Rajasthan cyber scamsters use wedding invites on WhatsApp for data theft – ET CISO https://etimg.etb2bimg.com/thumb/msid-115404963,imgsize-17654,width-1200,height=765,overlay-etciso/cybercrime-fraud/rajasthan-cyber-scamsters-use-wedding-invites-on-whatsapp-for-data-theft.jpg JAIPUR: With the wedding season in full swing, the city police have issued a warning to the public not to open wedding invitations files sent via WhatsApp from unknown numbers. Conmen are embedding phishing links in such e-invite cards, cops said. “Cyber fraudsters are using ...
Read More »Blog
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority https://firewall.firm.in/wp-content/uploads/2024/11/silverfort.png Nov 19, 2024The Hacker NewsInsider Threat / Credential Security Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of ...
Read More »Consumer awareness, use of AI & constant vigilance: HDFC Bank & TOI’s Cyber Security Summit explores how menace of cyber frauds can be dealt with – ET CISO
Consumer awareness, use of AI & constant vigilance: HDFC Bank & TOI’s Cyber Security Summit explores how menace of cyber frauds can be dealt with – ET CISO https://etimg.etb2bimg.com/thumb/msid-115449570,imgsize-77636,width-1200,height=765,overlay-etciso/cybercrime-fraud/consumer-awareness-use-of-ai-constant-vigilance-hdfc-bank-tois-cyber-security-summit-explores-how-menace-of-cyber-frauds-can-be-dealt-with.jpg Consumer awareness is the first step to preventing cyber frauds – that’s the big takeaway from HDFC Bank’s Cyber Security Summit organized in collaboration with TOI in New Delhi. Greed, fear ...
Read More »New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems
New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems https://firewall.firm.in/wp-content/uploads/2024/11/locker.png Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. “Helldown deploys Windows ransomware derived from the LockBit 3.0 code,” Sekoia said in a report shared with The Hacker News. “Given ...
Read More »Cybersecurity in healthcare to grow from reactive to proactive measures – ET CISO
Cybersecurity in healthcare to grow from reactive to proactive measures – ET CISO https://etimg.etb2bimg.com/thumb/msid-115438468,imgsize-48482,width-1200,height=765,overlay-etciso/cybercrime-fraud/cybersecurity-in-healthcare-to-grow-from-reactive-to-proactive-measures.jpg The healthcare industry is expected to step up spending on cybersecurity, with hospitals currently allocating 8–10% of their IT budgets for hiring experts and deploying tools to prevent cyberattacks. According to a Deloitte India analysis, this will increase to 12–15% in the next two years– from ...
Read More »powering cybersecurity in the digital age, IT Security News, ET CISO
powering cybersecurity in the digital age, IT Security News, ET CISO I still remember the time in school when my father would hand me a ‘self’ cheque to withdraw cash from my bank account. To me, it was a symbol of responsibility. Safely cycling the four kilometers to the bank, I was always cautious, avoiding isolated stretches where I could ...
Read More »Facebook users affected by data breach eligible for compensation, German court says – ET CISO
Facebook users affected by data breach eligible for compensation, German court says – ET CISO https://etimg.etb2bimg.com/thumb/msid-115438376,imgsize-3037,width-1200,height=765,overlay-etciso/data-breaches/facebook-users-affected-by-data-breach-eligible-for-compensation-german-court-says.jpg BERLIN, – A German court said on Monday that Facebook users whose data was illegally obtained in 2018 and 2019 were eligible for compensation. The Federal Court of Justice (BGH) ruled that the loss of control over one’s data online was grounds for damages ...
Read More »New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers https://firewall.firm.in/wp-content/uploads/2024/11/malware.png Nov 18, 2024Ravie LakshmananThreat Intelligence / Ransomware Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed in the wild delivering information stealer families such as WhiteSnake and Meduza. BabbleLoader is an “extremely evasive loader, packed with defensive mechanisms, that is designed ...
Read More »Securing the data infrastructure: The key pillar of modern app development – ET CISO
Securing the data infrastructure: The key pillar of modern app development – ET CISO https://etimg.etb2bimg.com/thumb/msid-115405947,imgsize-119898,width-1200,height=765,overlay-etciso/ciso-strategies/securing-the-data-infrastructure-the-key-pillar-of-modern-app-development.jpg Cyber-attacks continue to be the top concern for business leaders worldwide. Data is at the heart of innovation in modern app development, and the infrastructure used to support these applications is under constant attack, especially data. With the rise in data breaches and the sophistication ...
Read More »The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think https://firewall.firm.in/wp-content/uploads/2024/11/git.png According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year’s report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded ...
Read More »