Scybers Recognized in Forbes India Select 200 – DGEMS 2024 – ET CISO https://etimg.etb2bimg.com/thumb/msid-115484499,imgsize-23506,width-1200,height=765,overlay-etciso/ot-security/scybers-recognized-in-forbes-india-select-200-dgems-2024.jpg Scybers, a rapidly expanding global cybersecurity firm, has been honored with a spot in the Forbes India Select 200 – DGEMS 2024, an exclusive list that recognizes dynamic entrepreneurs and companies with exceptional global growth potential. This recognition underscores Scybers’ commitment to driving innovation in cybersecurity ...
Read More »Author Archives: firewallfirmadmin
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments https://firewall.firm.in/wp-content/uploads/2024/11/payment-fraud.png Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment ...
Read More »India’s 500 GW renewable energy goal spurs call for advanced cybersecurity measures – ET CISO
India’s 500 GW renewable energy goal spurs call for advanced cybersecurity measures – ET CISO https://etimg.etb2bimg.com/thumb/msid-115485663,imgsize-33070,width-1200,height=765,overlay-etciso/next-gen-tech/indias-500-gw-renewable-energy-goal-spurs-call-for-advanced-cybersecurity-measures.jpg New Delhi: As India scales up digital initiatives to meet its ambitious renewable energy targets, cybersecurity challenges have come into sharp focus, especially in critical sectors like power transmission and distribution. Experts at the ET Energyworld SmartEnergy Summit 2024, during the panel discussion on ...
Read More »Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts https://firewall.firm.in/wp-content/uploads/2024/11/streaming.png Nov 19, 2024Ravie LakshmananCloud Security / Piracy Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed ...
Read More »India Inc GenAI adoption gains momentum, moves beyond experimentation: Report – ET CISO
India Inc GenAI adoption gains momentum, moves beyond experimentation: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-115355506,imgsize-88744,width-1200,height=765,overlay-etciso/next-gen-tech/india-inc-genai-adoption-gains-momentum-moves-beyond-experimentation-report.jpg Indian organisations are increasingly moving beyond experimentation with generative AI (GenAI) to focus on transformative use cases, according to NTT DATA’s Global GenAI Report: How Organizations are Mastering their GenAI Destiny in 2025. The report highlights significant investments in GenAI technologies across the country, with 67% ...
Read More »Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices https://firewall.firm.in/wp-content/uploads/2024/11/botnet.png The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly ...
Read More »Rajasthan cyber scamsters use wedding invites on WhatsApp for data theft – ET CISO
Rajasthan cyber scamsters use wedding invites on WhatsApp for data theft – ET CISO https://etimg.etb2bimg.com/thumb/msid-115404963,imgsize-17654,width-1200,height=765,overlay-etciso/cybercrime-fraud/rajasthan-cyber-scamsters-use-wedding-invites-on-whatsapp-for-data-theft.jpg JAIPUR: With the wedding season in full swing, the city police have issued a warning to the public not to open wedding invitations files sent via WhatsApp from unknown numbers. Conmen are embedding phishing links in such e-invite cards, cops said. “Cyber fraudsters are using ...
Read More »Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority https://firewall.firm.in/wp-content/uploads/2024/11/silverfort.png Nov 19, 2024The Hacker NewsInsider Threat / Credential Security Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of ...
Read More »Consumer awareness, use of AI & constant vigilance: HDFC Bank & TOI’s Cyber Security Summit explores how menace of cyber frauds can be dealt with – ET CISO
Consumer awareness, use of AI & constant vigilance: HDFC Bank & TOI’s Cyber Security Summit explores how menace of cyber frauds can be dealt with – ET CISO https://etimg.etb2bimg.com/thumb/msid-115449570,imgsize-77636,width-1200,height=765,overlay-etciso/cybercrime-fraud/consumer-awareness-use-of-ai-constant-vigilance-hdfc-bank-tois-cyber-security-summit-explores-how-menace-of-cyber-frauds-can-be-dealt-with.jpg Consumer awareness is the first step to preventing cyber frauds – that’s the big takeaway from HDFC Bank’s Cyber Security Summit organized in collaboration with TOI in New Delhi. Greed, fear ...
Read More »New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems
New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems https://firewall.firm.in/wp-content/uploads/2024/11/locker.png Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. “Helldown deploys Windows ransomware derived from the LockBit 3.0 code,” Sekoia said in a report shared with The Hacker News. “Given ...
Read More »