DPDP Readiness: Five proof signals for enterprise control https://etimg.etb2bimg.com/thumb/msid-128712482,imgsize-53536,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/mastering-dpdp-readiness-key-signals-for-data-management-control.jpg DPDP readiness is increasingly defined by demonstrability. In large enterprises, personal data moves through business applications, reporting layers, shared workspaces, SaaS ecosystems, vendor operations, and analytics and AI pipelines. Readiness, therefore, starts to provide the ability to produce repeatable evidence across that data estate: where personal data exists, why it is ...
Read More »Vulnerabilities & Exploits
APT28 Targeted European Entities Using Webhook-Based Macro Malware
APT28 Targeted European Entities Using Webhook-Based Macro Malware https://firewall.firm.in/wp-content/uploads/2026/02/malware-attack-eu.jpg Ravie LakshmananFeb 23, 2026Malware / Threat Intelligence The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo’s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed ...
Read More »Explainability embedded in data resilience is essential for compliance
Explainability embedded in data resilience is essential for compliance https://etimg.etb2bimg.com/thumb/msid-128592186,imgsize-4478,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/navigating-data-resilience-and-compliance-the-critical-need-for-explainability-in-indias-digital-landscape.jpg Across Asia Pacific, the regulatory momentum is unmistakable, and India is no exception. In India, the Digital Personal Data Protection Act (DPDP Act), 2023 has fundamentally reshaped how enterprises must think about data accountability, breach readiness, and auditability. Once fully enforced through rules, penalties for non-compliance can reach INR 250 ...
Read More »AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries https://firewall.firm.in/wp-content/uploads/2026/02/FortiGate.jpg A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, ...
Read More »Why securing consumer data has become a critical business priority in 2026
Why securing consumer data has become a critical business priority in 2026 https://etimg.etb2bimg.com/thumb/msid-128236052,imgsize-85630,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/why-securing-consumer-data-has-become-a-critical-business-priority-in-2026.jpg Every digital interaction leaves a trail. Every click, transaction, and conversation generates information that can reveal preferences, behaviors, and patterns. For businesses, this data is invaluable, a guiding strategy that drives innovation and shapes customer engagement. But, with this opportunity comes responsibility. Cyberattacks are increasing in scale ...
Read More »Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History https://firewall.firm.in/wp-content/uploads/2026/02/chrome-hacks.jpg Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate ...
Read More »What is a data breach? Why FSI became the most targeted industry in 2025
What is a data breach? Why FSI became the most targeted industry in 2025 https://etimg.etb2bimg.com/thumb/msid-128018789,imgsize-57236,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/what-is-a-data-breach-why-fsi-became-the-most-targeted-industry-in-2025.jpg A data breach means when hackers steal private information like bank details, passwords, or personal ID from a company’s system. Eva Velasquez from the Identity Theft Resource Center explained this in an interview with Jeffrey Snyder for The Street. In the US, there were more ...
Read More »ZAST.AI Raises $6M Pre-A to Scale
ZAST.AI Raises $6M Pre-A to Scale https://firewall.firm.in/wp-content/uploads/2026/02/zast.gif The Hacker NewsFeb 10, 2026Application Security / Artificial Intelligence January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total funding close to $10 million. This marks a recognition from leading capital markets of ...
Read More »Why enterprises aren’t ready for India’s Data Privacy Law, and why time is no longer on their side
Why enterprises aren’t ready for India’s Data Privacy Law, and why time is no longer on their side https://etimg.etb2bimg.com/thumb/msid-127972031,imgsize-45728,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/why-enterprises-arent-ready-for-indias-data-privacy-law-and-why-time-is-no-longer-on-their-side.jpg For many Indian enterprises, India’s Digital Personal Data Protection (DPDP) Act still feels like a distant challenge – important, but not urgent. With full enforcement scheduled for May 2027, many leadership teams believe they have sufficient time to prepare. However, this ...
Read More »China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery https://firewall.firm.in/wp-content/uploads/2026/02/hijacking.jpg Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











