The $10 Cyber Threat Responsible for the Biggest Breaches of 2024 https://firewall.firm.in/wp-content/uploads/2025/01/push.png You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost ...
Read More »Author Archives: firewallfirmadmin
GenAI can help cos fight cyber threats – ET CISO
GenAI can help cos fight cyber threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-117285935,imgsize-35032,width-1200,height=765,overlay-etciso/cybercrime-fraud/genai-can-help-cos-fight-cyber-threats.jpg As a majority of cybersecurity breaches are due to human errors, advanced tools such as Generative AI (GenAI) can help organisations thwart such threats, according a report by NASSCOM and Data Security Council of India (DSCI). The report has pegged breaches because of human errors to a massive 88%. ...
Read More »how CISOs are defending against next-gen threats, ET CISO
how CISOs are defending against next-gen threats, ET CISO In the rapidly evolving landscape of cybersecurity, the battlefield is no longer restricted between security experts and threat actors, it is extending to include AI-driven threats. In this scenario, Chief Information Security Officers (CISOs) have been tasked with the responsibility to safeguard organizations against these complex emerging cyber threats. The Emergence ...
Read More »Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool https://firewall.firm.in/wp-content/uploads/2025/01/rsync.png Jan 15, 2025Ravie LakshmananVulnerability / Software Update As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. “Attackers can take control of a malicious server and read/write arbitrary ...
Read More »Varsities must develop short cybersecurity courses: Guv – ET CISO
Varsities must develop short cybersecurity courses: Guv – ET CISO https://etimg.etb2bimg.com/thumb/msid-117191103,imgsize-268384,width-1200,height=765,overlay-etciso/cybercrime-fraud/varsities-must-develop-short-cybersecurity-courses-guv.jpg All universities in Maharashtra will have to develop and implement short-term courses on cybersecurity, Governor CP Radhakrishnan said on Sunday, adding that these courses will help varsities create ‘a new generation of cyber warriors’. Radhakrishnan was speaking at the ‘Cyber Education for Cyber Security Awards’ programme in the city. ...
Read More »Draft DPDP rules to push banks to strengthen data privacy measures, ET CISO
Draft DPDP rules to push banks to strengthen data privacy measures, ET CISO The draft Digital Personal Data Protection (DPDP) rules, requiring explicit customer consent for using data beyond its original intent, are set to redefine data governance in the banking sector. These rules leave no room for regulatory arbitrage, compelling banks to enhance compliance mechanisms and formalise data-sharing agreements ...
Read More »Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 https://firewall.firm.in/wp-content/uploads/2025/01/web3.png Jan 15, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. “The campaign begins with fake recruiters, posing on platforms like ...
Read More »Tech companies are turning to ‘synthetic data’ to train AI models – but there’s a hidden cost – ET CISO
Tech companies are turning to ‘synthetic data’ to train AI models – but there’s a hidden cost – ET CISO https://etimg.etb2bimg.com/thumb/msid-117191975,imgsize-25078,width-1200,height=765,overlay-etciso/corporate/tech-companies-are-turning-to-synthetic-data-to-train-ai-models-but-theres-a-hidden-cost.jpg Last week the billionaire and owner of X, Elon Musk, claimed the pool of human-generated data that’s used to train artificial intelligence (AI) models such as ChatGPT has run out. Musk didn’t cite evidence to support this. But other ...
Read More »entering UPI pin casually can empty your bank account, know how you can protect yourself, ET CISO
entering UPI pin casually can empty your bank account, know how you can protect yourself, ET CISO Cybercriminals keep coming up with new innovative ways to scam people of their money. Unified Payment Interface (UPI) has become the most popular way of digital payment in India, however, the convenience offered by UPI may also lead to huge loss if you ...
Read More »Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes https://firewall.firm.in/wp-content/uploads/2025/01/google-ads.png Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. “The scheme consists of stealing as many advertiser accounts as possible ...
Read More »