Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions https://etimg.etb2bimg.com/thumb/msid-124284799,imgsize-39892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-gemini-ai-vulnerabilities-exposed-by-tenable.jpg Tenable, the exposure management company, has identified three vulnerabilities in Google’s Gemini suite, collectively dubbed the Gemini Trifecta. These flaws, now remediated, exposed users to significant privacy risks that could have enabled attackers to manipulate Gemini’s behavior and silently steal sensitive data such ...
Read More »Blog Page
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files https://firewall.firm.in/wp-content/uploads/2025/10/zimbra-email-hacking.jpg Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic ...
Read More »Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption
Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption https://etimg.etb2bimg.com/thumb/msid-124329974,imgsize-74936,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/tata-motors-shares-in-focus-as-jlr-prepares-500-million-loan-to-recover-from-cyberattack-disruption.jpg Tata Motors shares are expected to be in focus on Monday, October 6, after its UK-based subsidiary, Jaguar Land Rover (JLR) Automotive Plc, announced plans to raise a privately arranged loan of up to £500 million (approximately $674 million). The funds are intended ...
Read More »AI-powered proactive cyber defense in digital age, ETCISO
AI-powered proactive cyber defense in digital age, ETCISO In today’s hyperconnected world, cyberattacks have evolved from crude email scams into sophisticated, persistent threats that target governments, corporations, and individuals alike. Traditional security systems—firewalls, antivirus programs, and signature-based detection—are no longer sufficient to keep pace with the rapidly shifting tactics of hackers. The need for faster, smarter, and more adaptive defense ...
Read More »Google warns companies: Your top executives may get extortion emails
Google warns companies: Your top executives may get extortion emails https://etimg.etb2bimg.com/thumb/msid-124282446,imgsize-1789114,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-warns-companies-your-top-executives-may-get-extortion-emails.jpg Alphabet’s Google has warned that hackers are sending extortion emails to executives at several organizations, reports news agency Reuters. The hackers, as per the report, are claiming to have stolen sensitive data from Oracle business applications. In a statement, Google said that the messages are part of an ongoing ...
Read More »Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware https://firewall.firm.in/wp-content/uploads/2025/09/chinese-hackerss.jpg Sep 30, 2025Ravie LakshmananCyber Espionage / Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented China-aligned nation-state actor dubbed Phantom Taurus over the past two-and-a-half years. “Phantom Taurus’ main focus areas include ministries of foreign affairs, ...
Read More »Beware this festive season! Cyber criminals go personal with a new wave of frauds; here’s what you should know
Beware this festive season! Cyber criminals go personal with a new wave of frauds; here’s what you should know https://etimg.etb2bimg.com/thumb/msid-124226350,imgsize-181496,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/beware-this-festive-season-cyber-criminals-go-personal-with-a-new-wave-of-frauds-heres-what-you-should-know.jpg Cyber fraud activities are up this festive season, with AI generated tools making the attacks more personal and targeted. Cybersecurity companies report a nearly 40% rise in attacks during festivals, with up to 15% behaviour-based. From targeting shoppers with personalised ...
Read More »Jeetu Patel on AI, Agentic Systems, and Cybersecurity Challenges, ETCISO
Jeetu Patel on AI, Agentic Systems, and Cybersecurity Challenges, ETCISO At a pivotal moment in technology, AI is no longer a distant promise—it’s actively reshaping the cyber threat landscape. Jeetu Patel, President and Chief Product Officer, Cisco, paints a vivid picture of the challenges and opportunities enterprises face as AI systems grow increasingly autonomous. The Agentic Challenge “Everything compounds exponentially ...
Read More »App targeting Charlie Kirk critics leaks user data in huge privacy breach
App targeting Charlie Kirk critics leaks user data in huge privacy breach https://etimg.etb2bimg.com/thumb/msid-124082696,imgsize-1472979,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/app-targeting-charlie-kirk-critics-leaks-user-data-in-huge-privacy-breach.jpg Charlie Kirk critics app privacy breach: An app created to track people accused of criticizing conservative activist Charlie Kirk has been taken offline after a serious privacy breach exposed its own users’ personal information, as per a report. Cancel the Hate App Launched After Charlie Kirk’s Assassination ...
Read More »Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security https://firewall.firm.in/wp-content/uploads/2025/09/bmc-exploit.jpg Sep 23, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











