ZAST.AI Raises $6M Pre-A to Scale https://firewall.firm.in/wp-content/uploads/2026/02/zast.gif The Hacker NewsFeb 10, 2026Application Security / Artificial Intelligence January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total funding close to $10 million. This marks a recognition from leading capital markets of ...
Read More »Blog
Most cyber incidents begin with human behaviour, not hackers: Evaa Saiwal, Policybazaar for Business
Most cyber incidents begin with human behaviour, not hackers: Evaa Saiwal, Policybazaar for Business https://etimg.etb2bimg.com/thumb/msid-128140230,imgsize-12238,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/most-cyber-incidents-begin-with-human-behaviour-not-hackers-evaa-saiwal-policybazaar-for-business.jpg Gartner predicts that by 2025, most cyber incidents will stem from human behaviour rather than technology failures, a trend reflected in cyber insurance claims dominated by phishing, credential misuse, and Business Email Compromise. On Safer Internet Day, in conversation with ETCISO, Evaa Saiwal, Head of ...
Read More »A Path to Digital Success, ETCISO
A Path to Digital Success, ETCISO When a payment gateway handles thousands of digital transactions every hour, there is no margin for error. A brief disruption can mean frustrated customers walking away, chargebacks piling up, and reputational damage that takes months to repair. For the fintech powering these transactions, the difference between accelerating growth and facing setbacks often comes down ...
Read More »Why enterprises aren’t ready for India’s Data Privacy Law, and why time is no longer on their side
Why enterprises aren’t ready for India’s Data Privacy Law, and why time is no longer on their side https://etimg.etb2bimg.com/thumb/msid-127972031,imgsize-45728,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/why-enterprises-arent-ready-for-indias-data-privacy-law-and-why-time-is-no-longer-on-their-side.jpg For many Indian enterprises, India’s Digital Personal Data Protection (DPDP) Act still feels like a distant challenge – important, but not urgent. With full enforcement scheduled for May 2027, many leadership teams believe they have sufficient time to prepare. However, this ...
Read More »China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery https://firewall.firm.in/wp-content/uploads/2026/02/hijacking.jpg Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, ...
Read More »Report highlights shift toward identity-driven cyber threats in India in 2026
Report highlights shift toward identity-driven cyber threats in India in 2026 https://etimg.etb2bimg.com/thumb/msid-127886538,imgsize-58616,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/report-highlights-shift-toward-identity-driven-cyber-threats-in-india-in-2026.jpg India’s cyber threat landscape is expected to shift further toward identity-led attacks in 2026, with password-based controls increasingly ineffective against AI-assisted intrusion techniques, according to findings highlighted in Seqrite’s India Cyber Threat Report 2026. The report frames “identity as the new perimeter,” warning that attackers are moving away ...
Read More »A Game-Changer for Digital Data Protection, ETCISO
A Game-Changer for Digital Data Protection, ETCISO The FY2026–27 Budget documents allocate ₹10.00 crore for the DPB compared with ₹2.00 crore in FY26 (revised), with a ₹9.50/₹0.50 revenue–capital split. The ministry note adds that this provision is towards “salary and other establishment expenses” of the Board—useful context for interpreting early capacity building. For enterprises, the bigger signal is the operating ...
Read More »Google defeats bid for billions of dollars of new penalties in US privacy class action
Google defeats bid for billions of dollars of new penalties in US privacy class action https://etimg.etb2bimg.com/thumb/msid-127813525,imgsize-35046,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-wins-legal-battle-against-2-billion-penalty-over-privacy-violations.jpg Alphabet’s Google persuaded a federal judge in San Francisco on Friday to reject a bid by consumers for more than $2 billion in penalties over the company’s past collection of data from users who had switched off a key privacy setting. Chief US District ...
Read More »Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access https://firewall.firm.in/wp-content/uploads/2026/01/chrome.jpg Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any sponsored ...
Read More »Open-source AI models vulnerable to criminal misuse, researchers warn
Open-source AI models vulnerable to criminal misuse, researchers warn https://etimg.etb2bimg.com/thumb/msid-127790309,imgsize-95726,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/open-source-ai-models-vulnerable-to-criminal-misuse-researchers-warn.jpg Hackers and other criminals can easily commandeer computers operating open-source large language models outside the guardrails and constraints of the major artificial-intelligence platforms, creating security risks and vulnerabilities, researchers said on Thursday. Hackers could target the computers running the LLMs and direct them to carry out spam operations, phishing content ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











