Cisco’s vishing breach rings alarm bells: 6 cybersecurity lessons for enterprises https://etimg.etb2bimg.com/thumb/msid-123583966,imgsize-12892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/ciscos-vishing-breach-rings-alarm-bells-6-cybersecurity-lessons-for-enterprises.jpg Cisco recently disclosed a data breach in which a hacker, posing convincingly over a phone call, tricked a company representative into granting access to a third-party database. Classified as a vishing (voice phishing) attack, the breach exposed basic profile information of users registered on Cisco.com. While the company ...
Read More »Vulnerabilities & Exploits
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication https://firewall.firm.in/wp-content/uploads/2025/08/ms-code.jpg Aug 29, 2025Ravie LakshmananThreat Intelligence / Malware Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used “compromised websites to redirect visitors to malicious infrastructure ...
Read More »Orange SA hacked, user data leaked on dark web
Orange SA hacked, user data leaked on dark web https://etimg.etb2bimg.com/thumb/msid-123493684,imgsize-2604,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say.jpg Orange SA, one of the world’s leading telecom companies, has been hacked. According to a report, hackers have stolen and published about 4GB of sensitive business user data on the dark web. Orange first became aware of the breach in late July and reported it to national authorities. The data ...
Read More »Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks https://firewall.firm.in/wp-content/uploads/2025/08/flaws.jpg Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – ...
Read More »4 more Bengal poll officials face ECI ire over data safety breach
4 more Bengal poll officials face ECI ire over data safety breach https://etimg.etb2bimg.com/thumb/msid-123328889,imgsize-20710,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/4-more-bengal-poll-officials-face-eci-ire-over-data-safety-breach.jpg In West Bengal, the Election Commission of India (ECI), the chief electoral office and district magistrates are conducting regular checks to identify irregularities in the electoral rolls, people in the know told ET. The ECI is yet to begin the special intensive revision (SIR) of electoral rolls ...
Read More »Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems https://firewall.firm.in/wp-content/uploads/2025/08/chatgpt-5-jailbreak.jpg Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering ...
Read More »Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information
Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information https://etimg.etb2bimg.com/thumb/msid-123132098,imgsize-43940,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information.jpg Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or “vishing” scheme, led to the theft of basic profile information for users registered on Cisco.com. ...
Read More »AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals https://firewall.firm.in/wp-content/uploads/2025/08/vciso.jpg Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of all sizes. To address this shift, SMBs have been urgently turning to vCISO services to keep up with ...
Read More »Breach in cyber security disrupts NCLT hearing
Breach in cyber security disrupts NCLT hearing https://etimg.etb2bimg.com/thumb/msid-123092859,imgsize-100919,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/breach-in-cyber-security-disrupts-nclt-hearing.jpg Kolkata: The National Company Law Tribunal (NCLT) Kolkata bench experienced a cyber security breach during an online court proceeding when an unknown perpetrator displayed inappropriate content around 2.52 pm on July 30. The unauthorized screen sharing, which lasted for three to four minutes, disrupted the court session presided over by tribunal members. ...
Read More »NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers https://firewall.firm.in/wp-content/uploads/2025/08/wiz-ai.jpg Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers. “When chained together, these flaws ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











