Meta takes down CyberRoot Risk Advisory’s 40 accounts, 900 Chinese A/Cs Social media giant Meta has taken down over 40 accounts operated by an Indian firm CyberRoot Risk Advisory, allegedly involved in hacking-for-hire services, the online giant said in a report. Meta also took down a network of about 900 fake accounts on Instagram and Facebook operated from China by ...
Read More »Cyber Security News
Delhi Police Special Cell with FBI busts overseas tech support scam in transcontinental raids
Delhi Police Special Cell with FBI busts overseas tech support scam in transcontinental raids The myth of impunity for cyber cons for overseas tech support scams was busted in transcontinental raids in North America and Asia by IFSO, Special Cell, Delhi Police in coordination with the Federal Bureau of Investigation and a Canadian Law Enforcement Agency. Federal Bureau of ...
Read More »India one of top 3 countries originating IoT malware: Microsoft’s Cyber Signals Report 2022
India one of top 3 countries originating IoT malware: Microsoft’s Cyber Signals Report 2022 Microsoft has released the third edition of its Cyber Signals Report, which includes information on the increasing cyber risks to critical infrastructure posed by the Internet of Things (IoT) and Operational Technology (OT). The report provides insights on current cyber threats, with a focus on recent ...
Read More »The evolving landscape of OT security in the era of IT/OT convergence
The evolving landscape of OT security in the era of IT/OT convergence Historically, information technology (IT) environments have always been at the forefront of the majority of cyber attacks, unlike operational technology (OT) environments which have traditionally operated in isolation with separate organizational units, and with separate technologies, standards, governance, and security practices. The exposure to cyber threats was also ...
Read More »Critical infra organisations must upgrade security to avoid AIIMS-like attacks, say experts
Critical infra organisations must upgrade security to avoid AIIMS-like attacks, say experts The recent cyberattack on the All India Institute of Medical Sciences (AIIMS) has once again put the spotlight on cybersecurity practices at government and critical infrastructure organisations in India. Even as enterprises have increased their cybersecurity spends, experts said critical infrastructure such as power plants, hospitals and railways ...
Read More »Why CIOs must take a proactive data protection & security approach
Why CIOs must take a proactive data protection & security approach Highlights Modern data protection tools and techniques enable enterprises to handle data on a petabyte scale, while also assisting them in complying with stricter privacy and security laws. It also provides resilience against both internal and external threats., With users and employees working remotely, data now gets stored ...
Read More »North Korean cyber spies deploy new tactic: Tricking foreign experts into writing research for them
North Korean cyber spies deploy new tactic: Tricking foreign experts into writing research for them Seoul: When Daniel DePetris, a U.S.-based foreign affairs analyst, received an email in October from the director of the 38 North think-tank commissioning an article, it seemed to be business as usual. It wasn’t. The sender was actually a suspected North Korean spy seeking information, ...
Read More »Proceeds of crime of over Rs 1000 cr of cyber and crypto assets frauds seized
Proceeds of crime of over Rs 1000 cr of cyber and crypto assets frauds seized Enforcement Directorate New Delhi: Proceeds of crime of more than Rs 1000 crore related to cyber and crypto assets frauds have been attached or seized under the provisions of Prevention of Money Laundering Act, 2002 (PMLA), the Government informed the Lok Sabha on Monday. Besides, ...
Read More »Cybercrooks pull off Rs 50 lakh heist with just blank calls
Cybercrooks pull off Rs 50 lakh heist with just blank calls A director of a south Delhi-based security services firm lost Rs 50 lakh to cybercrooks, who diverted the money by repeatedly giving him blank and missed calls on his cellphone. Interestingly, they did not ask for any OTP. The victim received a flurry of calls between 7pm and 8.45pm ...
Read More »First step to better data security: Know who’s getting access to your cloud data
First step to better data security: Know who’s getting access to your cloud data Image source: Stack Identity What’s common between Uber, Cisco, and some of the recent high-profile data breaches, is MFA fatigue – an exploit through which attackers utilized multi-factor authentication solutions and bypassed vulnerabilities to gain access to the company’s cloud services and network. These incidents ...
Read More »