Remove CSO Remove Surveillance Remove Technology
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

White House seeks information on tools used for automated employee surveillance

CSO Magazine

The White House Office of Science and Technology Policy (OSTP) would soon be releasing a public request for information (RFI) to learn more about the automated tools employers use to surveil, monitor, evaluate, and manage workers, OSTP announced on Monday. To read this article in full, please click here

article thumbnail

Russian cyberspies target cloud services providers and resellers to abuse delegated access

CSO Magazine

In a new report this week, Microsoft warns that since May, the group known as Nobelium has targeted over 140 cloud service resellers and technology providers and has succeeded to compromise as many as 14. Nobelium, also known as APT29 or Cozy Bear, is considered the hacking arm of Russia's foreign intelligence service, the SVR.

article thumbnail

How security vendors are aiding Ukraine

CSO Magazine

These include scanning of Microsoft Azure Active Directory (AD), Microsoft 365 and AWS environments for signs of attack, surveillance of network infrastructure both in the cloud and on-premises and supporting the retention of historical metadata to aid incident response investigations based on indicators of compromise for specific attack variants.

article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. This means that any private data saved on your phone can be seen and taken over by the hacker.

article thumbnail

Russia-Pushed UN Cybercrime Treaty Meets Free Speech, Privacy Resistance

SecureWorld News

The UN Cybercrime Treaty , to the extent it gets adopted, is expected to define global norms for lawful surveillance and legal processes available to investigate and prosecute cybercriminals," reports The Register in a special report. To say the cybersecurity community is skeptical would be an understatement.