Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service https://firewall.firm.in/wp-content/uploads/2024/12/hacking.png Dec 11, 2024Ravie LakshmananMalware / Cyber Espionage The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine. The new findings come from the Microsoft threat intelligence team, which ...
Read More »Author Archives: firewallfirmadmin
AI can be misused, climate change a new threat to rights: President Murmu – ET CISO
AI can be misused, climate change a new threat to rights: President Murmu – ET CISO https://etimg.etb2bimg.com/thumb/msid-116188866,imgsize-974938,width-1200,height=765,overlay-etciso/corporate/ai-can-be-misused-climate-change-a-new-threat-to-rights-president-murmu.jpg President Droupadi Murmu on Tuesday said artificial intelligence has entered people’s day-to-day life, solving many problems as well as creating new ones. Cautioning against misuse of AI, she said, “The human rights discourse so far has been centred on the human agency, that ...
Read More »mastering strategies to tackle fourth-party cyber risks, ET CISO
mastering strategies to tackle fourth-party cyber risks, ET CISO Cyber risks or the potential for an organization to experience loss or damage due to cyber attacks, data breaches, or other cyber-related incidents, have increasingly captured the attention of business leaders, as they represent significant operational challenges with the potential to cause severe financial losses and irreparable harm to an organization’s ...
Read More »Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam
Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam https://firewall.firm.in/wp-content/uploads/2024/12/phishing.png Dec 10, 2024Ravie LakshmananMobile Security / Cryptocurrency Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as recruiters, luring unsuspecting victims with job offers,” Zimperium zLabs Vishnu Pratapagiri ...
Read More »TCS launches 2025 cybersecurity outlook: names these 7 key tech priorities for enterprises – ET CISO
TCS launches 2025 cybersecurity outlook: names these 7 key tech priorities for enterprises – ET CISO https://etimg.etb2bimg.com/thumb/msid-116188954,imgsize-23088,width-1200,height=765,overlay-etciso/cybercrime-fraud/tcs-launches-2025-cybersecurity-outlook-names-these-7-key-tech-priorities-for-enterprises.jpg Businesses need to prepare for evolving cyber threats by embracing new technologies like artificial intelligence (AI) for defense and prioritizing cloud security, according to a new report by Tata Consultancy Services (TCS). The report, titled “TCS 2025 Cybersecurity Outlook,” identifies key trends that ...
Read More »Cyberattacks to spike in 2025; healthcare and finance sectors at risk: Report, ET CISO
Cyberattacks to spike in 2025; healthcare and finance sectors at risk: Report, ET CISO NEW DELHI: A recent report by the Data Security Council of India and Seqerite raised serious concerns about the increasing vulnerability of the finance and healthcare sectors to cyberattacks. The India Cyber Threat Report 2025 revealed that these industries would be at an alarming risk because ...
Read More »Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged
Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged https://firewall.firm.in/wp-content/uploads/2024/12/exploit.png Dec 10, 2024Ravie LakshmananVulnerability / Threat Analysis Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat ...
Read More »Indian insurance market: Climbing the growth ladder amidst emerging risks – ET CISO
Indian insurance market: Climbing the growth ladder amidst emerging risks – ET CISO https://etimg.etb2bimg.com/thumb/msid-116157527,imgsize-335590,width-1200,height=765,overlay-etciso/cybercrime-fraud/indian-insurance-market-climbing-the-growth-ladder-amidst-emerging-risks.jpg The Indian insurance sector is growing at a phenomenal pace. The fastest maturing insurance industry among the G20 countries, India’s insurance industry is set to become the sixth biggest insurance market worldwide in the next ten years. Rising consumer awareness, higher incomes, a growing sense of ...
Read More »Report, IT Security News, ET CISO
Report, IT Security News, ET CISO India saw a 3000% increase in cyber attacks on application programming interfaces in the July-September quarter, according to a new report. Focused distributed denial of service (DDoS) attacks were 85% more frequent than those on websites, highlighting the heightened risk landscape for organisations relying heavily on API gateways, cybersecurity company IndusFace said in a ...
Read More »Financial institutions double down on more checks for tech partners – ET CISO
Financial institutions double down on more checks for tech partners – ET CISO https://etimg.etb2bimg.com/thumb/msid-116125812,imgsize-2565646,width-1200,height=765,overlay-etciso/data-breaches/financial-institutions-double-down-on-more-checks-for-tech-partners.jpg Regulated entities such as banks and financial services companies are evaluating options like having backup service providers and tightening their data-sharing norms with technology service companies in the wake of a massive data leak that impacted Signzy. Bengaluru-based Signzy is a regulatory technology firm which offers ...
Read More »