How to rebuild trust after a cybersecurity breach?, IT Security News, ET CISO Bob Huber, Chief Security Officer and Head of Research, Tenable AI innovation and adoption are rapidly advancing in India and globally. Yet, at this peak of technological progress, trust in institutions is waning. A recent study by Edelman reveals that 39% of people are twice as likely ...
Read More »Blog
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans https://firewall.firm.in/wp-content/uploads/2024/10/cisco.png Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and ...
Read More »Facebook owner Meta restarts facial recognition tech in ‘celeb-bait’ crackdown – ET CISO
Facebook owner Meta restarts facial recognition tech in ‘celeb-bait’ crackdown – ET CISO https://etimg.etb2bimg.com/thumb/msid-114449553,imgsize-29960,width-1200,height=765,overlay-etciso/ot-security/facebook-owner-meta-restarts-facial-recognition-tech-in-celeb-bait-crackdown.jpg Three years after Meta shut down facial recognition software on Facebook amid a groundswell of privacy and regulator pushback, the social media giant said on Tuesday it is testing the service again as part of a crackdown on “celeb bait” scams. Meta said it will enroll ...
Read More »Guide: The Ultimate Pentest Checklist for Full-Stack Security
Guide: The Ultimate Pentest Checklist for Full-Stack Security https://firewall.firm.in/wp-content/uploads/2024/10/breacklock.jpg Oct 21, 2024The Hacker NewsPenetration Testing / API Security Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organization’s attack surface, both internal and external. By ...
Read More »Fake Apple products worth more than Rs 1.4 crore seized in Ireland – ET CISO
Fake Apple products worth more than Rs 1.4 crore seized in Ireland – ET CISO https://etimg.etb2bimg.com/thumb/msid-114416492,imgsize-12644,width-1200,height=765,overlay-etciso/corporate/fake-apple-products-worth-more-than-rs-1-4-crore-seized-in-ireland.jpg 800 counterfeit Apple devices have been reportedly seized in Ireland. According to a report by Irish radio station Newstalk, the country’s police have claimed that these devices, including AirPods and iPhone accessories, worth an estimated $173,904 (more than 1.4 crores) were reportedly seized in ...
Read More »Hackers target India’s biggest brands, IT Security News, ET CISO
Hackers target India’s biggest brands, IT Security News, ET CISO Earlier this year, a leading finance company found itself in the middle of a major cybersecurity breach due to a password compromise, leading to leakage of sensitive financial information. However, the case was handled internally and hushed up, according to a person with knowledge of the matter, who did not ...
Read More »Major security breach? ‘Pentagon documents’ leaked online – ET CISO
Major security breach? ‘Pentagon documents’ leaked online – ET CISO https://etimg.etb2bimg.com/thumb/msid-114416419,imgsize-896964,width-1200,height=765,overlay-etciso/data-breaches/major-security-breach-pentagon-documents-leaked-online.jpg A pro-Iranian Telegram account has leaked alleged classified Pentagon documents that detail Israel’s preparations for a potential military strike against Tehran. The documents, published by a pro-Iran Telegram account called “Middle East Spectator,” claim to provide insights into US intelligence observations of Israeli military activities conducted on October 15-16. ...
Read More »Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain
Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain https://firewall.firm.in/wp-content/uploads/2024/10/gambling-hacker.png The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. “Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company ...
Read More »India Cybersecurity Leadership Report 2024 – ET CISO
India Cybersecurity Leadership Report 2024 – ET CISO https://etimg.etb2bimg.com/thumb/msid-114420687,imgsize-58112,width-1200,height=765,overlay-etciso/research/india-cybersecurity-leadership-report-2024.jpg Organizations now view cybersecurity investments as strategic imperatives. C-suite executives recognize that effective cybersecurity measures preserve customer trust, protect brand reputation, and ensure operational continuity. As a result, funding for cybersecurity initiatives is increasingly prioritized, with some companies allocating substantial portions of their IT budgets to cybersecurity solutions. India Cybersecurity Leadership ...
Read More »Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials https://firewall.firm.in/wp-content/uploads/2024/10/roundcube.png Oct 20, 2024Ravie LakshmananVulnerability / Email Security Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as part of a phishing attack designed to steal user credentials. Russian cybersecurity company Positive Technologies said it discovered last month that an ...
Read More »