Substack did not specify the number of users affected by the data breach – Read More –
Category: Privacy/Governance Feed
DKnife is a Chinese made malware framework that targets Chinese-based users – Read More –
Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies – Read More –
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical record, and every… The post Industry-Aligned Cryptography by CryptoBind appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cellebrite data confirms digital evidence is now central to almost all cases – Read More –
Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests – Read More –
Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation – Read More –
Pindrop warns of 1210% increase in AI-powered fraud last year – Read More –
Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself – JISA Softech Pvt Ltd
The Digital Personal Data Protection (DPDP) Act, 2023 in India has been a pivot in the privacy debate moving it… The post Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure – Read More –
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops – Read More –
Cofense claims AI is making phishing emails more personalized and sophisticated – Read More –
Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks – Read More –
CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog – Read More –
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin – Read More –
A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project – Read More –
UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform – Read More –
DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon – Read More –
A new ransomware-as-a-service operation dubbed “Vect” features custom malware – Read More –
Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026 – Read More –
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF – Read More –
Wiz Security claims Moltbook misconfiguration allowed full read and write access – Read More –
The Digital Personal Data Protection (DPDP) Act of India is one of the most significant regulatory changes in the… The post 90-Day DPDP Readiness Plan for Indian Enterprises appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity – Read More –
A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure – Read More –
Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says – Read More –
Bitdefender has discovered a new Android malware campaign that uses Hugging Face – Read More –
Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China – Read More –
Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report – Read More –
Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report – Read More –
CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers – Read More –
Non-profit ITRC says the number of data breaches increased 5% annually to reach a record total in 2025 – Read More –
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran – Read More –
Cyber fraudsters targeting corporate finance departments costs businesses millions a year – Read More –
The Middle East and Africa (MEA) region is experiencing a rapid industrial change. The use of Operational Technology (OT)… The post OT & IoT Security in MEA: Why Industrial Cyber Risks Are Surging appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR – Read More –
The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats – Read More –
Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations – Read More –
CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks – Read More –
The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild” – Read More –
Despite the seemingly widespread adoption of AI for security operations, security leaders primarily use it for “relatively basic use cases,” said a Sumo Logic study – Read More –
Cybersecurity is now the fifth fastest-growing occupation in the UK, says Socura – Read More –
In a period characterized by the acceleration of digital faster, more regulatory bodies and constant cyber threats, data protection… The post Designing an End-to-End Data Protection Architecture appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A recent update has fixed 12 vulnerabilities in OpenSSL, some existing in the codebase for years – Read More –
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers – Read More –
Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media. – Read More –
Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes – Read More –
Chainalysis claims Chinese money launderers now account for 20% of global activity – Read More –
Sonatype warns that open source threats became industrialized with a surge in malicious packages in 2025 – Read More –
Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula – Read More –