Spies for Hire: China’s new breed of hackers blends espionage and entrepreneurship – ET CISO https://etimg.etb2bimg.com/thumb/msid-85680968,imgsize-30538,width-1200,height=765,overlay-etciso/news/spies-for-hire-chinas-new-breed-of-hackers-blends-espionage-and-entrepreneurship.jpg China’s buzzy high-tech companies do not usually recruit Cambodian speakers, so the job ads for three well-paid positions with those language skills stood out. The ad, seeking writers of research reports, was placed by an internet security startup in China’s tropical island-province of Hainan. ...
Read More »Author Archives: firewallfirmadmin
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw https://firewall.firm.in/wp-content/uploads/2024/05/apps.png May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory. “The implications of this vulnerability pattern include arbitrary ...
Read More »US newspapers sue OpenAI, Microsoft over AI chatbots – ET CISO
US newspapers sue OpenAI, Microsoft over AI chatbots – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773658,imgsize-481616,width-1200,height=765,overlay-etciso/corporate/us-newspapers-sue-openai-microsoft-over-ai-chatbots.jpg Eight US newspapers sued OpenAI and Microsoft in a New York federal court Tuesday for violating their copyright to train the technology behind the ChatGPT and Copilot chatbots. The newspapers, which include The New York Daily News and The Chicago Tribune, are owned by Alden Global Capital, a ...
Read More »AI cannot replace doctors, says IMA chief, IT Security News, ET CISO
AI cannot replace doctors, says IMA chief, IT Security News, ET CISO Artificial intelligence cannot replace doctors though this technology can assist medical practitioners, IMA chief Dr R V Asokan has said. During an interaction with PTI editors, he said the medical profession has always been the first to embrace technology but it cannot supersede the connection between a patient ...
Read More »Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO
Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773721,imgsize-874584,width-1200,height=765,overlay-etciso/corporate/zero-day-vulnerabilities-becoming-major-source-of-cyberattacks-verizon.jpg Cyberattacks stemming from exploitation of vulnerabilities for accessing data have shot up by a staggering 180% in 2023 and almost tripled over the past year, a new study has revealed. The growth is majorly fueled by the MOVEit vulnerability where hackers exploited a zero-day vulnerability in the MOVEit ...
Read More »CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability https://firewall.firm.in/wp-content/uploads/2024/05/gitlab.png May 02, 2024NewsroomVulnerability / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account ...
Read More »Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO
Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773721,imgsize-874584,width-1200,height=765,overlay-etciso/corporate/zero-day-vulnerabilities-becoming-major-source-of-cyberattacks-verizon.jpg Cyberattacks stemming from exploitation of vulnerabilities for accessing data have shot up by a staggering 180% in 2023 and almost tripled over the past year, a new study has revealed. The growth is majorly fueled by the MOVEit vulnerability where hackers exploited a zero-day vulnerability in the MOVEit ...
Read More »RBI cites deficiency in IT risk and information security governance in Kotak Mahindra Bank ruling, ET CISO
RBI cites deficiency in IT risk and information security governance in Kotak Mahindra Bank ruling, ET CISO Mumbai: The RBI on Wednesday barred Kotak Mahindra Bank from onboarding new customers through its online and mobile banking channels and issuing fresh credit cards with immediate effect after the regulator found serious deficiencies in the lender’s IT risk management. These actions, the ...
Read More »Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO
Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO https://etimg.etb2bimg.com/thumb/msid-89821283,imgsize-52790,width-1200,height=765,overlay-etciso/news/comprehensive-law-to-prevent-organisations-from-hiding-data-breaches-rajeev-chandrasekhar.jpg Rajeev Chandrasekhar The government is working on comprehensive laws that will prevent corporations from hiding security and data breaches, said Rajeev Chandrasekhar, Union Minister of State for Electronics and IT. Chandrasekhar was speaking at the launch of IBM’s security command centre in Bengaluru. He said ...
Read More »Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds https://firewall.firm.in/wp-content/uploads/2024/05/blockchain.png May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. ...
Read More »