Sanctions refer to notifications issued by entities and/or governments that alert and/or prohibit organizations/individuals from carrying out financial transactions with certain people/organizations...
Sep 18, 2020
Ripple20 vulnerabilities can cause a massive impact if affected software goes undetected and unpatched, according to ExtraHop’s study. Analyzing data across its customer base, ExtraHop threat...
Sep 14, 2020
Many organizations choose Linux for strategically important servers and systems, not least because this operating system is thought to be safer and less prone to cyberthreats than the far more...
Sep 11, 2020
46% of consumers feel comfortable sharing streaming services with their housemates. However, a third (32%) are unsure about the safety of their accounts because they do not know about their...
Aug 31, 2020
A new Android spyware application is being distributed by Transparent Tribe, a prolific APT group, in India under the guise of adult content and official COVID-19 applications, according to Kaspersky...
Aug 27, 2020
As the COVID-19 pandemic spread rapidly in the first half of 2020, many organizations were required to shift to telework practically overnight as teams around the globe were asked to stay home....
Aug 24, 2020
Phishing attacks are becoming increasingly more targeted, according to Kaspersky’s Q2, 2020 report. A number of new tricks have also been found - from HR dismissal emails to attacks, disguised as...
Aug 11, 2020
Almost a third (30%) of cyberattacks investigated by the Kaspersky Global Emergency Response team in 2019 involved legitimate remote management and administration tools. As a result, attackers can...
Aug 10, 2020
After a five-month absence, Emotet has surged back to 1st place in Check Point Software Technologies’ latest Global Threat Index for July 2020, impacting 5% of organizations globally. Since February...
Aug 10, 2020
Criminal businesses need hosting services and cybersecurity protections too, according to Trend Micro’s study. The study analyzes the market for underground hosting services and details how and where...
Jul 27, 2020
Consumers need to be ready for a major new wave of attacks attempting to compromise their home routers for use in IoT botnets, according to a Trend Micro research. The report urges users to take...
Jul 17, 2020
67% of all malware in Q1 was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats, according to WatchGuard...
Jun 25, 2020
By registering for Google Analytics accounts and injecting these accounts’ tracking code into the websites’ source code, attackers can collect users’ credit card details. About two dozen online...
Jun 23, 2020
Cybercriminals have been exploiting the increased popularity in video games during lockdown to launch attacks. In April, the daily number of blocked attempts to direct Kaspersky users to malicious...
Jun 22, 2020
Several malicious spam campaigns are distributing the Ursnif banking trojan, which caused it to jump up 19 places to 5th in the Top Malware list, doubling its impact on organizations worldwide,...
Jun 19, 2020
A correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack during the COVID-19 pandemic exists, along with an increase in...
May 28, 2020
Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization, according to Trend Micro’s new data on...
May 27, 2020
Paying cybercriminals to restore data encrypted during a ransomware attack is not an easy and inexpensive path to recovery. In fact, the total cost of recovery almost doubles when organizations pay a...
May 13, 2020
Several COVID-19 related spam campaigns are distributing a new variant of the Agent Tesla remote access trojan, moving it up to 3rd place in the Index, impacting 3% of organizations worldwide,...
May 12, 2020
There has been significant growth of the lifespan of phishing attacks in the second half of 2019, according to Group-IB’s Computer Emergency Response Team (CERT-GIB). This has resulted in the...
May 11, 2020
The rampant rise of ransomware persists, with 100% of respondents – who include ITOps, backup, DR and storage admins, application and workload owners in the U.S. – reporting that their company...
May 11, 2020
26.5% of all online transactions were fraud and abuse attempts in the first quarter of 2020, which is a 20% increase over the previous quarter, according to Arkose Labs’ Q2 2020 Fraud and Abuse...
Apr 29, 2020
Data is key to any organization. Every organization has data which is vital for their organizational growth. Most organizations build security around structured data which is mostly stored in the...
Jun 13, 2019
Some of the employee accounts of Wipro—one of India’s top IT services firms—may have been hacked due to an advanced phishing campaign, reported Reuters, quoting the company. The company had launched...
Apr 16, 2019
Cryptominers are still the most prevalent malware aimed at organizations globally although crytomining services, such as Coinhive have closed down, according to Check Point Research’s Global Threat...
Apr 12, 2019
The Reserve Bank of India (RBI) has imposed a monetary penalty of INR 10 million on Indian Bank for contravention of RBI circular on Cyber Security Framework in banks issued by the regulator in...
