Orange SA hacked, user data leaked on dark web https://etimg.etb2bimg.com/thumb/msid-123493684,imgsize-2604,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say.jpg Orange SA, one of the world’s leading telecom companies, has been hacked. According to a report, hackers have stolen and published about 4GB of sensitive business user data on the dark web. Orange first became aware of the breach in late July and reported it to national authorities. The data ...
Read More »Vulnerabilities & Exploits
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks https://firewall.firm.in/wp-content/uploads/2025/08/flaws.jpg Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – ...
Read More »4 more Bengal poll officials face ECI ire over data safety breach
4 more Bengal poll officials face ECI ire over data safety breach https://etimg.etb2bimg.com/thumb/msid-123328889,imgsize-20710,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/4-more-bengal-poll-officials-face-eci-ire-over-data-safety-breach.jpg In West Bengal, the Election Commission of India (ECI), the chief electoral office and district magistrates are conducting regular checks to identify irregularities in the electoral rolls, people in the know told ET. The ECI is yet to begin the special intensive revision (SIR) of electoral rolls ...
Read More »Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems https://firewall.firm.in/wp-content/uploads/2025/08/chatgpt-5-jailbreak.jpg Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering ...
Read More »Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information
Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information https://etimg.etb2bimg.com/thumb/msid-123132098,imgsize-43940,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information.jpg Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or “vishing” scheme, led to the theft of basic profile information for users registered on Cisco.com. ...
Read More »AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals https://firewall.firm.in/wp-content/uploads/2025/08/vciso.jpg Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of all sizes. To address this shift, SMBs have been urgently turning to vCISO services to keep up with ...
Read More »Breach in cyber security disrupts NCLT hearing
Breach in cyber security disrupts NCLT hearing https://etimg.etb2bimg.com/thumb/msid-123092859,imgsize-100919,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/breach-in-cyber-security-disrupts-nclt-hearing.jpg Kolkata: The National Company Law Tribunal (NCLT) Kolkata bench experienced a cyber security breach during an online court proceeding when an unknown perpetrator displayed inappropriate content around 2.52 pm on July 30. The unauthorized screen sharing, which lasted for three to four minutes, disrupted the court session presided over by tribunal members. ...
Read More »NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers https://firewall.firm.in/wp-content/uploads/2025/08/wiz-ai.jpg Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers. “When chained together, these flaws ...
Read More »Tea app takes messaging system offline after second security issue reported
Tea app takes messaging system offline after second security issue reported https://etimg.etb2bimg.com/thumb/msid-122988119,imgsize-244120,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/tea-app-takes-messaging-system-offline-after-second-security-issue-reported.jpg Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident. The app – designed to let women safely discuss men they date – rocketed to the top of the US Apple App Store ...
Read More »Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps https://firewall.firm.in/wp-content/uploads/2025/07/btc.jpg Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data from credentials and wallets. The activity leverages thousands of malicious ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











