India unveils CSIRT-Power to fortify power sector against cyber threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-113620443,imgsize-51382,width-1200,height=765,overlay-etciso/cybercrime-fraud/india-unveils-csirt-power-to-fortify-power-sector-against-cyber-threats.jpg In a significant move to safeguard India’s critical power infrastructure, Union minister Manohar Lal inaugurated the Computer Security Incident Response Team – Power (CSIRT-Power) at Northern Regional Power Committee in New Delhi. The facility is a targeted response to the growing threat of cyberattacks which pose ...
Read More »Blog
European Union gets ready to ‘target’ Google again, what it may mean for the company’s business model, ET CISO
European Union gets ready to ‘target’ Google again, what it may mean for the company’s business model, ET CISO (Representative Image) The European Union is poised to launch a new antitrust offensive against Google, targeting the tech giant’s dominance in search services, according to sources familiar with the matter. This move could result in substantial fines and force significant changes ...
Read More »Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk
Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk https://firewall.firm.in/wp-content/uploads/2024/09/chip-hacking.png Sep 23, 2024Ravie LakshmananIoT Security / Vulnerability A critical security flaw has been disclosed in the Microchip Advanced Software Framework (ASF) that, if successfully exploited, could lead to remote code execution. The vulnerability, tracked as CVE-2024-7490, carries a CVSS score of 9.5 out of a maximum ...
Read More »CISOs decode return on security investment and cyber risk governance – ET CISO
CISOs decode return on security investment and cyber risk governance – ET CISO https://etimg.etb2bimg.com/thumb/msid-113519576,imgsize-33392,width-1200,height=765,overlay-etciso/ciso-strategies/cisos-decode-return-on-security-investment-and-cyber-risk-governance.jpg Rajesh Thapar, CISO of NSE, emphasized the evolving role of CISOs as business enablers. “CISOs need to be business enablers with knowledge of compliance and financial management. Skills have changed, and negotiation is needed. You need to be an influencer and convince stakeholders,” he said. Thapar ...
Read More »Why ‘Never Expire’ Passwords Can Be a Risky Decision
Why ‘Never Expire’ Passwords Can Be a Risky Decision https://firewall.firm.in/wp-content/uploads/2024/09/password.png Sep 23, 2024The Hacker NewsPassword Management / Data Breach Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your password’ notification – and they like it even less when the new passwords they create are rejected by their organization’s password policy. IT ...
Read More »Star Health hacked:Data of 31 million customers available for free on Telegram – ET CISO
Star Health hacked:Data of 31 million customers available for free on Telegram – ET CISO https://etimg.etb2bimg.com/thumb/msid-113587699,imgsize-24152,width-1200,height=765,overlay-etciso/cybercrime-fraud/star-health-hacked-name-address-phone-numbers-medical-reports-and-other-data-of-31-million-customers-available-for-free-on-telegram.jpg A massive hacking at one of India’s largest health insurers, Star Health, has exposed the private details of over 31 million customers. The stolen data, including sensitive medical reports, has been made publicly accessible through chatbots on the messaging app, Telegram. According to a ...
Read More »Seoul summit, IT Security News, ET CISO
Seoul summit, IT Security News, ET CISO Speakers including Dr. Radha Plumb, Chief Digital and Artificial Intelligence Officer, U.S. Department of Defense (third from left), discuss responsible AI use in a plenary session at the Responsible AI in the Military domain (REAIM) summit in Seoul, South Korea, September 9, 2024. Yonhap via REUTERS Humans not artificial intelligence should make the ...
Read More »THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22)
THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22) https://firewall.firm.in/wp-content/uploads/2024/09/recap.png Sep 23, 2024Ravie LakshmananCybersecurity / Cyber Threat Hold on tight, folks, because last week’s cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling “dream jobs” to expose a new malware, to a surprising twist in the Apple vs. NSO Group saga. Even the seemingly ...
Read More »Ukraine bans use of Telegram on these devices on ‘spying concerns’ – ET CISO
Ukraine bans use of Telegram on these devices on ‘spying concerns’ – ET CISO https://etimg.etb2bimg.com/thumb/msid-113587759,imgsize-16756,width-1200,height=765,overlay-etciso/ot-security/ukraine-bans-use-of-telegram-on-these-devices-on-spying-concerns.jpg Ukraine has banned the use of Telegram on government-issued devices due to concerns that Russia can use the app to spy on communications and track users, a report has said. The ban was announced by the National Security and Defence Council after the head of ...
Read More »Cyber resilience pays off, breached organizations increase spending, ET CISO
Cyber resilience pays off, breached organizations increase spending, ET CISO Commvault, a leading provider of cyber resilience and data protection solutions for hybrid cloud organizations, today released new critical insights from its 2024 Cyber Recovery Readiness Report. This global survey of 1,000 security and IT professionals across 11 countries, reveals interesting behavior changes for organizations that have been breached versus ...
Read More »