92 pc of Indian executives cite security vulnerabilities as primary obstacle to responsible AI usage: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-116401429,imgsize-32802,width-1200,height=765,overlay-etciso/cybercrime-fraud/92-pc-of-indian-executives-cite-security-vulnerabilities-as-primary-obstacle-to-responsible-ai-usage-report.jpg A significant majority of Indian executives, around 92 per cent, view security vulnerabilities such as hacking and cyber threats as the primary barrier to responsible AI adoption, as per a report by Deloitte. The report highlights growing concerns over privacy ...
Read More »Author Archives: firewallfirmadmin
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal https://firewall.firm.in/wp-content/uploads/2024/12/mark.png Dec 17, 2024Ravie LakshmananCyber Espionage / Mobile Security A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing ...
Read More »Strengthening enterprise application ecosystems against disruptions – ET CISO
Strengthening enterprise application ecosystems against disruptions – ET CISO https://etimg.etb2bimg.com/thumb/msid-116388462,imgsize-8748,width-1200,height=765,overlay-etciso/cybercrime-fraud/strengthening-enterprise-application-ecosystems-against-disruptions.jpg In an era where disruption is relentless and often unpredictable, enterprise applications are vulnerable to a range of threats, from undersea cable sabotage and AI deepfakes to restrictive regulations. As organizations rely on increasingly complex application ecosystems, it’s crucial to integrate resilience into applications to ensure business continuity. This involves ...
Read More »DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages
DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages https://firewall.firm.in/wp-content/uploads/2024/12/adclick.png Dec 16, 2024Ravie LakshmananMalvertising / Threat Intelligence Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad ...
Read More »LTIMindtree sets up 100-seater cyber defense center – ET CISO
LTIMindtree sets up 100-seater cyber defense center – ET CISO https://etimg.etb2bimg.com/thumb/msid-116367696,imgsize-1047078,width-1200,height=765,overlay-etciso/cybercrime-fraud/ltimindtree-sets-up-100-seater-cyber-defense-center.jpg LTIMindtree, country’s sixth largest IT services company, on Monday announced the launch of its 100-seater Cyber Defense Resiliency Center (CDRC) in Bengaluru. The facility will serve as an experience center showcasing LTIMindtree’s data security capabilities for clients. “With this launch, LTIMindtree will offer its global clients support and protection ...
Read More »Banks struggle to meet SEBI’s cybersecurity deadline amid new regulations, ET CISO
Banks struggle to meet SEBI’s cybersecurity deadline amid new regulations, ET CISO Overwhelmed by a thicket of demanding rules, banks will miss the January 1 deadline set by the capital market regulator to put in place a cybersecurity framework. Last week, several banks, particularly the multinational lenders offering custody and investment banking services, asked the Securities & Exchange Board of ...
Read More »Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO
Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO https://etimg.etb2bimg.com/thumb/msid-116354721,imgsize-39436,width-1200,height=765,overlay-etciso/data-breaches/why-you-take-phone-chargers-from-unknown-people-hackers-can-steal-data-tips-to-stay-safe.jpg We’ve all been there — scrambling to find a charger when our phone’s battery is running low, only to settle for using someone else’s cable. But this simple act of sharing a charger could expose you to significant cybersecurity risks. ...
Read More »NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool
NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool https://firewall.firm.in/wp-content/uploads/2024/12/spyware.png A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ...
Read More »Digital payment agency NPCI highlights common tactics used by fraudsters, shares tips to stay safe – ET CISO
Digital payment agency NPCI highlights common tactics used by fraudsters, shares tips to stay safe – ET CISO https://etimg.etb2bimg.com/thumb/msid-116367839,imgsize-80642,width-1200,height=765,overlay-etciso/cybercrime-fraud/digital-payment-agency-npci-highlights-common-tactics-used-by-fraudsters-shares-tips-to-stay-safe.jpg The National Payments Corporation of India (NPCI) has issued a public advisory cautioning citizens about the growing menace of the ‘Digital Arrest’ scam. As India increasingly embraces digital payments, including the Unified Payments Interface (UPI), online frauds have surged. Prime Minister ...
Read More »AI in cybersecurity a battle between protection and exploitation: Experts, ET CISO
AI in cybersecurity a battle between protection and exploitation: Experts, ET CISO While artificial intelligence (AI), is being extensively used for disruptions in technology, it is much harder to use for protecting technology. This is due to the nature of the prompts required, making it challenging to apply AI effectively in cybersecurity, cite experts. They say designing and deploying AI ...
Read More »