WhatsApp launches ‘Private Processing’ to enhance AI chat privacy: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-120810673,imgsize-31298,width-1200,height=765,overlay-etciso/ot-security/whatsapp-launches-private-processing-to-enhance-ai-chat-privacy-report.jpg Meta, the parent company of WhatsApp, has unveiled a new feature aimed at strengthening user privacy while engaging with artificial intelligence tools within the app. The feature, titled “Private Processing,” is designed to allow users to interact with Meta AI in a more secure and confidential ...
Read More »Author Archives: firewallfirmadmin
Privacy and ethical implications of AI, IT Security News, ET CISO
Privacy and ethical implications of AI, IT Security News, ET CISO Artificial intelligence (AI) has become a transformative force across industries, promising to revolutionize everything from healthcare to finance. However, these advancements have been accompanied by a host of ethical challenges, including concerns about transparency, bias, privacy, and data security. Addressing these issues is crucial to foster responsible AI development ...
Read More »Verizon’s 2025 DBIR: 97% of APAC breaches driven by system intrusion, social engineering, Web App attacks – ET CISO
Verizon’s 2025 DBIR: 97% of APAC breaches driven by system intrusion, social engineering, Web App attacks – ET CISO https://etimg.etb2bimg.com/thumb/msid-120637562,imgsize-11786,width-1200,height=765,overlay-etciso/data-breaches/verizons-2025-dbir-97-of-apac-breaches-driven-by-system-intrusion-social-engineering-web-app-attacks.jpg Verizon Business today released its 2025 Data Breach Investigations Report (DBIR), sounding the alarm on a surge of system intrusions across the Asia-Pacific region. The report reveals that four out of five data breaches in the region stemmed from such ...
Read More »Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers https://firewall.firm.in/wp-content/uploads/2025/05/wordpress.jpg May 01, 2025Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with a variety of features to maintain access, hide itself from the ...
Read More »Bring OTTs under India’s cybersecurity rules: COAI – ET CISO
Bring OTTs under India’s cybersecurity rules: COAI – ET CISO https://etimg.etb2bimg.com/thumb/msid-120750092,imgsize-11640,width-1200,height=765,overlay-etciso/ot-security/bring-otts-under-indias-cybersecurity-rules-coai.jpg Telecom carriers have called on the government to bring over-the-top (OTT) communication platforms such as WhatsApp, Signal, Telegram amongst others within the ambit of India’s cybersecurity and related regulatory rules — that now apply to telcos —- to combat the menace of spam/scam calls and messages. “Cybersecurity measures need ...
Read More »SBI cautions users against viral deepfake videos promoting fraud, ET CISO
SBI cautions users against viral deepfake videos promoting fraud, ET CISO The State Bank of India (SBI) has issued a Public Caution Notice to alert customers and the general public about a surge in deepfake scam videos circulating on social media. These videos falsely claim that SBI, in collaboration with the Government of India and multinational corporations, has launched an ...
Read More »GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages https://firewall.firm.in/wp-content/uploads/2025/04/google.gif Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s based on Apache Airflow. “This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their ...
Read More »The evolution of fraud detection: From static rules to AI-driven analytics – ET CISO
The evolution of fraud detection: From static rules to AI-driven analytics – ET CISO https://etimg.etb2bimg.com/thumb/msid-120504757,imgsize-5110,width-1200,height=765,overlay-etciso/cybercrime-fraud/the-evolution-of-fraud-detection-from-static-rules-to-ai-driven-analytics.jpg Financial fraud works the same way, hiding in plain sight, growing more sophisticated while financial institutions remain convinced that they have it under control. Banks and financial institutions have been on an endless chase with frauds and fraudsters. What once needed physical presence and forged ...
Read More »IIFL Home Loans appoints Gunjan Mody as CISO, IT Security News, ET CISO
IIFL Home Loans appoints Gunjan Mody as CISO, IT Security News, ET CISO Gunjan Mody has joined IIFL Home Loans as the Chief Information Security Officer (CISO). In this role, he will be responsible for setting up and managing the cybersecurity function, implementing robust controls, and deploying cutting-edge solutions to safeguard the organization against growing cyber threats. Mody brings with ...
Read More »Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors https://firewall.firm.in/wp-content/uploads/2025/04/malware-attack.jpg The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a ...
Read More »