China supercomputer breach exposes massive defence data, sparks security concerns https://etimg.etb2bimg.com/thumb/msid-130168248,imgsize-172930,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/china-supercomputer-breach-exposes-massive-defence-data-sparks-security-concerns.jpg A major cybersecurity breach has reportedly exposed highly sensitive data from a Chinese government supercomputer, raising serious concerns around national security and data protection. The story reported by CNN broke out recently. According to reports, a hacker managed to infiltrate a system linked to the National Supercomputing Centre in ...
Read More »Vulnerabilities & Exploits
2026: The Year of AI-Assisted Attacks
2026: The Year of AI-Assisted Attacks https://firewall.firm.in/wp-content/uploads/2026/05/ai-cyberattacks.png On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan’s largest internet cafe chain. When asked, the young man shared his motivation for the hack: he ...
Read More »Vercel data breach: How hackers targeted the cloud company and offered its data for sale for $2 million
Vercel data breach: How hackers targeted the cloud company and offered its data for sale for $2 million https://etimg.etb2bimg.com/thumb/msid-130431427,imgsize-5766,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/vercel-data-breach-how-hackers-targeted-the-cloud-company-and-offered-its-data-for-sale-for-2-million.jpg American cloud development platform Vercel on Sunday confirmed a security breach allowing an attacker to gain unauthorised access to data for a “limited subset of customers”. “We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems. We ...
Read More »VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi https://firewall.firm.in/wp-content/uploads/2026/04/vect.gif Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that ...
Read More »US security company ADT confirms hacking incident, says some customer data stolen
US security company ADT confirms hacking incident, says some customer data stolen https://etimg.etb2bimg.com/thumb/msid-130543679,imgsize-86843,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/us-security-company-adt-confirms-hacking-incident-says-some-customer-data-stolen.jpg ADT, one of the largest home security providers in the US, has confirmed that hackers successfully broke into its systems and stole customer information like their phone numbers and addresses. The announcement comes as a notorious extortion group, known as ShinyHunters, threatens to leak millions of records ...
Read More »Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software https://firewall.firm.in/wp-content/uploads/2026/04/fast16-exploit.jpg Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges. According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting high-precision calculation software to ...
Read More »FBI shuts down ready-made kit that imitated login pages and stole millions from users worldwide
FBI shuts down ready-made kit that imitated login pages and stole millions from users worldwide https://etimg.etb2bimg.com/thumb/msid-130226818,imgsize-8416,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/fbi-shuts-down-ready-made-kit-that-imitated-login-pages-and-stole-millions-from-users-worldwide.jpg The FBI Atlanta Field Office, working closely with Indonesian law enforcement, has dismantled a highly organized global phishing operation that gave cybercriminals easy access to a powerful tool for stealing account credentials and attempting large-scale fraud. At the centre of the operation was a ...
Read More »[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data
[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data https://firewall.firm.in/wp-content/uploads/2026/04/ghost.jpg Mohit KumarApr 18, 2026Artificial Intelligence / Enterprise Security In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, ...
Read More »Anthropic leak exposes Claude Code source
Anthropic leak exposes Claude Code source https://etimg.etb2bimg.com/thumb/msid-130070794,imgsize-17066,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/anthropic-leak-exposes-claude-code-source.jpg American AI company Anthropic has been one of the most-vocal supporters of banning export of American AI software and hardware to China. So much so that it’s CEO Dario Amodei has called China an adversarial nation” on numerous occasions. Like Microsoft-backed OpenAI and Alphabet’s Google, Anthropic has not made its services available in ...
Read More »36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants https://firewall.firm.in/wp-content/uploads/2026/04/database.jpg Ravie LakshmananApr 05, 2026Malware / DevSecOps Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant. “Every package contains three ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











