Verizon’s 2025 DBIR: 97% of APAC breaches driven by system intrusion, social engineering, Web App attacks – ET CISO https://etimg.etb2bimg.com/thumb/msid-120637562,imgsize-11786,width-1200,height=765,overlay-etciso/data-breaches/verizons-2025-dbir-97-of-apac-breaches-driven-by-system-intrusion-social-engineering-web-app-attacks.jpg Verizon Business today released its 2025 Data Breach Investigations Report (DBIR), sounding the alarm on a surge of system intrusions across the Asia-Pacific region. The report reveals that four out of five data breaches in the region stemmed from such ...
Read More »Vulnerabilities & Exploits
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers https://firewall.firm.in/wp-content/uploads/2025/05/wordpress.jpg May 01, 2025Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with a variety of features to maintain access, hide itself from the ...
Read More »GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages https://firewall.firm.in/wp-content/uploads/2025/04/google.gif Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s based on Apache Airflow. “This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their ...
Read More »Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors https://firewall.firm.in/wp-content/uploads/2025/04/malware-attack.jpg The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a ...
Read More »Government weighing local storage of AI models to mitigate risk associated with them – ET CISO
Government weighing local storage of AI models to mitigate risk associated with them – ET CISO https://etimg.etb2bimg.com/thumb/msid-120082128,imgsize-35306,width-1200,height=765,overlay-etciso/data-breaches/government-weighing-local-storage-of-ai-models-to-mitigate-risk-associated-with-them.jpg The government is weighing local storage of AI models to mitigate any risk associated with them and prevent flow of data outside the country, a senior government official said on Monday. While speaking on the sidelines of Digital Threat Report 2024 for the ...
Read More »Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit https://firewall.firm.in/wp-content/uploads/2025/04/hack.jpg Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched ...
Read More »Don’t give your email to strangers, use a decoy address instead – ET CISO
Don’t give your email to strangers, use a decoy address instead – ET CISO https://etimg.etb2bimg.com/thumb/msid-119630534,imgsize-57824,width-1200,height=765,overlay-etciso/data-breaches/dont-give-your-email-to-strangers-use-a-decoy-address-instead.jpg You’ve heard of burner phones. What about burner email? So much of the internet now requires that you hand over your email address before you’re able to use any services – from an app you’ve downloaded to signing up for a newsletter or redeeming a ...
Read More »CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks
CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks [og_img] Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about the risks associated with a technique called fast flux that has been adopted by threat actors to obscure a command-and-control (C2) channel. “‘Fast flux’ is a technique used ...
Read More »BFSI firms face rising AI risks as data security and quality concerns intensify – ET CISO
BFSI firms face rising AI risks as data security and quality concerns intensify – ET CISO https://etimg.etb2bimg.com/thumb/msid-119842002,imgsize-7438,width-1200,height=765,overlay-etciso/data-breaches/bfsi-firms-face-rising-ai-risks-as-data-security-and-quality-concerns-intensify.jpg The rapid integration of artificial intelligence (AI) in the banking, financial services, and insurance (BFSI) sector is straining traditional data infrastructures, creating a difficult balance between security, data quality, and sustainability. A recent survey by Hitachi Vantara reveals that 84% of BFSI leaders ...
Read More »RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features https://firewall.firm.in/wp-content/uploads/2025/03/malware-attack.jpg Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











