US treasury breach – Chinese hackers breach Janet Yellen’s computer, accessed about 50 files – ET CISO https://etimg.etb2bimg.com/thumb/msid-117320088,imgsize-87808,width-1200,height=765,overlay-etciso/data-breaches/us-treasury-breach-chinese-hackers-breach-janet-yellens-computer-accessed-about-50-files.jpg Hackers backed by the Chinese government accessed US Treasury Secretary Janet Yellen’s computer and files, Bloomberg News has reported . The breach, discovered in December, also impacted the computers of Deputy Secretary Wally Adeyemo and Acting Under Secretary Brad Smith. The hackers ...
Read More »Blog
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation https://firewall.firm.in/wp-content/uploads/2025/01/root.png Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. “These switches are widely used in building and home automation systems for a variety of networking ...
Read More »PayPal phishing attacks: how it works, identifying threats and precautions to take – ET CISO
PayPal phishing attacks: how it works, identifying threats and precautions to take – ET CISO https://etimg.etb2bimg.com/thumb/msid-117190503,imgsize-7738,width-1200,height=765,overlay-etciso/cybercrime-fraud/paypal-phishing-attacks-how-it-works-identifying-threats-and-precautions-to-take.jpg PayPal users are alarmed by a recent cybersecurity breach after researchers discovered a sophisticated malware that targeted the network. This new approach, known as “no-phish phishing,” circumvents conventional phishing strategies, making it one of the most difficult frauds to identify to date. Advanced Cyberattack ...
Read More »Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action https://firewall.firm.in/wp-content/uploads/2025/01/digi.png Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying ...
Read More »MeitY launches ‘Cyber Security Grand Challenge 2.0’ with ₹6.85 crore prize pool – ET CISO
MeitY launches ‘Cyber Security Grand Challenge 2.0’ with ₹6.85 crore prize pool – ET CISO https://etimg.etb2bimg.com/thumb/msid-117285700,imgsize-29956,width-1200,height=765,overlay-etciso/cybercrime-fraud/meity-launches-cyber-security-grand-challenge-2-0-with-6-85-crore-prize-pool.jpg Registration are now open till February 14, for innovative solutions in API Security, Data Protection, Wearable Privacy, Clone App Mitigation, AI Threat Detection, and Biometric Security. The government on Wednesday launched the ‘Cyber Security Grand Challenge 2.0’ (CSGC 2.0) with a total prize money ...
Read More »The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024 https://firewall.firm.in/wp-content/uploads/2025/01/push.png You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost ...
Read More »GenAI can help cos fight cyber threats – ET CISO
GenAI can help cos fight cyber threats – ET CISO https://etimg.etb2bimg.com/thumb/msid-117285935,imgsize-35032,width-1200,height=765,overlay-etciso/cybercrime-fraud/genai-can-help-cos-fight-cyber-threats.jpg As a majority of cybersecurity breaches are due to human errors, advanced tools such as Generative AI (GenAI) can help organisations thwart such threats, according a report by NASSCOM and Data Security Council of India (DSCI). The report has pegged breaches because of human errors to a massive 88%. ...
Read More »how CISOs are defending against next-gen threats, ET CISO
how CISOs are defending against next-gen threats, ET CISO In the rapidly evolving landscape of cybersecurity, the battlefield is no longer restricted between security experts and threat actors, it is extending to include AI-driven threats. In this scenario, Chief Information Security Officers (CISOs) have been tasked with the responsibility to safeguard organizations against these complex emerging cyber threats. The Emergence ...
Read More »Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool https://firewall.firm.in/wp-content/uploads/2025/01/rsync.png Jan 15, 2025Ravie LakshmananVulnerability / Software Update As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. “Attackers can take control of a malicious server and read/write arbitrary ...
Read More »Varsities must develop short cybersecurity courses: Guv – ET CISO
Varsities must develop short cybersecurity courses: Guv – ET CISO https://etimg.etb2bimg.com/thumb/msid-117191103,imgsize-268384,width-1200,height=765,overlay-etciso/cybercrime-fraud/varsities-must-develop-short-cybersecurity-courses-guv.jpg All universities in Maharashtra will have to develop and implement short-term courses on cybersecurity, Governor CP Radhakrishnan said on Sunday, adding that these courses will help varsities create ‘a new generation of cyber warriors’. Radhakrishnan was speaking at the ‘Cyber Education for Cyber Security Awards’ programme in the city. ...
Read More »