BFSI firms face rising AI risks as data security and quality concerns intensify – ET CISO https://etimg.etb2bimg.com/thumb/msid-119842002,imgsize-7438,width-1200,height=765,overlay-etciso/data-breaches/bfsi-firms-face-rising-ai-risks-as-data-security-and-quality-concerns-intensify.jpg The rapid integration of artificial intelligence (AI) in the banking, financial services, and insurance (BFSI) sector is straining traditional data infrastructures, creating a difficult balance between security, data quality, and sustainability. A recent survey by Hitachi Vantara reveals that 84% of BFSI leaders ...
Read More »Vulnerabilities & Exploits
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features https://firewall.firm.in/wp-content/uploads/2025/03/malware-attack.jpg Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the ...
Read More »New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records https://firewall.firm.in/wp-content/uploads/2025/03/phishing.jpg Mar 27, 2025Ravie LakshmananEmail Security / Malware Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the ...
Read More »U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe https://firewall.firm.in/wp-content/uploads/2025/03/tornado-cash.png Mar 22, 2025Ravie LakshmananFinancial Security / Cryptocurrency The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. “Based on the Administration’s review of the ...
Read More »Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed https://firewall.firm.in/wp-content/uploads/2025/03/action.png The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects, before evolving into something more widespread in scope. “The payload was focused on exploiting the public CI/CD flow of one of their open source projects ...
Read More »UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools
UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools https://firewall.firm.in/wp-content/uploads/2025/03/hacker-cde.png Mar 21, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination ...
Read More »Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 https://firewall.firm.in/wp-content/uploads/2025/03/windows-hacked.png Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. The zero-day vulnerability, tracked ...
Read More »New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors https://firewall.firm.in/wp-content/uploads/2025/03/hacks.png Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. “This technique enables ...
Read More »Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure https://firewall.firm.in/wp-content/uploads/2025/03/apache.png Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions – ...
Read More »Pentesters: Is AI Coming for Your Role?
Pentesters: Is AI Coming for Your Role? https://firewall.firm.in/wp-content/uploads/2025/03/THN-Article-Header.png We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a Time of Automation, predicting that by 2030, 375 million workers would need to find new jobs or risk being displaced by AI ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











