 NEWS ON VOLT TYPHOON 🚨 Volt Typhoon, a Chinese state-sponsored hacking group previously believed to have been curtailed by Western cyber defenses, has reemerged with a more advanced strategy aimed at infiltrating critical infrastructure worldwide, according to findings released Tuesday. SecurityScorecard’s STRIKE Team report reveals that the hacking collective has shifted tactics, exploiting vulnerabilities in outdated routers at government and industrial facilities. This approach enables them to create a covert global network of compromised devices, or botnets, which they use as entry points to infiltrate critical infrastructure, including electric grids, pipelines, and water systems. Officials report that Volt Typhoon is infiltrating critical infrastructure with the intent to disable or sabotage underlying technologies if Western allies engage in military conflict with China. Such actions could cause severe disruptions to power, communications, and other essential services. In August, Beijing-backed cyberspies were discovered embedded within the systems of several U.S. internet service providers. The STRIKE Team has now uncovered that Volt Typhoon is using its original infrastructure and tactics in an enhanced, more sophisticated version of its botnet. This aligns with recent reports on the group’s activity; Bloomberg News reported this month that the hackers breached Singapore’s Singtel telecommunications carrier over the summer. #VoltTyphoon #China #CyberSecurity #Hacking #CriticalInfrastructure #Botnet #Stealth #Network https://lnkd.in/ggZ7dsf7

    Chinese hacker group Volt Typhoon expands reach, targeting aging infrastructure worldwide » The Readable

    Chinese hacker group Volt Typhoon expands reach, targeting aging infrastructure worldwide » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    ✋ OPINION ON SPATIAL COMPUTING 🔰 With the release of its first spatial computing device, the Vision Pro, Apple is reshaping the metaverse industry, which was previously focused on virtual reality (#VR). The company envisions a next-generation computing experience where digital content seamlessly blends with the real world. Meanwhile, Meta, a leader in the VR headset market, has introduced full color passthrough in its latest Meta Quest headsets. This feature offers a high-fidelity, real-time representation of the physical world. Additionally, Meta recently unveiled its first augmented reality (#AR) glasses, named Orion, designed to provide a more comfortable and integrated user experience. Before this shift in the metaverse industry, popular VR applications like VRChat aimed to offer a surreal and immersive experience distinctly separate from users’ real-world surroundings. Ironically, this separation acted as a safety boundary for users, as virtual worlds were not easily confused with reality, and events in these virtual spaces rarely impacted real life. However, as spatial computing applications increasingly integrate with the physical world, trustworthiness has emerged as a critical consideration. This raises an important question: What are the essential ingredients for trustworthy spatial computing? Privacy protection is undoubtedly the most critical requirement for this new computing paradigm. Spatial computing devices, or mixed-reality headsets, are worn by users and equipped with numerous high-fidelity sensors. For example, the Apple Vision Pro features 23 sensors, including a dozen cameras, capturing not only the user’s surroundings but also tracking facial expressions and eye movements with remarkable precision. Industry leaders emphasize the need for robust privacy protections, and Apple has highlighted its commitment to user privacy, particularly with its eye-tracking feature showcased during the Vision Pro’s launch. However, reports indicate that sensitive information may still be vulnerable through Vision Pro’s eye tracking [1]. Given the nature of a wearable device equipped with numerous sensors, the importance of privacy cannot be overstated [2]. #VR #AR #VisionPro #sensor #data #privacy #protection #spacialcomputing #security #cyber ETRI https://lnkd.in/gBiXgFSx

    Opinion: Toward trustworthy spatial computing » The Readable

    Opinion: Toward trustworthy spatial computing » The Readable

    thereadable.co

  • The Readable님이 퍼감

    New: Western powers want to boost undersea cable security standards, but major cyber adversaries have neither endorsed nor committed to respecting them. Protecting the cables from espionage will be harder than it seems, analysts warn. My latest for The Readable —>

    The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    🌊 NEWS ON UNDERSEA CABLES ⚡ Last month, the nations that comprise the prominent Five Eyes intelligence alliance, along with several of the group’s allies, announced that the extensive network of underwater cables that permit global data transmission requires updated security standards. The vast amount of data constantly transferred via these cables—notably among allied Western powers that find themselves pitted against an array of cyber adversaries out of Asia and the Middle East—makes them prime targets for espionage and sabotage. Global reliance on underwater cables “presents major risks related to critical public interests and has national and economic security implications,” stated a coalition comprised of 15 nations and the European Union in a statement released in late September. The statement outlined high-level principles aimed at strengthening cable protections against both accidental damage and covert hacking. However, cybersecurity experts who have advised allied nations and standards bodies warn that principles alone may not be enough—particularly as prominent cyber adversaries like Russia and China have neither endorsed nor committed to respecting these standards. “These [cables] are actually harder to defend than computer networks,” said James A. Lewis, a former United Nations information security advisor who helped craft the Wassenaar Arrangement that oversees some 42 nations’ exports of technology and security tools. “Having principles is nice, but only if everyone agrees to follow them,” said Lewis, head of the Strategic Technologies Program at the Washington, DC-based Center for Strategic and International Studies (CSIS). #undersea_cables #undersea #underwater #cables #security #cybersecurity #espionage Justin Sherman Global Cyber Strategies LLC David DiMolfetta https://lnkd.in/gmSvCfex

    Western powers face greater challenges than expected in protecting undersea cables from espionage, analysts warn » The Readable

    Western powers face greater challenges than expected in protecting undersea cables from espionage, analysts warn » The Readable

    thereadable.co

  • The Readable님 단체 페이지 보기, 그래픽

    팔로워 580명

    👉 NEWS ON DPRK HACKERS 📨 A North Korean-backed hacking group dubbed Jumpy Pisces has teamed up with a prominent ransomware collective, according to threat research out last week from Palo Alto Networks. The report indicates that a recent ransomware incident revealed an unusual alliance between North Korean hackers and the infamous Play ransomware gang. However, the specifics of the attack and the methods Palo Alto Networks Unit 42 threat intelligence team used to confirm the collaboration were not fully disclosed. The DPRK operatives are believed to be linked to the regime’s Reconnaissance General Bureau. This collaboration—the first observed of its kind—suggests North Korea may be shifting its focus from standard espionage and financial theft to more advanced ransomware attacks. While Pyongyang has previously relied on ransomware and cryptocurrency theft to fund its military, partnering with an independent criminal group like Play marks a significant shift. This alliance suggests an expansion in North Korea’s hacking strategy, one that could see the regime’s operatives potentially targeting a broader range of victims. Unit 42 assessed the collaboration with “moderate confidence,” citing key indicators such as the reuse of a compromised account. This account, initially accessed by Jumpy Pisces in an unnamed organization, was later used by Play to launch ransomware. #NorthKorea #DPRK #hackers #hacking #JumpyPisces #ransomware #collaboration https://lnkd.in/gZ8_UsPY

    North Korean hackers teaming up with notorious Play ransomware gang, Palo Alto findings say » The Readable

    North Korean hackers teaming up with notorious Play ransomware gang, Palo Alto findings say » The Readable

    thereadable.co

비슷한 페이지