Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries https://firewall.firm.in/wp-content/uploads/2024/10/hackers.png Oct 09, 2024Ravie LakshmananIndustrial Security / Critical Infrastructure Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification (MMS) protocol that, if successfully exploited, could have severe impacts in industrial environments. “The vulnerabilities could allow an attacker to crash an industrial device or in ...
Read More »Yearly Archives: 2024
Telecommunications: The cornerstone for AI for good, responsible regulations & cybersecurity – ET CISO
Telecommunications: The cornerstone for AI for good, responsible regulations & cybersecurity – ET CISO https://etimg.etb2bimg.com/thumb/msid-114069372,imgsize-118702,width-1200,height=765,overlay-etciso/ot-security/telecommunications-the-cornerstone-for-ai-for-good-responsible-regulations-cybersecurity.jpg Predicting the future is not magic, it’s AI!” – Dave Waters, Supply Chain Today. As the world gains more intelligence ‘artificially’, there is nothing impossible ‘virtually’. Artificial Intelligence (AI) and Machine Learning (ML) have become integral parts of almost all sectors worldwide, India being no ...
Read More »Cyber attackers & defenders get a boost from generative AI, IT Security News, ET CISO
Cyber attackers & defenders get a boost from generative AI, IT Security News, ET CISO Generative AI is now at the centre of a highstakes arms race in the digital realm, forcing both cybersecurity defenders and attackers to adapt rapidly. “As organisations transition from discrete GenAI pilots to enterprise-wide implementations, security risks are increasing given the scale and complexity of ...
Read More »Cyberattack Group ‘Awaken Likho’ Targets Russian Government with Advanced Tools
Cyberattack Group ‘Awaken Likho’ Targets Russian Government with Advanced Tools https://firewall.firm.in/wp-content/uploads/2024/10/russia.png Oct 08, 2024Ravie LakshmananCyber Threat / APT Attack Russian government agencies and industrial entities are the target of an ongoing activity cluster dubbed Awaken Likho. “The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain ...
Read More »Netpoleon India partners with SecurityScorecard to deliver premium supply chain security – ET CISO
Netpoleon India partners with SecurityScorecard to deliver premium supply chain security – ET CISO https://etimg.etb2bimg.com/thumb/msid-114013169,imgsize-44600,width-1200,height=765,overlay-etciso/brand-solution/netpoleon-india-partners-with-securityscorecard-to-deliver-premium-supply-chain-security.jpg Netpoleon is excited to announce its strategic partnership with SecurityScorecard, a renowned provider of Supply Chain Cyber Risk solutions. This new addition to Netpoleon’s technology product portfolio is set to bring comprehensive and cutting-edge cybersecurity solutions to Indian enterprises and MSMEs. SecurityScorecard specializes in offering ...
Read More »AI-driven cyberattacks call for upgraded security measures, ET CISO
AI-driven cyberattacks call for upgraded security measures, ET CISO In a world increasingly reliant on technology, cybercriminals are misusing artificial intelligence (AI) to execute sophisticated attacks, posing significant threats to individuals and organisations alike, according to an expert. Recent high-profile data breach reports involving Star Health exemplify this alarming trend, highlighting the urgent need for upgraded cybersecurity measures. In a ...
Read More »How to Get Going with CTEM When You Don’t Know Where to Start
How to Get Going with CTEM When You Don’t Know Where to Start https://firewall.firm.in/wp-content/uploads/2024/10/xm.jpg Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role ...
Read More »Major govt websites shut for over 36 hrs after ‘virus detected in app’ – ET CISO
Major govt websites shut for over 36 hrs after ‘virus detected in app’ – ET CISO https://etimg.etb2bimg.com/thumb/msid-113957755,imgsize-17654,width-1200,height=765,overlay-etciso/cybercrime-fraud/major-govt-websites-shut-for-over36hrs-after-virus-detected-in-app.jpg Uttarakhand information technology body – Information Technology Development Agency (ITDA) — was purportedly forced to shut down its data-centre hosting around 186 apps of different state departments for nearly 36 hours following the detection of a virus in one of the apps on ...
Read More »Collapse of national security elites’ cyber firm leaves bitter wake, ET CISO
Collapse of national security elites’ cyber firm leaves bitter wake, ET CISO The future was once dazzling for IronNet. Founded by a former director of the National Security Agency and stacked with elite members of the U.S. intelligence establishment, IronNet promised it was going to revolutionize the way governments and corporations combat cyberattacks. Its pitch – combining the prowess of ...
Read More »Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability
Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability https://firewall.firm.in/wp-content/uploads/2024/10/apple.png Oct 05, 2024Ravie LakshmananData Privacy / Mobile Security Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user’s passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described ...
Read More »