Dec 11, 2018
Cybercriminals are evolving their attack methods to increase their success rates and to accelerate infections, according to Fortinet’s Global Threat Landscape Report. While ransomware continues to...
May 23, 2018
Dr. Rudra Murthy, former CISO at Ministry of Home Affairs, has taken up a new CISO role at Amazon Pay India. Dr. Murthy, also led the security role at Unique Identification Authority of India (...
Apr 03, 2018
With the General Data Protection Regulation (GDPR) taking effect May 25, 2018, businesses around the globe should be preparing accordingly. However, through a recent survey, Trend Micro...
Sep 07, 2017
With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help...
Aug 31, 2017
Despite the increasing number of data breaches and nearly 36.6 million data records being lost or stolen in India in 2016, the vast majority of IT professionals still believe perimeter security is...
Jul 11, 2017
Between 2015 and now, there have been an alarming 53.6% rise in the number of records stolen across the globe, according to the first State of Cybersecurity Report, 2017 by Wipro. Data breaches once...
Jun 15, 2017
Gartner highlights the top technologies for information security and their implications for security organizations in 2017. The top technologies for information security are: Cloud Workload...
Jun 14, 2017
91% of businesses in India say their organization is at risk because of the complexity of business and it operations, which is above the APJ average of 85% and the worldwide average of 83%, according...
Jun 08, 2017
Cyberattacks on the government sector doubled in 2016, rising to 14% from 7% of all cybersecurity attacks in 2015, according to the Executive’s Guide to the NTT Security 2017 Global Threat...
May 10, 2017
A few years ago, no one would have heard of headless worms, machine-to-machine attacks, denial of service and two-faced malware. Today the threat of cybersecurity just exceeds everything else there...
Apr 28, 2017
The spend on cyber security will significantly grow over the next five years, but will still not be able to keep pace with threats posed by data breaches, according to a new research on cyber...
Apr 28, 2017
Hacking used to require a distinct set of skills and capabilities. These days, attack services are bought and sold via marketplaces on the Clearnet and Darknet—a phenomenon that’s closing the gap...
Apr 28, 2017
Even insurance companies aren't insured against cyber attacks. On 7th April 2017, the Insurance Regulatory and Development Authority of India (IRDAI) issued a circular to CEOs and CMDs of all...
Apr 18, 2017
With Industry 4.0 becoming a reality, operational infrastructure, which used a lot of electronic technology but were so far isolated from the rest of organizational IT, are now getting connected to...
Apr 07, 2017
Enterprise security is undergoing a dramatic change in 2017. According to research firm Gartner, organizations are moving away from prevention-only approaches to focus more on detection and response...
Mar 14, 2017
As consumer privacy becomes a major issue, more and more consumer technology companies are trying to encrypt user data. Law enforcement agencies complain that this is leading to a situation where...
Feb 10, 2016
Here is what ISACA presents as five trends in cybersecurity that are expected to surface in 2016 1. Cyber-extortion Will Hit Wearables, Medical Devices and Gaming Systems B2B use of the Internet of...
Dec 29, 2015
Less number of software security vulnerabilities were reported worldwide in 2015, as compared to 2014. However, vulnerabilities with a high level of severity increased by almost 16%, according to an...
Dec 29, 2015
Where do Indian chief information security officers (CISOs) stand in the organizational structure? Who do they report to? What is their relationship with other functional departments, especially IT...
Nov 23, 2015
Interpol's Dr Madan Mohan Oberoi highlighted various aspects of global cybersecurity scenario The 8th CSO Summit of CSO Forum started in Chandigarh today. Among the speakers were chief information...
Nov 20, 2015
Indian consumers affected by cybercrime lost on average 29.6 hours and INR 16,558, finds a new study by Norton. This is in comparison to an average of 21 hours and INR INR 23,878 (USD 358) across 17...
Nov 19, 2015
Even as businesses are warming up to the idea of enterprise app stores and Apple iOS is considered to be one of the safest systems from security standpoint, an attack on Apple’s AppStore now raises...
Sep 22, 2015
Enterprises may be struggling to digitally transform themselves, but extortionists seem to have learnt the trick. Digital extortion—in the form of what is called ransomware—is now a real threat. And...
Sep 09, 2015
The research conducted by the NopSec Labs finds following insights... Remediation challenges are creating major security risks: While rapid vulnerability detection is at an all-time high, it still...
Jun 12, 2015