Why enterprises aren’t ready for India’s Data Privacy Law, and why time is no longer on their side https://etimg.etb2bimg.com/thumb/msid-127972031,imgsize-45728,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/why-enterprises-arent-ready-for-indias-data-privacy-law-and-why-time-is-no-longer-on-their-side.jpg For many Indian enterprises, India’s Digital Personal Data Protection (DPDP) Act still feels like a distant challenge – important, but not urgent. With full enforcement scheduled for May 2027, many leadership teams believe they have sufficient time to prepare. However, this ...
Read More »Cyber Security News
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery https://firewall.firm.in/wp-content/uploads/2026/02/hijacking.jpg Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, ...
Read More »Report highlights shift toward identity-driven cyber threats in India in 2026
Report highlights shift toward identity-driven cyber threats in India in 2026 https://etimg.etb2bimg.com/thumb/msid-127886538,imgsize-58616,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/report-highlights-shift-toward-identity-driven-cyber-threats-in-india-in-2026.jpg India’s cyber threat landscape is expected to shift further toward identity-led attacks in 2026, with password-based controls increasingly ineffective against AI-assisted intrusion techniques, according to findings highlighted in Seqrite’s India Cyber Threat Report 2026. The report frames “identity as the new perimeter,” warning that attackers are moving away ...
Read More »A Game-Changer for Digital Data Protection, ETCISO
A Game-Changer for Digital Data Protection, ETCISO The FY2026–27 Budget documents allocate ₹10.00 crore for the DPB compared with ₹2.00 crore in FY26 (revised), with a ₹9.50/₹0.50 revenue–capital split. The ministry note adds that this provision is towards “salary and other establishment expenses” of the Board—useful context for interpreting early capacity building. For enterprises, the bigger signal is the operating ...
Read More »Google defeats bid for billions of dollars of new penalties in US privacy class action
Google defeats bid for billions of dollars of new penalties in US privacy class action https://etimg.etb2bimg.com/thumb/msid-127813525,imgsize-35046,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-wins-legal-battle-against-2-billion-penalty-over-privacy-violations.jpg Alphabet’s Google persuaded a federal judge in San Francisco on Friday to reject a bid by consumers for more than $2 billion in penalties over the company’s past collection of data from users who had switched off a key privacy setting. Chief US District ...
Read More »Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access https://firewall.firm.in/wp-content/uploads/2026/01/chrome.jpg Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any sponsored ...
Read More »Open-source AI models vulnerable to criminal misuse, researchers warn
Open-source AI models vulnerable to criminal misuse, researchers warn https://etimg.etb2bimg.com/thumb/msid-127790309,imgsize-95726,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/open-source-ai-models-vulnerable-to-criminal-misuse-researchers-warn.jpg Hackers and other criminals can easily commandeer computers operating open-source large language models outside the guardrails and constraints of the major artificial-intelligence platforms, creating security risks and vulnerabilities, researchers said on Thursday. Hackers could target the computers running the LLMs and direct them to carry out spam operations, phishing content ...
Read More »How Synthetic Data Drives Enterprise AI Innovation, ETCISO
How Synthetic Data Drives Enterprise AI Innovation, ETCISO As AI becomes embedded deeper into everyday operations, enterprises are feeding more data into models than ever before. Large language models (LLMs) are now common in customer support, analytics, developer productivity, and knowledge management. AI agents add another layer: systems that can retrieve information, reason over it, and take action across tools ...
Read More »Data Privacy day: Protect people, data, and trust
Data Privacy day: Protect people, data, and trust https://etimg.etb2bimg.com/thumb/msid-127358114,imgsize-40022,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/data-privacy-day-empowering-organizations-to-protect-personal-information.jpg Observed globally on January 28, Data Privacy Day highlights the growing importance of protecting personal information in today’s digitally dependent world. Across more than 45 countries, Data Privacy Day brings together governments, organizations, educators, and individuals to promote data privacy and responsible digital practices. To explore how organizations are marking Data ...
Read More »CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities https://firewall.firm.in/wp-content/uploads/2026/01/cisa.jpg Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2025-68645 (CVSS score: 8.8) – ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











