Hackers Target Middle East Governments with Evasive Apr 19, 2024 NewsroomCyber Espionage / Threat Intelligence Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity company Kaspersky said it discovered the activity in February 2024, with evidence suggesting that it may have been active since ...
Read More »Author Archives: firewallfirmadmin
Safeguarding connected cars from cybersecurity threats
Safeguarding connected cars from cybersecurity threats In an age where technology seamlessly integrates into various aspects of our lives, the concept of smart cars has become increasingly prevalent. These modern vehicles boast an array of features aimed at enhancing convenience, safety, and connectivity. However, along with these advancements comes the looming threat of cybersecurity breaches, which can compromise the safety ...
Read More »Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats
Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats https://firewall.firm.in/wp-content/uploads/2024/04/silverfort.png Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence In today’s rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation of cloud services and remote work arrangements has heightened the vulnerability of digital identities to exploitation, making it imperative for businesses to fortify ...
Read More »Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack https://firewall.firm.in/wp-content/uploads/2024/04/putty.png Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned ...
Read More »Will AI help or hinder trust in science?
Will AI help or hinder trust in science? In the past year, generative artificial intelligence tools – such as ChatGPT, Gemini, and OpenAI’s video generation tool Sora – have captured the public’s imagination. All that is needed to start experimenting with AI is an internet connection and a web browser. You can interact with AI like you would with a ...
Read More »Dutch chipmaker Nexperia hacked by cyber criminals
Dutch chipmaker Nexperia hacked by cyber criminals, IT Security News, ET CISO Dutch-headquartered chipmaker Nexperia was victim of a hacking attack by cyber criminals last month, the Chinese-owned company said on Friday, and was investigating the incident with the help of outside specialists. “Nexperia has become aware that an unauthorized third party accessed certain Nexperia IT servers in March ...
Read More »Mobile security roadmap on anvil for AI-ML threats
Mobile security roadmap on anvil for AI-ML threats With the future pointing to mobile devices being integral parts of the Internet of Things (IoT) operated systems and even drones, India has started working on identifying key security concerns and possible solutions. The Union electronics and information technology ministry (MeitY) has launched Mobile Security Roadmap from 2024 to 2034 with five ...
Read More »Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files https://firewall.firm.in/wp-content/uploads/2024/04/hack.png “Test files” associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part ...
Read More »The AI factor in cybersecurity: Sundareshwar Krishnamurthy, PwC India – ET CISO
The AI factor in cybersecurity: Sundareshwar Krishnamurthy, PwC India – ET CISO https://etimg.etb2bimg.com/thumb/msid-109187878,imgsize-158566,width-1200,height=765,overlay-etciso/ot-security/the-ai-factor-in-cybersecurity-sundareshwar-krishnamurthy-pwc-india.jpg Sundareshwar Krishnamurthy, Partner and Leader – Cybersecurity, PwC India As digital transformation continues to reshape the business landscape, the conversation around cybersecurity has never been more pertinent. In an exclusive interview with ETCISO, Sundareshwar Krishnamurthy, Partner and Leader – Cybersecurity at PwC India, sheds light on the ...
Read More »Securing identities in the cloud has been a headache until now, ET CISO
Securing identities in the cloud has been a headache until now, ET CISO Nathan Wenzler, chief cybersecurity strategist, Tenable Securing identities and roles within any cloud platform is incredibly difficult, especially considering the scalability and complexity inherent in these platforms. Due to the huge number of services, applications and functions that are made available by the cloud platform providers to ...
Read More »