Valid accounts showed significant increase as initial attack vector in 2024, ET CISO Valid accounts are increasingly being leveraged as an initial attack vector in 2024, representing 31.4% of cases. Public-facing applications still hold the top position with 39.2% of cases. These findings were reported in the recent Kaspersky Incident Response analyst report. The Kaspersky Incident Response analyst report provides ...
Read More »Blog
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure https://firewall.firm.in/wp-content/uploads/2025/03/apache.png Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions – ...
Read More »GenAI to drive productivity gains of up to 46% in Indian banking ops. by 2030: EY report – ET CISO
GenAI to drive productivity gains of up to 46% in Indian banking ops. by 2030: EY report – ET CISO https://etimg.etb2bimg.com/thumb/msid-119100889,imgsize-10620,width-1200,height=765,overlay-etciso/corporate/genai-to-drive-productivity-gains-of-up-to-46-in-indian-banking-ops-by-2030-ey-report.jpg 74% financial firms have initiated GenAI proof-of-concept projects 42% actively allocating budgets toward AI initiatives NBFCs and insurers lead GenAI adoption Rapidly adopting AI across voice bots, email automation, business intelligence, and workflow automation Generative AI (GenAI) is reshaping ...
Read More »Experts debunk Elon Musk’s claim that Ukrainian hackers were behind the attack, ET CISO
Experts debunk Elon Musk’s claim that Ukrainian hackers were behind the attack, ET CISO — Extremely difficult to find the exact origin of DDoS attacks — Botnets often route attacks through devices in unrelated regions — Spoofing techniques allow attackers to mask the true origins — Use of proxy servers or VPNs US billionaire and owner of social media platform ...
Read More »Pentesters: Is AI Coming for Your Role?
Pentesters: Is AI Coming for Your Role? https://firewall.firm.in/wp-content/uploads/2025/03/THN-Article-Header.png We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a Time of Automation, predicting that by 2030, 375 million workers would need to find new jobs or risk being displaced by AI ...
Read More »India’s information security spending to grow 16.4% to $3.3 billion in 2025 – ET CISO
India’s information security spending to grow 16.4% to $3.3 billion in 2025 – ET CISO https://etimg.etb2bimg.com/thumb/msid-118961494,imgsize-81156,width-1200,height=765,overlay-etciso/cybercrime-fraud/indias-information-security-spending-to-grow-16-4-to-3-3-billion-in-2025.jpg Mumbai: Indian enterprises are set to increase their spending on information security, with total end-user spending projected to reach $3.3 billion in 2025, a new report said on Tuesday. This marks a 16.4% increase from 2024, driven by rising cybersecurity threats, evolving regulations, and ...
Read More »Highlights 369.01 million malware detections, ET CISO
Highlights 369.01 million malware detections, ET CISO The study highlights 369.01 million malware detections across an installation base of 8.44 million endpoints across India Seqrite’s latest offering, the Seqrite Malware Analysis Platform, is a cutting-edge tool created to empower cybersecurity professionals to effectively analyze & identify malwares The company’s solution, Seqrite Threat Intel, is a real-time Cyber Defense Hub designed ...
Read More »59% of Indian organizations expect cyber breach in 2025: Zscaler study – ET CISO
59% of Indian organizations expect cyber breach in 2025: Zscaler study – ET CISO https://etimg.etb2bimg.com/thumb/msid-118927471,imgsize-9494,width-1200,height=765,overlay-etciso/data-breaches/59-of-indian-organizations-expect-cyber-breach-in-2025-zscaler-study.jpg 97% of Indian IT leaders ‘believe’ their current cyber resilience measures are effective, yet ransomware attacks continue to rise and cost organizations billions of dollars per year. But only 53% of Indian IT leaders say their cyber resilience strategy is up-to-date in preparation for modern ...
Read More »Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits
Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits https://firewall.firm.in/wp-content/uploads/2025/03/chinese-hackers.png Mar 12, 2025Ravie LakshmananCyber Espionage / Vulnerability The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part of a campaign designed to deploy custom backdoors, highlighting their ability to focus on internal networking infrastructure. “The backdoors had varying ...
Read More »Elon Musk’s empire rocked by cyberattack and financial turmoil – ET CISO
Elon Musk’s empire rocked by cyberattack and financial turmoil – ET CISO https://etimg.etb2bimg.com/thumb/msid-118915833,imgsize-40338,width-1200,height=765,overlay-etciso/cybercrime-fraud/elon-musks-empire-rocked-by-cyberattack-and-financial-turmoil.jpg Adding to Elon Musk’s woes, his social media platform X, formerly known as Twitter, suffered widespread outages on March 10, with tens of thousands of users reporting disruptions. Musk blamed a “massive” cyberattack that he claimed was likely orchestrated by a “large, coordinated group and/or a country.” ...
Read More »