Navigating the challenges of digital growth: securing trust in India’s tech revolution – ET CISO https://etimg.etb2bimg.com/thumb/msid-117446196,imgsize-4140,width-1200,height=765,overlay-etciso/cybercrime-fraud/navigating-the-challenges-of-digital-growth-securing-trust-in-indias-tech-revolution.jpg India is experiencing a rapid digital transformation, driven by initiatives like Digital India, which aim to bridge the digital divide and enable more people in urban and rural areas to access digital technologies. The use of mobile wallets and UPI (Unified Payments Interface) has ...
Read More »Cyber Security News
6 essential cybersecurity skills you need to thrive in 2025, IT Security News, ET CISO
6 essential cybersecurity skills you need to thrive in 2025, IT Security News, ET CISO With the entire business landscape going digital, it has become imperative not only to learn to leverage data but also to safeguard it from hackers and scammers. Consequently, there is an increasing demand for cybersecurity experts across industries and sectors. However, professionals must cultivate a ...
Read More »US treasury breach – Chinese hackers breach Janet Yellen’s computer, accessed about 50 files – ET CISO
US treasury breach – Chinese hackers breach Janet Yellen’s computer, accessed about 50 files – ET CISO https://etimg.etb2bimg.com/thumb/msid-117320088,imgsize-87808,width-1200,height=765,overlay-etciso/data-breaches/us-treasury-breach-chinese-hackers-breach-janet-yellens-computer-accessed-about-50-files.jpg Hackers backed by the Chinese government accessed US Treasury Secretary Janet Yellen’s computer and files, Bloomberg News has reported . The breach, discovered in December, also impacted the computers of Deputy Secretary Wally Adeyemo and Acting Under Secretary Brad Smith. The hackers ...
Read More »Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation https://firewall.firm.in/wp-content/uploads/2025/01/root.png Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. “These switches are widely used in building and home automation systems for a variety of networking ...
Read More »PayPal phishing attacks: how it works, identifying threats and precautions to take – ET CISO
PayPal phishing attacks: how it works, identifying threats and precautions to take – ET CISO https://etimg.etb2bimg.com/thumb/msid-117190503,imgsize-7738,width-1200,height=765,overlay-etciso/cybercrime-fraud/paypal-phishing-attacks-how-it-works-identifying-threats-and-precautions-to-take.jpg PayPal users are alarmed by a recent cybersecurity breach after researchers discovered a sophisticated malware that targeted the network. This new approach, known as “no-phish phishing,” circumvents conventional phishing strategies, making it one of the most difficult frauds to identify to date. Advanced Cyberattack ...
Read More »Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action https://firewall.firm.in/wp-content/uploads/2025/01/digi.png Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying ...
Read More »MeitY launches ‘Cyber Security Grand Challenge 2.0’ with ₹6.85 crore prize pool – ET CISO
MeitY launches ‘Cyber Security Grand Challenge 2.0’ with ₹6.85 crore prize pool – ET CISO https://etimg.etb2bimg.com/thumb/msid-117285700,imgsize-29956,width-1200,height=765,overlay-etciso/cybercrime-fraud/meity-launches-cyber-security-grand-challenge-2-0-with-6-85-crore-prize-pool.jpg Registration are now open till February 14, for innovative solutions in API Security, Data Protection, Wearable Privacy, Clone App Mitigation, AI Threat Detection, and Biometric Security. The government on Wednesday launched the ‘Cyber Security Grand Challenge 2.0’ (CSGC 2.0) with a total prize money ...
Read More »The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024 https://firewall.firm.in/wp-content/uploads/2025/01/push.png You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost ...
Read More »GenAI can help cos fight cyber threats – ET CISO
GenAI can help cos fight cyber threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-117285935,imgsize-35032,width-1200,height=765,overlay-etciso/cybercrime-fraud/genai-can-help-cos-fight-cyber-threats.jpg As a majority of cybersecurity breaches are due to human errors, advanced tools such as Generative AI (GenAI) can help organisations thwart such threats, according a report by NASSCOM and Data Security Council of India (DSCI). The report has pegged breaches because of human errors to a massive 88%. ...
Read More »how CISOs are defending against next-gen threats, ET CISO
how CISOs are defending against next-gen threats, ET CISO In the rapidly evolving landscape of cybersecurity, the battlefield is no longer restricted between security experts and threat actors, it is extending to include AI-driven threats. In this scenario, Chief Information Security Officers (CISOs) have been tasked with the responsibility to safeguard organizations against these complex emerging cyber threats. The Emergence ...
Read More »