RBI cites deficiency in IT risk and information security governance in Kotak Mahindra Bank ruling, ET CISO Mumbai: The RBI on Wednesday barred Kotak Mahindra Bank from onboarding new customers through its online and mobile banking channels and issuing fresh credit cards with immediate effect after the regulator found serious deficiencies in the lender’s IT risk management. These actions, the ...
Read More »Blog
Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO
Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO https://etimg.etb2bimg.com/thumb/msid-89821283,imgsize-52790,width-1200,height=765,overlay-etciso/news/comprehensive-law-to-prevent-organisations-from-hiding-data-breaches-rajeev-chandrasekhar.jpg Rajeev Chandrasekhar The government is working on comprehensive laws that will prevent corporations from hiding security and data breaches, said Rajeev Chandrasekhar, Union Minister of State for Electronics and IT. Chandrasekhar was speaking at the launch of IBM’s security command centre in Bengaluru. He said ...
Read More »Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds https://firewall.firm.in/wp-content/uploads/2024/05/blockchain.png May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. ...
Read More »Google banned over 2 mn policy-violating apps from Play Store last year – ET CISO
Google banned over 2 mn policy-violating apps from Play Store last year – ET CISO https://etimg.etb2bimg.com/thumb/msid-109746131,imgsize-4402,width-1200,height=765,overlay-etciso/corporate/google-banned-over-2-mn-policy-violating-apps-from-play-store-last-year.jpg Google said that it prevented 2.28 million policy-violating apps from being published on its Play Store in 2023. The company also banned 333,000 bad accounts from the Play Store for violations like confirmed malware and repeated severe policy breaches created by criminals and fraud ...
Read More »Govt’s cyber agency finds multiple bugs in Cisco products, ET CISO
Govt’s cyber agency finds multiple bugs in Cisco products, ET CISO The Indian Computer Emergency Response Team (CERT-In) which comes under the Ministry of Electronics & Information Technology, has issued an advisory over three serious vulnerabilities in networking giant Cisco products that could allow hackers to gain access, infiltrate into computer systems and steal data. The Indian Computer Emergency Response ...
Read More »Protecting your web application from security breach – A primer – ET CISO
Protecting your web application from security breach – A primer – ET CISO https://etimg.etb2bimg.com/thumb/msid-93425610,imgsize-349780,width-1200,height=765,overlay-etciso/news/protecting-your-web-application-from-security-breach-a-primer.jpg By Venkatesh Sundar Going digital has become the norm today and software applications have become an integral part of our lives. However, this has also meant that data breaches and cyberattacks are also growing at an alarming rate. These breaches often come from minor glitches in ...
Read More »Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success
Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success https://firewall.firm.in/wp-content/uploads/2024/05/SAT_Buyers_Guide_Huntress.png May 01, 2024The Hacker NewsSecurity Awareness Training There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you ...
Read More »UnitedHealth hackers used stolen login credentials to break in, CEO says – ET CISO
UnitedHealth hackers used stolen login credentials to break in, CEO says – ET CISO https://etimg.etb2bimg.com/thumb/msid-109746329,imgsize-14464,width-1200,height=765,overlay-etciso/cybercrime-fraud/unitedhealth-hackers-used-stolen-login-credentials-to-break-in-ceo-says.jpg Hackers breached UnitedHealth’s tech unit on Feb. 12 by using stolen login credentials that gave them remote access to its network, the largest U.S. health insurer will testify before a House panel this week. UnitedHealth CEO Andrew Witty’s testimony before the House Energy and Commerce ...
Read More »UK’s new ‘world first’ laws crack down on smart gadget cyber attacks, ET CISO
UK’s new ‘world first’ laws crack down on smart gadget cyber attacks, ET CISO All internet connected smart devices will be required to meet minimum security standards under what the UK government has dubbed as “world first” laws, effective from Monday to protect consumers and businesses from hacking and cyber-attacks. Under the new regime, manufacturers will be banned from having ...
Read More »Most common types of data breaches and how they affect businesses during the festive season – ET CISO
Most common types of data breaches and how they affect businesses during the festive season – ET CISO https://etimg.etb2bimg.com/thumb/msid-94777073,imgsize-118896,width-1200,height=765,overlay-etciso/news/most-common-types-of-data-breaches-and-how-they-affect-businesses-during-the-festive-season.jpg Cyberattacks and data breaches on businesses often rise around the festive season. Firms that keep data may have to deal with high and long-term costs and consequences when breached. As online shopping increases rapidly, cybercriminals can target businesses and their customers ...
Read More »