Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign https://firewall.firm.in/wp-content/uploads/2025/12/aws.jpg Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on ...
Read More »Blog
Cyber resilience core to sovereignty: Satya Nadella
Cyber resilience core to sovereignty: Satya Nadella https://etimg.etb2bimg.com/thumb/msid-125933775,imgsize-407925,width-1200,height=627,overlay-etciso,resizemode-75/vulnerabilities-exploits/satya-nadella-cyber-resilience-key-to-national-sovereignty-and-ai-innovation.jpg Microsoft CEO Satya Nadella has insisted that cyber resilience must be an essential pillar of any strategy surrounding sovereignty. He cautioned that autonomy without access to global threat intelligence can create vulnerabilities. While countries are increasingly building sovereign data infrastructure, and mandating that local data remains within the country’s borders, Nadella noted ...
Read More »Personal Data, Responsibility, and the Role of CISOs at ET CISO Data Protection & Privacy Summit 2025, ETCISO
Personal Data, Responsibility, and the Role of CISOs at ET CISO Data Protection & Privacy Summit 2025, ETCISO At the ET CISO Data Protection & Privacy Summit 2025, Hon’ble Justice (Retd.) B. N. Srikrishna—the architect of India’s foundational data protection framework—delivered a sweeping keynote on the evolving philosophy of personal data and the responsibilities it places on enterprises and their ...
Read More »Enterprises move from securing data to proving trust: Leaders unpack the new competitive advantage at ETCISO DP&P Summit 2025
Enterprises move from securing data to proving trust: Leaders unpack the new competitive advantage at ETCISO DP&P Summit 2025 https://etimg.etb2bimg.com/thumb/msid-125930618,imgsize-88480,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/enterprises-move-from-securing-data-to-proving-trust-leaders-unpack-the-new-competitive-advantage-at-etciso-dpp-summit-2025.jpg At the ET CISO Data Protection & Privacy Summit 2025, senior leaders from fintech, insurance, banking, market infrastructure and digital identity platforms examined how trust is shifting from a moral position to a measurable business strategy. Moderated by Sneha Jha, ...
Read More »New React RSC Vulnerabilities Enable DoS and Source Code Exposure
New React RSC Vulnerabilities Enable DoS and Source Code Exposure https://firewall.firm.in/wp-content/uploads/2025/12/react-flaws.jpg Dec 12, 2025Ravie LakshmananSoftware Security / Vulnerability The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the security community while ...
Read More »India building its first OT security testbed: DSCI CEO
India building its first OT security testbed: DSCI CEO https://etimg.etb2bimg.com/thumb/msid-125799440,imgsize-24508,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/india-building-its-first-ot-security-testbed-dsci-ceo.jpg India is emerging as a neutral supplier in the global market for operational technology (OT) security, with the country building its first full-fledged OT security testbed and witnessing the rise of domestic product companies, Data Security Council of India (DSCI) chief executive Vinayak Godse said. Startups and user companies can ...
Read More »What enterprises must do today, ETCISO
What enterprises must do today, ETCISO India’s Digital Personal Data Protection (DPDP) Act and the newly notified DPDP Rules 2025 mark a defining milestone in India’s digital governance journey. It signals India’s transition into a mature, trust-first digital economy. But what sets this framework apart is not just its regulatory strength but the balance that it strikes. It safeguards individual ...
Read More »Digital battlefield: Data dominance, codebreaking and the roots of information warfare
Digital battlefield: Data dominance, codebreaking and the roots of information warfare https://etimg.etb2bimg.com/thumb/msid-125684785,imgsize-255746,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/digital-battlefield-data-dominance-codebreaking-and-the-roots-of-information-warfare.jpg Negligence in data handling leads to large scale data exposure, enabling malicious actors to exploit leaked data for committing fraud, blackmail or identity theft triggering penal statutes. Data is often described as the ‘new oil’ – a strategic asset central to the survival of individuals, corporations or even ...
Read More »Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages https://firewall.firm.in/wp-content/uploads/2025/11/setuptools.jpg Nov 28, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the ...
Read More »Cyber resilience has to begin long before a breach
Cyber resilience has to begin long before a breach https://etimg.etb2bimg.com/thumb/msid-125579023,imgsize-958737,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cyber-resilience-has-to-begin-long-before-a-breach.jpg The moment a cyberattack strikes a large organisation, normality fractures into confusion. Systems slow, dashboards flicker and messages pile up faster than anyone can process. In those first minutes, said Arunkumar Selvaraj, global head for security and compliance at TCS Enterprise Cloud, the experience is always brutally disorienting. Selvaraj, speaking ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











