How to Get Going with CTEM When You Don’t Know Where to Start https://firewall.firm.in/wp-content/uploads/2024/10/xm.jpg Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role ...
Read More »Blog
Major govt websites shut for over 36 hrs after ‘virus detected in app’ – ET CISO
Major govt websites shut for over 36 hrs after ‘virus detected in app’ – ET CISO https://etimg.etb2bimg.com/thumb/msid-113957755,imgsize-17654,width-1200,height=765,overlay-etciso/cybercrime-fraud/major-govt-websites-shut-for-over36hrs-after-virus-detected-in-app.jpg Uttarakhand information technology body – Information Technology Development Agency (ITDA) — was purportedly forced to shut down its data-centre hosting around 186 apps of different state departments for nearly 36 hours following the detection of a virus in one of the apps on ...
Read More »Collapse of national security elites’ cyber firm leaves bitter wake, ET CISO
Collapse of national security elites’ cyber firm leaves bitter wake, ET CISO The future was once dazzling for IronNet. Founded by a former director of the National Security Agency and stacked with elite members of the U.S. intelligence establishment, IronNet promised it was going to revolutionize the way governments and corporations combat cyberattacks. Its pitch – combining the prowess of ...
Read More »Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability
Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability https://firewall.firm.in/wp-content/uploads/2024/10/apple.png Oct 05, 2024Ravie LakshmananData Privacy / Mobile Security Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user’s passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described ...
Read More »AI is too important not to be regulated: Google’s Roma Datta Chobey – ET CISO
AI is too important not to be regulated: Google’s Roma Datta Chobey – ET CISO https://etimg.etb2bimg.com/thumb/msid-113958098,imgsize-21236,width-1200,height=765,overlay-etciso/next-gen-tech/ai-is-too-important-not-to-be-regulated-googles-roma-datta-chobey.jpg Google’s strategy in India will continue to be closely aligned with the country’s aspirations of becoming a developed nation in the next two decades, Roma Datta Chobey, Google’s managing director and interim country manager for India, told ET’s Surabhi Agarwal and Annapurna Roy in ...
Read More »Irish privacy regulator probes Ryanair’s use of facial recognition, ET CISO
Irish privacy regulator probes Ryanair’s use of facial recognition, ET CISO Ireland’s Data Protection Commissioner (DPC) opened an EU-wide probe on Friday into whether Ryanair’s use of facial recognition technology to verify the identity of customers booking through third party websites violates the bloc’s privacy laws. The regulator said it had received a number of complaints from Ryanair customers across ...
Read More »U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown
U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown https://firewall.firm.in/wp-content/uploads/2024/10/hacker.png Oct 04, 2024Ravie LakshmananPhishing Attack / Cybercrime Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country. “The Russian government ran this ...
Read More »India, a StAR FinCrimefighter: Country’s growing capacity in asset recovery & tackling cybercrime threats – ET CISO
India, a StAR FinCrimefighter: Country’s growing capacity in asset recovery & tackling cybercrime threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-113928727,imgsize-178550,width-1200,height=765,overlay-etciso/ot-security/india-a-star-fincrimefighter-countrys-growing-capacity-in-asset-recovery-tackling-cybercrime-threats.jpg Public institutions’ capacity to design, implement and enforce policies is key to a country’s development. The Paris-headquartered Financial Action Task Force’s (FATF) Mutual Evaluation Report (MER) on India released last month highlights the strength of India’s institutions in shaping its development. Examining ...
Read More »New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking https://firewall.firm.in/wp-content/uploads/2024/10/linux.png Oct 03, 2024Ravie LakshmananLinux / Malware Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. “Perfctl is particularly elusive and persistent, employing several sophisticated techniques,” Aqua security researchers Assaf ...
Read More »‘State actor’ blamed for massive Dutch police hack – ET CISO
‘State actor’ blamed for massive Dutch police hack – ET CISO https://etimg.etb2bimg.com/thumb/msid-113898010,imgsize-52440,width-1200,height=765,overlay-etciso/cybercrime-fraud/state-actor-blamed-for-massive-dutch-police-hack.jpg An unnamed “state actor” was most likely behind the hacking of thousands of Dutch police contact details last week, the country’s justice minister said on Wednesday. David van Weel revealed the data leak Friday, which Dutch media reports said contained details of almost all 65,000 police officers in ...
Read More »