Securing India’s digital sovereignty with homegrown web browser, ET CISO Ashwini Vaishnaw, Union Minister of Electronics and Information Technology, announced the winners of Indian Web Browser Development Challenge (IWBDC) in a function organized by MeitY on 20th March, 2025. As India continues its journey toward digital self-reliance, the Ministry of Electronics & Information Technology has taken a bold step by ...
Read More »Blog
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe https://firewall.firm.in/wp-content/uploads/2025/03/tornado-cash.png Mar 22, 2025Ravie LakshmananFinancial Security / Cryptocurrency The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. “Based on the Administration’s review of the ...
Read More »FBI asks Android and iPhone users in US to delete these messages immediately – ET CISO
FBI asks Android and iPhone users in US to delete these messages immediately – ET CISO https://etimg.etb2bimg.com/thumb/msid-119329306,imgsize-63996,width-1200,height=765,overlay-etciso/cybercrime-fraud/fbi-asks-android-and-iphone-users-in-us-to-delete-these-messages-immediately.jpg Chinese phishers are reportedly targeting US residents with text messages that appear to be from US toll road operators. These “smishing” texts are said to be targeting iPhone and Android users across America with fake toll bills. The FBI has advised users to ...
Read More »54% increase in cyber threats originating from servers hosted in India, 2024, ET CISO
54% increase in cyber threats originating from servers hosted in India, 2024, ET CISO Global cybersecurity and digital privacy firm Kaspersky revealed a 54% increase in threat sources originating from servers hosted in India in 2024 compared to the previous year. The data processed by Kaspersky Security Network (KSN) shows that in the period between January to December 2024, 7,157,431 ...
Read More »Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed https://firewall.firm.in/wp-content/uploads/2025/03/action.png The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects, before evolving into something more widespread in scope. “The payload was focused on exploiting the public CI/CD flow of one of their open source projects ...
Read More »Global trust in digital services declines, find Thales – ET CISO
Global trust in digital services declines, find Thales – ET CISO https://etimg.etb2bimg.com/thumb/msid-119330494,imgsize-9900,width-1200,height=765,overlay-etciso/corporate/global-trust-in-digital-services-declines-find-thales.jpg Thales 2025 Digital Trust Index reveals most industries experienced a decline in consumer trust compared to last year Privacy fears are becoming a major factor in consumer decisions to abandon brands. 82% doing so last year Banking tops the Trust Index for the second year in a row, ...
Read More »Why Indian enterprises need a proactive cyber risk strategy, ET CISO
Why Indian enterprises need a proactive cyber risk strategy, ET CISO Rs 20,000 crore. It is a staggering figure. According to a CloudSek report, India could face the estimated loss this year because of cybercrime. The fact that cybercrime has been on the rise is not surprising. With the latest tech at disposal, cybercriminals are using AI tools, deepfakes, and ...
Read More »UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools
UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools https://firewall.firm.in/wp-content/uploads/2025/03/hacker-cde.png Mar 21, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination ...
Read More »AI is reshaping third-party risk management – are you keeping up? – ET CISO
AI is reshaping third-party risk management – are you keeping up? – ET CISO https://etimg.etb2bimg.com/thumb/msid-119213079,imgsize-12668,width-1200,height=765,overlay-etciso/brand-solution/ai-is-reshaping-third-party-risk-management-are-you-keeping-up.jpg Picture this: A fast-growing company wakes up to a crisis. A trusted supplier has been breached. The attackers didn’t come through the front door; they snuck in through the supply chain. Now, customer data is exposed, operations are halted, and reputational damage is spiraling out ...
Read More »Inside Abhijit Chakravarty’s cybersecurity playbook, ET CISO
Inside Abhijit Chakravarty’s cybersecurity playbook, ET CISO Abhijit Chakravarty, Executive Vice President at Kotak Bank, is not just a cybersecurity expert—he is a strategist, an innovator, and a visionary leader. His journey reflects relentless curiosity, a deep problem-solving mindset, and an unwavering commitment to securing the digital landscape. More than just navigating a successful career, Chakravarty has built a reputation ...
Read More »