Accenture and Anthropic partner on AI-driven cybersecurity operations, ETCISO Accenture has launched Cyber.AI, a cybersecurity solution powered by Anthropic’s Claude model, aimed at helping organizations use AI-driven capabilities across security operations. The solution combines Accenture’s proprietary agents with Claude to support activities across the cybersecurity lifecycle, including design, deployment, detection and response. It also includes Agent Shield, a capability intended ...
Read More »Demo Blog With Map
TRU identifies mobile spyware campaign using fake Red Alert app in Israel
TRU identifies mobile spyware campaign using fake Red Alert app in Israel https://etimg.etb2bimg.com/thumb/msid-129603786,imgsize-5482,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/tru-identifies-mobile-spyware-campaign-using-fake-red-alert-app-in-israel.jpg A targeted smishing campaign has been identified in which Israeli users received SMS messages impersonating official Home Front Command alerts and distributing a trojanized version of Israel’s Red Alert rocket warning Android app. The malicious app preserves the legitimate rocket alert functionality, making it harder for users ...
Read More »Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account https://firewall.firm.in/wp-content/uploads/2026/03/Axios-attack.jpg The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting Windows, macOS, and Linux systems. Versions 1.14.1 and 0.30.4 of Axios have been found to ...
Read More »China-linked hackers plant stealth malware deep in global telecom networks
China-linked hackers plant stealth malware deep in global telecom networks https://etimg.etb2bimg.com/thumb/msid-129858203,imgsize-20624,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/china-linked-hackers-plant-stealth-malware-deep-in-global-telecom-networks.jpg A China-linked state-sponsored hacking group has been found embedding highly stealthy malware deep inside global telecom infrastructure, raising concerns of long-term cyber espionage, a report has said. The data by cybersecurity firm Rapid7 showed that the attackers have deployed advanced tools such as kernel-level implants and passive backdoors designed ...
Read More »48% enterprises flag mule networks as top fraud threat, ETCISO
48% enterprises flag mule networks as top fraud threat, ETCISO Bureau’s India Fraud Report 2026 points to a major shift in how fraud is being executed across India’s digital economy. With fraud losses in the banking sector rising to ₹36,014 crore, the report says fraud operations are becoming faster, more organized and increasingly industrialized, using real-time payments, instant onboarding and ...
Read More »Anthropic’s most powerful AI model ‘Claude Mythos’ data leaked
Anthropic’s most powerful AI model ‘Claude Mythos’ data leaked https://etimg.etb2bimg.com/thumb/msid-129858229,imgsize-101462,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/anthropics-most-powerful-ai-model-claude-mythos-data-leaked.jpg A data leak has revealed that Anthropic is developing a new artificial intelligence model it claims is its most powerful yet, with the system already being tested by a small group of users. A report in Fortune quoted an Anthropic spokesperson as saying the system is “the most capable we’ve ...
Read More »Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks https://firewall.firm.in/wp-content/uploads/2026/03/open-code.jpg Ravie LakshmananMar 27, 2026Software Security / DevSecOps Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX’s pre-publish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code (VS Code) extension to pass the vetting process and go live in the ...
Read More »India tightens digital security with strict rules
India tightens digital security with strict rules https://etimg.etb2bimg.com/thumb/msid-129838087,imgsize-20842,width-1200,height=627,overlay-etciso,resizemode-75/ot-security/india-strengthens-digital-security-new-rules-for-cctv-systems-and-telecom-equipment.jpg India has tightened its digital security framework, mandating stricter compliance for telecom equipment, CCTV systems and data protection, amid heightened concerns over vulnerabilities in surveillance infrastructure and emerging espionage risks flagged by recent investigations. The move comes against the backdrop of long-standing concerns over the widespread use of imported CCTV equipment -particularly ...
Read More »Silent Mobile Verification Eradicates SMS/OTP Anxiety, ETCISO
Silent Mobile Verification Eradicates SMS/OTP Anxiety, ETCISO Picture this. A customer is about to pay online for a product at checkout. They click ‘Pay’ in their mobile app. And then it begins; ‘the wait’ for the One-time Password (OTP). The customer stares at their phone, waiting for that familiar ping. Five seconds pass. Then ten. A cold spike of anxiety ...
Read More »Millions of infected devices fueled massive cyberattacks
Millions of infected devices fueled massive cyberattacks https://etimg.etb2bimg.com/thumb/msid-129691490,imgsize-11922,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/us-says-it-disrupted-botnets-that-infected-over-3-million-devices-worldwide.jpg The U.S. Justice Department on Thursday said it took part in an operation with Germany and Canada to take down infrastructure used by four major botnets that infected more than 3 million devices worldwide, including hundreds of thousands in the U.S. The malicious networks – Aisuru, KimWolf, JackSkid and Mossad – were ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











