Meeting Modern Security Demands: The evolution of security integrators into hybrid solution providers – ET CISO https://etimg.etb2bimg.com/thumb/msid-115169950,imgsize-11204,width-1200,height=765,overlay-etciso/next-gen-tech/meeting-modern-security-demands-the-evolution-of-security-integrators-into-hybrid-solution-providers.jpg The security industry’s evolution from traditional models to hybrid, technology-driven solutions underscore the need for a comprehensive approach. As technological advancements continue at an unprecedented pace and security threats grow increasingly complex, the security industry finds itself at a critical crossroads. Traditional, isolated ...
Read More »Blog
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia https://firewall.firm.in/wp-content/uploads/2024/11/hacking.png Nov 15, 2024Ravie LakshmananMalware / Credential Theft A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer. The malware “targets victims’ sensitive information, including credentials for various online accounts, VPN ...
Read More »VVDN, SecureThings ink pact for cybersecurity in connected vehicles, IoT, network & WiFi gear – ET CISO
VVDN, SecureThings ink pact for cybersecurity in connected vehicles, IoT, network & WiFi gear – ET CISO https://etimg.etb2bimg.com/thumb/msid-115202288,imgsize-173768,width-1200,height=765,overlay-etciso/cybercrime-fraud/vvdn-securethings-ink-pact-for-cybersecurity-in-connected-vehicles-iot-network-wifi-gear.jpg NEW DELHI: Homegrown IT hardware and telecom gear maker VVDN Technologies on Tuesday said it has signed a memorandum of understanding (MoU) with SecureThings.ai to integrate cybersecurity into products and solutions for automotive, networking and Wi-Fi, Internet of Things (IoT), and Cloud ...
Read More »High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables https://firewall.firm.in/wp-content/uploads/2024/11/pistgresql.png Nov 15, 2024Ravie LakshmananVulnerability / Database Security Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure. The vulnerability, tracked as CVE-2024-10979, carries a CVSS score of ...
Read More »Russian cybersecurity experts keen to share expertise with India amid rising threats – ET CISO
Russian cybersecurity experts keen to share expertise with India amid rising threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-115202952,imgsize-48156,width-1200,height=765,overlay-etciso/cybercrime-fraud/russian-cybersecurity-experts-keen-to-share-expertise-with-india-amid-rising-threats.jpg As India’s digital landscape expands rapidly, so too do the threats posed by cybercriminals targeting the country’s key sectors and sensitive data. A leading Russian cybersecurity firm Positive Technologies has revealed that more than two-thirds of cyberattacks in India lead to leaks of confidential ...
Read More »New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse https://firewall.firm.in/wp-content/uploads/2024/11/gib.png Nov 14, 2024Ravie LakshmananCryptojacking / Threat Intelligence Threat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr. The Singaporean cybersecurity company has attributed the novel activity with moderate confidence to the infamous North Korea-linked Lazarus Group, citing ...
Read More »Government issues ‘high’ severity alert for these Apple users; check if your device is on the list – ET CISO
Government issues ‘high’ severity alert for these Apple users; check if your device is on the list – ET CISO https://etimg.etb2bimg.com/thumb/msid-115204515,imgsize-15110,width-1200,height=765,overlay-etciso/ot-security/government-issues-high-severity-alert-for-these-apple-users-check-if-your-device-is-on-the-list.jpg Apple users, the government has a ‘high’ risk warning for you. According to an advisory issued by The Indian Computer Emergency Response Team (CERT-In), multiple Apple devices – iPhones, iPads, MacBook and even the browser Safari are at risk ...
Read More »TikTok Pixel Privacy Nightmare: A New Case Study
TikTok Pixel Privacy Nightmare: A New Case Study https://firewall.firm.in/wp-content/uploads/2024/11/tiktok.png Nov 14, 2024The Hacker NewsData Privacy / Compliance Advertising on TikTok is the obvious choice for any company trying to reach a young market, and especially so if it happens to be a travel company, with 44% of American Gen Zs saying they use the platform to plan their vacations. But ...
Read More »Meet Dr Rakshit Tandon – a distinguished national cyber security expert – ET CISO
Meet Dr Rakshit Tandon – a distinguished national cyber security expert – ET CISO https://etimg.etb2bimg.com/thumb/msid-115284256,imgsize-24170,width-1200,height=765,overlay-etciso/cybercrime-fraud/meet-dr-rakshit-tandon-a-distinguished-national-cyber-security-expert.jpg Losing precious money and information to cyber frauds is a real issue and in our modern digital era, cybersecurity professionals and experts play a crucial role in spreading awareness. Their specialized knowledge proves indispensable in averting monetary damages and sustaining confidence in digital platforms. One ...
Read More »5 BCDR Oversights That Leave You Exposed to Ransomware
5 BCDR Oversights That Leave You Exposed to Ransomware https://firewall.firm.in/wp-content/uploads/2024/11/main.png Ransomware isn’t just a buzzword; it’s one of the most dreaded challenges businesses face in this increasingly digitized world. Ransomware attacks are not only increasing in frequency but also in sophistication, with new ransomware groups constantly emerging. Their attack methods are evolving rapidly, becoming more dangerous and damaging than ever. ...
Read More »